COMMENT: Two of the most neglected aspects of the investigation into the 9/11 attacks are the Ptech company/investigation and Operation Green Quest. In the person of Yaqub Mirza, the two overlap.
Now comes the disclosure that integrated circuits can be implanted with “kill switches” that could enable a malefactor to sabotage critical military and/or civilian operating systems.
How might the Ptech/Yaqub nexus described in the linked article above affect the possible implanting of such “kill switches” in computer chips?
The results might be devastating.
EXCERPT: Federal authorities need to shift more of their attention to computer chips as a platform for a well-organized attack on the United States by would-be saboteurs, warns a well-respected professor in the field of integrated circuits.
Several administration officials are scheduled to testify in front of two House committees Wednesday as Capitol Hill works with them to enact landmark cybersecurity legislation by the end of the summer.
One little-discussed area that they all need to more thoroughly examine is the security measures that should be adopted against malicious hardware that can be secretly implanted in the integrated circuits that control much of the world around us today, John D. Villasenor, professor of electrical engineering at the University of California, told TPM.
“There are literally thousands of people engaged in addressing software security concerns, but there’s very little awareness of the enormous exposure we have with respect to hardware security,” he said. “Chips are in almost everything these days, and in the commercial sector very little effort is directed to making sure they are free of malicious circuitry.”
Chips can be a security risk because a saboteur can slip in one component of hardware into a design that could contain thousands. Modern computer chips can power anything from the flaps of airplanes to the entire electricity system itself.
Integrated circuits pose a particular risk because they have become so complex. They are sourced and put together by suppliers all around the globe, and so it’s difficult to control the process of creating every single part that goes into them.
Villasenor estimates that there are about 1,550 companies around the world involved in designing integrated circuits.
Saboteurs could implant parts that are triggered by certain events to freeze hardware, or they could build in ‘back doors’ that could perform secret actions on devices as it, or whatever system it’s part of, keeps running.
While it all might sound like something out of The Bourne Conspiracy, French chipmakers and defense contractors have apparently already built such capabilities, an industry source told engineering magazine IEEE in 2008.
The Defense Advanced Research Projects Agency has already embarked on a project to address the issue with chips powering military equipment. Villasenor said that perhaps industry could take a look to see if they could learn any lessons. . . .
DARPA just provided an answer the question posed in the title of this post: Yes.
http://www.wired.com/dangerroom/2011/11/darpa-hackers-cybersecurity/
Darpa Begs Hackers: Secure Our Networks, End ‘Season of Darkness’
By Spencer Ackerman, 11/7/2011
The Pentagon’s far-out research agency and its brand new military command for cyberspace have a confession to make. They don’t really know how to keep U.S. military networks secure. And they want to know: could you help them out?
Darpa convened a “cyber colloquium” at a swank northern Virginia hotel on Monday for what it called a “frank discussion” about the persistent vulnerabilities within the Defense Department’s data networks. The Pentagon can’t defend those networks on its own, the agency admitted.
Because it’s the blue-sky research agency that helped create the internet, Darpa framed the problem as a deep, existential one, not a pedestrian question of insecure code. “It is the makings of novels and poetry from Dickens to Gibran that the best and the worst occupy the same time, that wisdom and foolishness appear in the same age, light and darkness in the same season,” mused Regina Dugan, Darpa’s director. She’s talking about the internet. “These are the timeless words of our existence. We know it is true of everything.”
Put in a blunter way, U.S. networks are “as porous as a colander,” Richard Clarke, the former White House counterterrorism chief turned cybersecurity Cassandra, told a packed ballroom.
“We are losing ground because we are inherently divergent from the threat,” conceded Dugan, swooping down from the stratosphere. Current network security is a numbers game: according to Darpa research, securing sensitive information on the military’s networks requires, typically, on programs running 10 million lines of code. On average, the malicious code, viruses, bots, worms and exploits that try to penetrate those defenses rely on 9,000 lines of code. Eventually, simple beats over-engineered.
Dugan didn’t go as far as Clarke did — she’s a senior Defense Department official, after all — but she implied that left to its own devices, the government’s network defenses will allow crucial data to increasingly sluice through, like water through Clarke’s colander. And it’s not just information leaking out: it’s the danger of a cyberattack crippling U.S. financial systems or the power grid, according to many at the colloquium. ”We believe we need more and better options,” Dugan said.
....
