Wednesday, March 21, 2018

Cyber Threats: System Failures & Living in Denial

By Greg Guma

In August 2010, when Foreign Policy posted an article citing credible research and directly warned oil companies worldwide that their offshore oil rigs were highly vulnerable to hacking, few people took notice.
     “Computer commands can derail a train or cause a gas pipeline to burst,” warned former Bush administration counter-terrorism chief Richard Clarke a few years later in Cyber War, his book on the topic. The reaction: mainly silence. Until recently, such scenarios seemed more like movie plots than foreign policy concerns, and the threat looked more domestic than foreign. 
     In early 2009, for instance, a 28-year-old contractor in California was charged in federal court with almost disabling an offshore rig. Prosecutors said the contractor, who was allegedly angry about not being hired full time, had hacked into the computerized network of an oil-rig off the coast, specifically the controls that detect leaks. He caused damage, but fortunately not a leak.
     After the Deepwater Horizon oil drilling disaster in the Gulf of Mexico the Christian Science Monitor reported that at least three US oil companies had been targets in a series of cyber attacks. The culprit was most likely someone or some group in China, and the incidents, largely un-reported for several years, had involved Marathon Oil, ExxonMobil and ConocoPhillips. But the companies apparently didn’t realize how serious their problem was until the FBI alerted them.
     At the time, federal officials said that proprietary information – email passwords, messages, and information linked to executives – had been flowing out to computers overseas. Chinese government involvement could not be confirmed, but some data did end up on a computer in China. One oil company security staffer privately coined the term “China virus.”
     Still, the companies generally preferred not to comment, or even admit that the attacks had happened. But the Monitor persisted, interviewing insiders, officials and cyber attack experts, and ultimately confirmed the details. Their overall conclusion was that cyber-burglars, using spyware that is almost undetectable, pose a serious and potentially dangerous threat to private industry.
     According to Clarke, many nations conduct Internet espionage and sometimes even cyber attacks. China has been aggressive at times, but so have Russia and North Korea. Spying on defense agencies and diplomats has been one major focus; strategically important businesses and even national governments have also been targeted.
     In 2011, when I first published an article on the problem, Google claimed that it had evidence of at least 20 companies that had been infiltrated by Chinese hackers. According to a report in the Wall Street Journal, logic bombs were being infiltrated into the US electric power grid. If so, they could operate like time bombs. Now it looks likely that Russia was the actual culprit, or had the same idea.
     On oil rigs, the advent of robot-controlled platforms has made a cyber attack possible with a computer anywhere in the world. Control of a rig could be accomplished by hacking into the "integrated operations" that link onshore computer networks to offshore ones. Until 2018 few experts would speculate publicly that this may already have happened. But there has been confirmation of computer viruses causing personnel injuries and production losses on North Sea platforms for several years.
     One problem is that even though newer rigs have cutting-edge robotics technology, the software that controls their basic functions can still be old school. Many rely on supervisory control and data acquisition (SCADA) software, which was created in an era when "open source" was more important than security.
     "It's underappreciated how vulnerable some of these systems are," warned Jeff Vail, a former counterterrorism and intelligence analyst with the US Interior Department who talked with Greg Grant, author of the Foreign Policy article. "It is possible, if you really understood them, to cause catastrophic damage by causing safety systems to fail."
     The name of the article, by the way, was “The New Threat to Oil Supplies – Hackers.” It sounds a lot like “Bin Laden Determined to Strike Inside the US.”
     To be fair, the US government’s failure to address private-sector vulnerability to cyber attacks goes back decades. Until recently, however, Congress and various administrations hesitated to challenge the status quo. Given the vulnerability of crucial infrastructure and much of the private sector, surprisingly little was done to prepare for what sounds inevitable.
     The US Cyber Command has attempted to protect federal infrastructure, while various branches of the military have developed their own offensive capabilities. But not even the Department of Homeland Security is officially responsible for protecting the private sector.  Legal and privacy issues get in the way of having the government directly monitor the Internet or business operations for evidence of potential cyber attacks. As you might expect, many businesses are wary of the regulations that might accompany government help.
     Though cyber attacks have clearly happened, many leave no obvious trace. As Clarke explained, corporations tend to believe that the “millions of dollars they have spent on computer security systems means they have successfully protected their company’s secrets.” Unfortunately, they are wrong. Intrusion detection and prevention systems sometimes fail.
     As it stands, no single federal agency is responsible for defending the banking system, power grids and oil rigs from attacks. The prevailing logic is that businesses should handle their own security. Yet their experts readily admit that they wouldn’t know what to do if an attack came from another nation, and assume that defense in such a case would be the government’s job.That’s capitalist thinking for you, private interests but socialized costs.
     In 2011, a US Senate bill sponsored by Democrat Jay Rockefeller and Republican Olympia Snowe sought to change that, but became another victim of DC gridlock. It would have required the president to work with the private sector on a comprehensive national cybersecurity strategy, created a joint public-private advisory board, and led to a Senate-confirmed national security adviser position. Rockefeller said the goal was “unprecedented information sharing between government and the private sector.”
     James Fallows has argued that the US suffers from “a conspiracy of secrecy about the scale of cyber risk.” His point was that many companies simply won’t admit how easily they can be infiltrated. As a result, changes in the law, the regulatory environment, or personal habits that could increase safety are not seriously discussed.  

