Crossroads Blog | Institute National Security and Counterterrorism

cyber attack, Cyber Exploitation, Stuxnet, warfare

Cyber attacks on utilities, industries rise: Boston Globe

On September 29th, 2011, Douglas Birch reported for the Boston Globe on how U.S. utilities and other crucial industries face an increasing number of cyber break-ins by attackers.  U.S. officials have long feared that future wars will include cyber attacks on power plants, pipelines and air traffic control systems.  Acting DHS Deputy Undersecretary Greg Schaffer told reporters that "We are connecting equipment that has never been connected before to these global networks.  Disgruntled employees, hackers and perhaps foreign governments are knocking on the doors of these systems and there have been intrusions." 

According to DHS, the number of private organizations asking for the department's help in protecting their automated control systems rose from 57 last year to 81 so far this year.  Furthermore, DHS' Computer Emergency Response Team for industrial systems was deployed six times in 2010, as opposed to once in 2009.  In 2011, the Emergency Response Team has already been deployed seven times for attacks on industrial control systems. 

DHS currently performs research on how cyber attacks can affect industrial control systems at the Idaho National Laboratory.  Interestingly, some have theorized that research at Idaho National Laboratory was focused on studying the vulnerabilities of Iranian industrial control systems, possibly aiding in the development of Stuxnet.  In a 2007 test dubbed "Aurora", government hackers from the Idaho National Laboratory were able to break into the control system running a large diesel generator, causing it to self-destruct.  James Lewis, a former State Department official now with the Center for Strategic and International Studies in Washington, said that before Aurora, the notion of cyber warfare "was mainly smoke and mirrors. But the Aurora tests showed that, you know what? We have a new kind of weapon."

The source article can be found here.

Leave a Reply

Bitnami