”
Son of Stuxnet?
Umm, if there are “no financial incentives” for operators of critical infrastructure to secure their systems I think we need new operators.
I’ve often wondered over the years why it isn’t considered a national security issue that the USs tax policies actually incentivize manufactures to move jobs offshore.
Still wondering:
Not surprising, but worth noting:
@Pterrafractyl–
I wonder if they will start making noise in this direction?
Dave Emory
@Dave: Heh, well, I suppose the German military could send some “noise” towards site pretty easily, along with at least half the other militaries of the world. Fortunately, I suspect some sort of attack would simply gather attention and act as a proxy-validation of the content on this site. Unfortunately, that same validation of this site’s content could have been achieved years ago by enough people reading the content on this site but that’s a seemingly insurmountable barrier (ahistorical historical eras tend to end unwell).
On the plus side, at least we don’t have to be as immediately concerned about hacking as these folks:
Yes, the pilots of the most expensive fighter jet ever made are either suffering from atelectasis, a medical condition caused by breathing pure oxygen under extreme g‑forces OR they’re suffering from a asphyxiation, a medical condition caused by the “Combat Edge” g‑suit not delivering enough oxygen during extreme aeronautic maneauvers. That sounds like an unpleasant situation all around.
If the flight suit is the culprit, it sounds like it might be a software issue:
On the plus side, the manufacturers of the “Combat Edge” g‑suit, David Clark Company, are known for their noise-canceling headphones so noise is something they hopefully don’t have to worry about too much. In the age of outsourced national security and “WTF?!” reality, I guess beggars can’t be choosers.
Did script kiddies just target energy companies in Saudi Arabia?
While it’s possible that script kiddies targetting machines with important info on SaudiAramco’s networks, the just-discovered virus targetting financial institutions in Lebanon appears to have more than just script kiddies behind its development:
Perhaps the most surprising part of this “Gauss” story is that a virus presumably developed by the US intelligence community would even bother trying to capture PayPal transactions for intelligence gathering purposes. I would have expected that info to be readily available to the spooks.
Given that this latest Stuxnet-cousin, Gauss, may also contain a Stuxnet-like ability to remotely take control of industrial command and control systems, and given the massive RSA login-password data-breach from 2011, this should probably be looked into:
And here we have another surprising developing coming out of the Middle East: A group calling itself “Izz ad-Din al-Quassam Cyber Fighters” just unleashed an unusually powerful series of denial-of-service attacks on major US banks:
So we can add one more item to the list of recent surprising developments in the Middle East while claiming the pathetic Islam-bashing film as the inspiration for the attacks when it’s clear that the attacks were planned in advance of the film’s release:
Regarding the allegations that Iran is behind the attack, while it may be the case that Ahmadinejad and much of Iran’s leadership are pathetic lunatics that are ensuring the destruction of their nation’s future through ass-backwards mismanagement(sometimes in ironic ways). But it’s still kind of difficult to see what, if anything, the Iranian government would gain from a cyber attack that would probably just end up helping the candidate that’s promising unilateral military action against Iran if elected.
While it’s laughable to think that the Russian government just found out about security risks in electronic hardware from Snowden, it’s going to be interesting to see if any serious policy shifts emerge from this proposal. You also have to wonder how this could impact Russia’s arms export industry:
The US Senate just voted 56–44 to proceed with the second impeachment trial of Donald Trump, with just six Republicans joining 50 Democrats in supporting the validity of the impeachment process. Considering that this is an impeachment trial over Trump’s instigation of a violent insurrection and the storming of the Capitol, it’s probably not an exaggeration to say that the US is currently under a level of the risk of a domestic terrorism with few historical precedents. There’s an actual rogue president trying to stoke a ‘leaderless resistance’-style reaction to his loss and the vast majority of the Republican Party is fully behind him.
So with that elevated risk of domestic terror in mind, there’s a new story that raises the chilling question: did the US just dodge a Super Bowl terror attack? That’s the question raised by new reports of a hacking attempt against the critical infrastructure in the down of Oldsmar, Florida, which is just 12 miles away from Super Bowl held in Tampa over the weekend. The hacker broke into the city’s water supply on Friday and changed the chemical levels causing a 100-fold spike in the levels of sodium hydroxide. This is the equivalent of spiking the water supply with lye.