      But sooner or later, Fallows concluded, “the cyber equivalent of 9/11 will occur.” That prediction is bad enough. But then he adds, “if the real 9/11 is a model, we will understandably, but destructively, overreact.” 
      So we’ve also got that to look forward to.

Friday, March 2, 2018

Fake News Is Focus of UVM Talk and New Book

BURLINGTON —  On March 15, Vermont-based author and activist Greg Guma will discuss “Journalism In the Era of Fake News” at the UVM Alumni House, presented by the Osher Lifelong Learning Institute. The presentation will cover many of the themes in his new book, which was released in February. 

This is Guma’s tenth book. Fake News: Journalism in the Age of Deceptions is brief, but takes on a large and timely topic — the challenges confronting journalism in a post-modern era characterized by fraud and scandal, questionable elections, corrupt leaders, and phony news. It argues that sophisticated tools have been used for years by governments and private interests to promote false or misleading stories, messages and narratives. But when people repeatedly exposed to lies are confronted with the truth, too many double down and believe the lies even more. 

Topics in the book and upcoming talk include the recent weaponizing of the term “fake news”; hoaxes, fabricated stories and false flag operations throughout history; the use of perception management strategies by governments and private interests; election manipulation and post-truth problems; the dangers of polarization and how people can avoid living in a bubble. One of the incidents revisited in the book is a 1978 disinformation campaign in Vermont.

A previous book by Guma, The People’s Republic: Vermont and the Sanders Revolution, was cited in coverage of Bernie Sanders during the 2016 election. The author was a frequently quoted source, learning first-hand how national journalists develop and shape narratives. In 2015 he was a candidate for Burlington mayor. Guma’s background in journalism dates back to work as a daily newspaper reporter and photographer in the late 1960s, and ranges from editing periodicals like the Vermont Vanguard Press, Toward Freedom and Vermont Guardian to managing the national Pacifica radio network.  

In 2003, the University of Vermont received initial funding from the Bernard Osher foundation to establish lifelong learning institutes that provide courses and programs for Vermonters age 50 and over. Three years later, the Osher Lifelong Learning Institute was permanently established at UVM. Other Institutes offer non-credit courses and programs at affordable prices in nine Vermont communities.

To attend “Journalism in the Era of Fake News,” visit OLLI’s website at,  or contact Lora Phillips at 802-656-2085 or Guma will speak at 5:30 p.m. in the Pavilion of the university’s Alumni House at 61 Summit Street. Enrollment and seating are limited.

Fake News: Journalism in the Age of Deceptons can be sampled or purchased for any electronic device. An illustrated paperback edition was released on Feb. 27.