Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Stuxnet a threat to critical industries worldwide: experts
by Staff Writers
Washington (AFP) Nov 17, 2010


US faces 'huge' cyber threat in the future: Gates
Washington (AFP) Nov 16, 2010 - Defense Secretary Robert Gates warned Tuesday that potential cyber attacks posed a "huge" future threat that had to be tackled through joint efforts by US military and civilian agencies. Asked to assess the danger posed to digital networks, Gates said: "There is a huge future threat and there is a considerable current threat. "And that's just the reality that we all face." He said the Pentagon had bolstered security for the military's networks and hoped to do the same for defense industry contractors.

"We are working with our partners in the defense industrial base to bring them under that umbrella, to provide them with protection," he said at a Wall Street Journal conference of chief executives. Gates said the challenge for cyber security efforts inside the United States is that resources and expertise are concentrated in the military and the National Security Agency (NSA), which raises thorny legal questions about civil liberties. "The only defense the United States has I think against nation states and other potential threats in the cyber world is the National Security Agency," said Gates, referring to the secretive surveillance agency. "You cannot replicate the NSA for domestic affairs, there isn't enough money, there isn't enough time and there isn't enough human talent. "So how do you let the domestic side of the government have access to the asset that the NSA represents, while at the same time taking into account the concerns for privacy and civil liberties?"

Gates, a former CIA director, touted an agreement approved by President Barack Obama last month between the Pentagon and the Department of Homeland Security that he said paved the way for unprecedented cooperation between the NSA and the domestic agencies on cyber security. The new approach allows for legal and other officials from the Department of Homeland Security to work out of the NSA's offices, and to assign tasks to the NSA to safeguard domestic networks, he said. "So you have the domestic security agency, DHS, being able to reach into the NSA in a real time way to get the kind of protections that we need," he said. The arrangement would hopefully provide better security for both military and civilian networks, he said. Civil liberties groups have voiced concern over the role of the NSA in cyber security efforts inside the United States, saying privacy rights could be jeopardized.

The Stuxnet worm that infiltrated Iran's nuclear facilities poses a threat to critical industries worldwide such as water, power and chemical plants, cybersecurity experts warned on Wednesday.

Sean McGurk, the acting director of the Department of Homeland Security's National Cybersecurity and Communications Integration Center (NCCIC), described Stuxnet in testimony before a US Senate committee as a "game-changer."

Stuxnet, which was detected in July, has "significantly changed the landscape of targeted cyberattacks," McGurk told the Senate Committee on Homeland Security and Governmental Affairs.

"For us, to use a very overused term, it's a game-changer," he said.

Stuxnet targets computer control systems made by German industrial giant Siemens commonly used to manage water supplies, oil rigs, power plants and other critical infrastructure.

Most Stuxnet infections have been discovered in Iran, giving rise to speculation it was intended to sabotage nuclear facilities there, especially the Russian-built atomic power plant in the southern city of Bushehr.

Computer security firm Symantec said last week that Stuxnet may have been specifically designed to disrupt the motors that power gas centrifuges used to enrich uranium.

Dean Turner, director of Symantec's Global Intelligence Network, told the Senate panel that while 60 percent of the Stuxnet infections detected were in Iran it should be seen as "a wake-up call to critical infrastructure systems around the world."

"This is the first publicly known threat to target industrial control systems and grants hackers vital control of critical infrastructures such as power plants, dams and chemical facilities," Turner said.

Stuxnet was so complex that only a "select few attackers" could develop a similar threat but it highlights that "direct-attacks to control critical infrastructure are possible and not necessarily spy novel fictions," he said.

"The real-world implications of Stuxnet are beyond any threat we have seen in the past," Turner warned.

The New York Times reported in September that Stuxnet code includes a reference to the Book of Esther, the Old Testament story in which the Jews pre-empt a Persian plot to destroy them, and is a possible clue of Israeli involvement.

McGurk, the US cybersecurity official, declined to speculate about Stuxnet's origins or objectives but said US analysis "indicates that a specific process was likely targeted."

"While we do not know which process was the intended target, it is important to note that the combination of Windows operating software and Siemens hardware can be used in control systems across critical infrastructure sectors -- from automobile assembly lines to mixing baby formula to processing chemicals," he said.

"The concern for the future of Stuxnet is that the underlying code could be adapted to target a broader range of control systems in any number of critical infrastructure sectors," McGurk said.

"These systems are used to operate physical processes that produce the goods and services that we rely upon, such as electricity, drinking water, and manufacturing," he said.

"Although each of the critical infrastructure industries, from energy though water treatment, is vastly different, they all have one thing in common: they are dependent on control systems to monitor, control, and safeguard their processes," the US cybersecurity official said.

McGurk warned that "a successful cyberattack on a control system could potentially result in physical damage, loss of life, and cascading effects that could disrupt services."

He explained that with Stuxnet, "I don't have to break into the front door and actually steal the formula or the intellectual property of what you're manufacturing.

"I can actually go the devices themselves, read the settings and reverse engineer the formula for whatever the process is that's being manufactured," McGurk said. "In addition, I can make modifications to the physical environment so that you would be unaware of those changes being made.

"In other words, this code can automatically enter a system, steal the formula for the product you are manufacturing, alter the ingredients being mixed in your product, and indicate to the operator and your anti-virus software that everything is functioning as expected," he said.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Top Taiwan prosecutor targeted by Chinese hackers: report
Taipei (AFP) Nov 17, 2010
A top Taiwanese prosecutor in charge of probing several major scandals, including a Chinese spy case, has been targeted by cyber-attacks from China, a report said Wednesday. Chinese hackers have obtained confidential information from the home computer of Huang Mo-hsin, a chief prosecutor at the Taipei district prosecutor's office, on at least four top cases, said Next magazine. Among the ... read more


CYBER WARS
Mining On The Moon Is A Not-So-Distant Possibility

New Analysis Explains Formation Of Lunar Farside Bulge

New type of moon rock identified

Moon Express Enters $30 Million Google Lunar X PRIZE Competition

CYBER WARS
IceBite Blog: Setting Up An IceBreaker

Camera On Curiosity's Arm Will Magnify Clues In Rocks

Breaking The Ice In Antarctica

Driving Through A Field Of Small Craters

CYBER WARS
TakeMeToSpace.com Launches Space Tourism

Soyuz Returns To Earth Earlier Than Planned

Russia To Conduct Half Of Carrier Rocket Launches From Far East By 2020

Republicans could scale back US science budgets

CYBER WARS
Two Telescopes For Tiangong

Chinese Female Taikonaut Identified

Tiangong Space Lab Spurs China Space PR Blitz

China Announces Success Of Chang'e-2 Lunar Probe Mission

CYBER WARS
ISS crew to return to Earth early

German Robotic Arm Completes Its Five-Year ISS Mission

ISS Crew Completes Spacewalk

Space Station Spacewalk Under Russian Program Planned For Today

CYBER WARS
Ball Aerospace's First Standard Interface Vehicle Set To Launch

ILS Proton Launches Lightsquared Satellite

Russia Launches Advanced US Telecom Satellite

NASA plans Alaska satellite launch

CYBER WARS
First glimpse of a planet from another galaxy

Eartly Dust Tails Point To Alien Worlds

U.K. astronomers see 'snooker' star system

e2v To Develop Image Sensors For PLATO Exoplanet Mission

CYBER WARS
Yahoo! Connected TV store to start selling widgets

Laser camera 'sees' around corners

Sonar System Inspired By Dolphins

U.S. Army upgrades force tracking system




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement