{"id":632,"date":"2012-01-17T20:10:27","date_gmt":"2012-01-17T20:10:27","guid":{"rendered":"http:\/\/andrewwheen.com\/?p=632"},"modified":"2022-03-09T09:23:09","modified_gmt":"2022-03-09T09:23:09","slug":"this-is-all-getting-a-bit-scary","status":"publish","type":"post","link":"https:\/\/andrewwheen.com\/index.php\/2012\/01\/17\/this-is-all-getting-a-bit-scary\/","title":{"rendered":"This Is All Getting A Bit Scary"},"content":{"rendered":"<p>Since the attack on the World Trade Center on September 11, 2001, there has been considerable speculation about the possibility of cyber terrorism. In March 2000, a disgruntled Australian employee used the internet to release one million litres of raw sewage into the rivers and coastal waters of Queensland. Could terrorists use the internet to gain control of a nuclear power station, an air traffic control system or a military installation? The possibilities for causing mayhem in this way are limited only by the imagination, and the fact that it hasn\u2019t happened yet does not prove that it can\u2019t be done. Hackers have demonstrated convincingly that it is possible to penetrate highly sensitive government and military computers using nothing more sophisticated than a laptop computer and a connection to the internet. Is it only a matter of time before the West is held to ransom by terrorists operating from somewhere beyond the reach of legal or military sanctions?<\/p>\n<p>Experts dismiss these suggestions by pointing out that critical systems are \u201cair gapped\u201d from external networks (i.e. there is no physical connection at all). But the Stuxnet worm managed to infect the Iranian nuclear enrichment program in spite of the presence of an air gap.&nbsp;And there are plenty of systems out there that are supposed to be air gapped &#8211; but actually aren&#8217;t. During testing of the Boeing 787 Dreamliner, it was found that <a title=\"Dreamliner Security Issue\" href=\"http:\/\/www.wired.com\/politics\/security\/news\/2008\/01\/dreamliner_security\" target=\"_blank\" rel=\"noopener\">no air gap existed<\/a> between the aircraft\u2019s control systems and the network used to provide passengers with in-flight internet access. If this vulnerability hadn\u2019t been found during a routine FAA inspection, it might have enabled a passenger with advanced hacking skills to have a go at flying the plane.<\/p>\n<div id=\"attachment_641\" style=\"width: 1512px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/andrewwheen.com\/wpress\/wp-content\/uploads\/2012\/01\/Boeing-787-Dreamliner-with-Air-Gap.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-641\" class=\"size-full wp-image-641\" title=\"Boeing 787 Dreamliner - with air gap added!\" src=\"http:\/\/andrewwheen.com\/wpress\/wp-content\/uploads\/2012\/01\/Boeing-787-Dreamliner-with-Air-Gap.jpg\" alt=\"Boeing 787 Dreamliner - with air gap added!\" width=\"1502\" height=\"837\" srcset=\"https:\/\/andrewwheen.com\/wpress\/wp-content\/uploads\/2012\/01\/Boeing-787-Dreamliner-with-Air-Gap.jpg 1502w, https:\/\/andrewwheen.com\/wpress\/wp-content\/uploads\/2012\/01\/Boeing-787-Dreamliner-with-Air-Gap-300x167.jpg 300w, https:\/\/andrewwheen.com\/wpress\/wp-content\/uploads\/2012\/01\/Boeing-787-Dreamliner-with-Air-Gap-1024x570.jpg 1024w\" sizes=\"auto, (max-width: 1502px) 100vw, 1502px\" \/><\/a><p id=\"caption-attachment-641\" class=\"wp-caption-text\">Boeing 787 Dreamliner - with air gap added!<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Since the attack on the World Trade Center on September 11, 2001, there has been considerable speculation about the possibility of cyber terrorism. In March 2000, a disgruntled Australian employee used the internet to release one million litres of raw &hellip; <a href=\"https:\/\/andrewwheen.com\/index.php\/2012\/01\/17\/this-is-all-getting-a-bit-scary\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[96],"tags":[25,16,100],"class_list":["post-632","post","type-post","status-publish","format-standard","hentry","category-telecom-ramblings","tag-computer","tag-internet","tag-security"],"_links":{"self":[{"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/posts\/632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/comments?post=632"}],"version-history":[{"count":16,"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/posts\/632\/revisions"}],"predecessor-version":[{"id":914,"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/posts\/632\/revisions\/914"}],"wp:attachment":[{"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/media?parent=632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/categories?post=632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/tags?post=632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}