We’re told that there were minimal risks of this attack succeeding due to pH monitors that would have detected this change before it made it into households. In addition, the Although the Oldsmar water supply is based on well water and separate from surrounding water systems. So at least that would have likely reduced the impact on Super Bowl tourists. But we’re also told that it would have taken a day or two for the changes in pH to make it into the water supply. And since this hack took place on Friday, two days before the the Super Bowl, that would have timed the impact of this to coincide with the flood of people traveling to that area over the weekend.
The hack was witnessed in real-time by a city employee who watched as their mouse seemed to move under someone else’s control. The same hacker took control of the mouse earlier in the day, but the employee assumed it at the time was one of the other employees using software to remotely access that computer. During the first hacking incident, the mouse was just moved around a little bit. But during the second attack, they took control and immediately proceeded to change the sodium hydroxide levels, so it was a very deliberate action.
Adding to the disturbing nature of this story is how typical it sounds like this type of hack actually is. According to experts, remote access hacks like this happen all the time all critical infrastructure that’s connected to the internet. The primary thing defending the public against these attacks is the sophistication of the industrial control systems the hackers gained access to. In other words, it’s easy to hack into these systems but the controls are still so bewildering that you won’t know how to actually modify the systems in a way to cause damage. That’s the US’s prime infrastructure defense today. It’s not exactly a reassuring defense.
Finally, note that we are told investigators have no idea where the Oldsmar hack originated from. They don’t know if it was a foreign or domestic hack. And that’s why it’s going to be important to keep in mind that if we do end up dealing with a violent Trumpian insurgency in the US and a campaign of domestic terror attacks, they aren’t necessarily going to want to advertise those attacks as coming from Trump sympathizers, especially if the purpose is to generically destabilize the Biden administration. And that makes false flag hacks a highly tempting form of terror attack in this situation. So don’t be too surprised if any upcoming waves of infrastructure attacks end up being filled with ‘clues’ of a foreign origin.
Ok, here’s an NPR piece on that hack at points out one of the most disturbing aspects of this story: it happened 12 miles out from Tampa and, given the 1–2 day delay in the impact on water quality, was seemingly timed to hit right before the Super Bowl:
“Oldsmar is a small city northwest of Tampa, roughly 12 miles away from Raymond James Stadium, which hosted the Super Bowl two days after the hacking attack. Oldsmar draws its water from wells; its system is separate from other nearby communities, the officials said.”
It’s not hard to imagine the kind of disaster this could have created, even with Oldsmar’s water system being separate from nearby communities. Thousands of people just miles from the Super Bowl would have suddenly experienced a form of biochemical terrorism. The hack would take 1–2 days to take effect and was executed 2 days before the Super Bowl. That’s unlikely to be a coincidence:
And now here’s a Wired piece that manages to make this story even more disturbing by pointing out how common it actually is. The oddity in this story isn’t that a piece of critical infrastructure was hacked. That’s apparently happening all the time all over. No, what’s weird is that the hacker did something that could have actually triggered a disaster:
“Gualteri said the city’s own forensic investigators, as well as the FBI and Secret Service, are seeking those answers. “That’s the million-dollar question, and it’s a point of concern, because we don’t know where the hole is and how sophisticated these people are,” Gualteri said. “Did this come from down the street or outside the country? No idea.””
Where did this hack come from? Did it originate from inside the US or outside? Investigators have no idea. And, of course, if these hackers are reasonably competent it’s possible the investigators will never have any idea of where the hack ultimately originated from. It’s a form of attack that, if executed corrected, can leave the attack with a very low risk of being caught. Which is all the more reasons why it’s utterly insane that that the operational technology that controls this critical infrastructure is accessible over the internet:
But despite these obvious risks, plenty of critical infrastructure remains connected to the internet leaving the sheer complexity of the operational control systems as the primary line of defense against these forms of attack:
Also keep in mind that, while the complexity of these control systems might thwart random hackers who know nothing about these systems, that’s not necessarily going to be the case when dealing with insider attacks. Don’t forget what we just read about what the Oldsmar employee witnssed as this hack unfolded: the second time this hacker logged into the Oldsmar system, they almost immediately proceeded to cause the 100-fold jump in the sodium hydroxide levels. That sounds like someone who knew their way around this control system. And if we’re going to be dealing with a MAGA insurgency for years to come, we have to assume those insurgents will include a lot of insiders with detailed knowledge of how these systems work and, more important, how they can be strategically broken.