Feeds

The cyber-weapons paradox: 'They're not that dangerous'

A war boffin talks to El Reg

SANS - Survey on application security programs

What we should worry about

Speaking to The Reg earlier this week, Rid said that the systems we really should be worried about are industrial control systems – SCADA – computer systems that control the national grid, public transport, chemical mixing in factories andprison doors. These are the systems that he claims have poor security set-ups:

"We don't see enough pressure on control systems vendors and creators, security in these areas is often shocking and I don't know how they've got away with it for so long," the war boffin complained.

Control systems software is deeply specialised, and often even the people running it don't understand it:

Rid said: "These types of software are so specialised that people running the software have to go back to the manufacturer when there's a problem, because their own help desks can't help."

Threat attacks could almost only come from insiders, because systems like this are so specific.

Rid's top tip is that it's the people who work on esoteric software – maverick insiders – that we should worry about rather than patriotic foreign hack-warriors.

One of the computer hacks with the greatest physical impact ever came from an angry Australian sewage worker who used his knowledge of pumping systems to pay back an employment grudge. Rid recounts the case:

One of the most damaging breaches of a SCADA (Supervisory Control and Data Acquistion) system happened in March and April 2000 in Maroochy Shire, in Queensland in Australia. After 46 repeated wireless intrusions into a large wastewater over a period of three months, a lone attacker succeeded in spilling more than a million litres of raw sewage into local parks, rivers and even the grounds of a Hyatt Regency hotel. The author of the attack was 49-year-old Vitek Boden. His motive was revenge; the Maroochy Shire Council had rejected his job application. At the time Boden was an employee of the company that had installed the Maroochy plant's SCADA system.

Boden's inside knowledge and the software he had on his laptop allowed him to take control of 150 sewage pumping stations in the area. Otherwise pulling off such a physically significant and gungy attack would require such a detailed knowledge of a particular system and its weaknesses that very few people would be capable of it.

What the government should do

Though the threat may be lower than media hype suggests, the government needs to know more, and there needs to be more open debate on the risks of cyber weapons, Rid said. "We need more expertise in these areas in both government and in public," added the war boffin.

He said that government needs to understand industrial control systems.

In short, Rid suggests ditching the spooks: "If we put GCHQ in charge of cyber security, by their clearly secretive nature, they won't be able to put public pressure on businesses to make necessary reforms and improvements to their products. That's not where public pressure comes from.

Then he suggests getting in some hackers: "Why not have a team of white-hat hackers – people who publicly expose weaknesses and make them public if they are not fixed."

And then, he adds, the debate needs to be clarified a bit – so that the focus is on the real threats: "If we look at the world of brick-and-mortar weapons, we wouldn't call a bag a weapon though it could be used to carry away stolen goods. But in cyber space we lose our common sense and call everything a weapon. We need to inform the public debate." ®

Cyber Weapons by Thomas Rid and Peter McBurney is published today in RUSI Journal

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.