Information Security News mailing list archives
Lights Out
From: InfoSec News <isn () C4I ORG>
Date: Sat, 27 May 2000 15:51:53 -0500
http://www.securityfocus.com/templates/article.html?id=41 A year in the making, NIPC's Michael Vatis unveils a plan to monitor cyber attacks on the power grid. Is it enough to prevent a blackout? By Kevin Poulsen May 25, 2000 11:36 PM PT The FBI's National Infrastructure Protection Center (NIPC) will be the hub of a nationwide alert network designed to react quickly against cyber attacks targeting the computerized controls of the North American power grid, in a pilot program announced by NIPC chief Michael Vatis to a Senate committee Thursday. Vatis unveiled the "Electrical Power Indications and Warning System" in his written testimony to the full Senate Judiciary committee as it conducted a hearing on cybercrime. "Under the pilot program, electric utility companies and other power entities transmit cyber incident reports to the NIPC," Vatis testified. "These reports are analyzed and assessed to determine whether an NIPC warning, alert, or advisory is warranted to the electric utility community." The FBI established the program in concert with the North American Electrical Reliability Council (NERC), a not-for-profit industry group that umbrellas electric utilities in the U.S. and Canada. "We've been working with NIPC over the past year, maybe a little longer, to develop the program," said Eugene F. Gorzelnik, NERC's communications director. Gorzelnik said the program is being tested by one of the nine regional councils that make up NERC, but declined to say which one. "They've been working through some of the bugs, and we've had several utilities around the country volunteer to participate as well," Gorzelnik said. NERC formed in the wake of the catastrophic November 9, 1965 blackout that knocked-out power to 30 million people in the Northeastern United States and Ontario, Canada for as long as thirteen hours. Runway landing lights went dark, people were trapped in elevators, traffic snarled at busy intersections that were suddenly left without signals. Decades before buzzwords like "critical infrastructure" and "cyberterrorism" would enter the vernacular, President Lyndon Johnson viewed the blackout as a national security matter and set the FBI and the Pentagon to investigate. Utility engineers eventually traced the genesis of the cascading outage to the failure of a single relay in a transmission line. Today, the "Great Northeast Blackout" influences the most popular cyberterror fears. The inevitable hacker-induced blackout goes with the hacker-induced 911 outage as a central doctrine for executive, congressional and industry believers who say that cyberterrorism is a serious and immediate threat to the Western World. National Security Council Terrorism Coordinator Richard Clarke put it this way to the New York Times: "You black out a city, people die. Black out lots of cities, lots of people die. It's as bad as being attacked by bombs." Actual incidents of computer-based attacks against the power grid are hard to find. While the past two decades have seen no shortage of attacks on critical infrastructures -- including a hacker taking over an HBO broadcast through a communications satellite, a group trespassing into the computers controlling a Time Warner cable system, and intruders of all types routinely gaining influence over huge swaths of the telephone network -- tales of intrusions into electric utilities remain apocryphal. An October Wall Street Journal report on the 1995 Dallas "Phone Masters" case included a casual paragraph-eight disclosure that the three hackers involved "had access to portions of the national power grid," but no such charges were filed against the defendants, who admitted to cracking telephone company computers, and the prosecutor on the case denies it. "I don't remember any example of them accessing the power grid," said former Assistant U.S. Attorney Matt Yarbrough, now with a Dallas law firm. The electric industry is closed mouthed on the question. "When it comes to saying something specific about whether anything has happened on the electric system, I don't answer," said Gorzelnik. Asked to what degree the power grid is vulnerable to such an assault, Gorzelnik said, "I just won't answer that question. It's not something that we want to talk about in the press. It doesn't serve any useful purpose." But a detailed 1997 report by the White House's National Security Telecommunications Advisory Committee paints a sobering picture. Open Modems The committee's Electric Power Risk Assessment was conducted at the request of President Clinton, and involved six months of investigation and interviews with workers at eight utilities and three industry groups, including NERC. While the report concluded that physical destruction of electric facilities was a far greater threat than online attacks, it also described a power grid controlled by Byzantine systems riddled with basic security holes. Networks controlling critical portions of the grid were accessible through corporate LANs, the report said. Digital circuit breakers could be remotely tripped by anyone with the right phone number. Fixed passwords for remote vendor access went unchanged for years. Of particular concern to the committee was the widespread use of unsecured supervisory control and data acquisition (SCADA) systems. The SCADA systems consist of central hosts that can monitor and control smaller Remote Terminal Units (RTUs) sprinkled throughout the grid, which in turn control power flow at any given point. Many RTUs in electrical substations were accessible through telephone dial-ups, some of which were protected only with dial-back systems -- modems that call a user back at a pre-programmed number before granting access -- while others lacked even that weak security mechanism and were accessable to anyone who found the telephone number. "An intruder could dial into this port and issue commands to the substation equipment," the report notes. "Open sources, including... electric industry publications, regional maps, and the Internet would provide enough information to identify the most heavily loaded transmission lines and most critical substations in the power grid," reads the report. "Relatively simple hacking techniques could then be used to locate dial-in ports to these points and modify settings to trigger an outage." Overall, the report found that that utility workers "believed that firewalls and dial-back modems were sufficient to protect their systems from intruders, and they were surprised to learn about the experiences of the telecommunications industry with hackers defeating these measures." An engineer with a company that manufactures SCADA systems in use at major electric utilities, speaking on condition that neither he nor his company be identified, said that in recent years the government has spurred electric utilities to increased security. But his company's SCADA products still include dial-up support, and the security features are identical to the ones criticized as weak in the 1997 report. "You can have the remote unit call back to verify that the number is correct," he said. "There are security checks in many areas across the system, via protocols, via passwords... So I'd say it's safe. At least, it's not completely open." "Everything you see in computer security is being applied here. There are utilities that deem it necessary and are applying it. Is every utility applying it? No. But at least [the government] is pushing to see that utilities do it," he said. NERC's Gorzelnik wouldn't comment on whether the power grid is any more secure now than in 1997. The Electrical Power Indications and Warning System does nothing to prevent attacks, but rather provides a channel for electric utilities to report attacks they detect directly to NIPC. "With the information NIPC receives, they'll be able to see if there's any kind of trend developing, to see if there's a more serious problem," said Gorzelnik. "They wouldn't just be looking at the power sector, but also banking, telecommunications and other infrastructure sectors" for signs of a coordinated attack, Gorzelnik said. The program will go nationwide this fall, and in Thursday's testimony Vatis promised the Senate that it will be a model for similar programs to monitor intrusions into other critical infrastructures. "We are currently working with industry on a Indications and Warning model for the telecommunications sector." Tips, feedback, flames? Email news () securityfocus com ISN is sponsored by SecurityFocus.com --- To unsubscribe email LISTSERV () SecurityFocus com with a message body of "SIGNOFF ISN".
Current thread:
- Lights Out InfoSec News (May 27)