Feeds

The cyber-weapons paradox: 'They're not that dangerous'

A war boffin talks to El Reg

The essential guide to IT transformation

What we should worry about

Speaking to The Reg earlier this week, Rid said that the systems we really should be worried about are industrial control systems – SCADA – computer systems that control the national grid, public transport, chemical mixing in factories andprison doors. These are the systems that he claims have poor security set-ups:

"We don't see enough pressure on control systems vendors and creators, security in these areas is often shocking and I don't know how they've got away with it for so long," the war boffin complained.

Control systems software is deeply specialised, and often even the people running it don't understand it:

Rid said: "These types of software are so specialised that people running the software have to go back to the manufacturer when there's a problem, because their own help desks can't help."

Threat attacks could almost only come from insiders, because systems like this are so specific.

Rid's top tip is that it's the people who work on esoteric software – maverick insiders – that we should worry about rather than patriotic foreign hack-warriors.

One of the computer hacks with the greatest physical impact ever came from an angry Australian sewage worker who used his knowledge of pumping systems to pay back an employment grudge. Rid recounts the case:

One of the most damaging breaches of a SCADA (Supervisory Control and Data Acquistion) system happened in March and April 2000 in Maroochy Shire, in Queensland in Australia. After 46 repeated wireless intrusions into a large wastewater over a period of three months, a lone attacker succeeded in spilling more than a million litres of raw sewage into local parks, rivers and even the grounds of a Hyatt Regency hotel. The author of the attack was 49-year-old Vitek Boden. His motive was revenge; the Maroochy Shire Council had rejected his job application. At the time Boden was an employee of the company that had installed the Maroochy plant's SCADA system.

Boden's inside knowledge and the software he had on his laptop allowed him to take control of 150 sewage pumping stations in the area. Otherwise pulling off such a physically significant and gungy attack would require such a detailed knowledge of a particular system and its weaknesses that very few people would be capable of it.

What the government should do

Though the threat may be lower than media hype suggests, the government needs to know more, and there needs to be more open debate on the risks of cyber weapons, Rid said. "We need more expertise in these areas in both government and in public," added the war boffin.

He said that government needs to understand industrial control systems.

In short, Rid suggests ditching the spooks: "If we put GCHQ in charge of cyber security, by their clearly secretive nature, they won't be able to put public pressure on businesses to make necessary reforms and improvements to their products. That's not where public pressure comes from.

Then he suggests getting in some hackers: "Why not have a team of white-hat hackers – people who publicly expose weaknesses and make them public if they are not fixed."

And then, he adds, the debate needs to be clarified a bit – so that the focus is on the real threats: "If we look at the world of brick-and-mortar weapons, we wouldn't call a bag a weapon though it could be used to carry away stolen goods. But in cyber space we lose our common sense and call everything a weapon. We need to inform the public debate." ®

Cyber Weapons by Thomas Rid and Peter McBurney is published today in RUSI Journal

5 things you didn’t know about cloud backup

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.