{"id":832,"date":"2013-09-13T19:25:55","date_gmt":"2013-09-13T19:25:55","guid":{"rendered":"http:\/\/andrewwheen.com\/?p=832"},"modified":"2013-09-13T19:34:29","modified_gmt":"2013-09-13T19:34:29","slug":"time-for-unconventional-thinking","status":"publish","type":"post","link":"https:\/\/andrewwheen.com\/index.php\/2013\/09\/13\/time-for-unconventional-thinking\/","title":{"rendered":"Time for Unconventional Thinking"},"content":{"rendered":"<p>I recently published a <a title=\"Unconventional Threats White Paper\" href=\"http:\/\/www.ict.mottmac.com\/innovationblog\/\" target=\"_blank\">white paper <\/a>describing some unconventional threats to utility infrastructure. In addition to rather unusual (but potentially devastating) threats such as coronal mass ejections from the sun, electromagnetic pulses and space debris, the paper also talks about threats to utility infrastructure from cyber warfare and cyber terrorism. If you think that power grids, water networks, railways and airports are not vulnerable to such threats \u2013 then you had better read the white paper!<\/p>\n<p>Since that paper was written, there has been a <a title=\"Cyber Attack on Istanbul Airport Passport Control System\" href=\"http:\/\/thehackernews.com\/2013\/07\/Istanbul-airport-cyber-attack-virus.html\" target=\"_blank\">cyber attack on Istanbul Airport\u2019s passport control system<\/a>. Airports are massive users of IT, and it\u2019s heavily interconnected, so this attack surely demonstrates the very real possibility that an airport could be shut down by a cyber attack. At the Black Hat conference in Las Vegas last July, <a title=\"Hacker Threat to Water Supplies\" href=\"http:\/\/www.csoonline.com\/article\/737749\/trend-micro-hacker-threats-to-water-supplies-are-real\" target=\"_blank\">Trend Micro threat researcher Kyle Wilhoit<\/a> demonstrated that critical utility infrastructure is not only vulnerable to attacks, but has already been targeted \u2013 with power grids and water plants being particularly vulnerable. Just recently, the BBC devoted an episode of their \u201cClick\u201d technology program to the same issue. Utilities may not be particularly exciting, but life without them would be very difficult indeed.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-837\" alt=\"Cyber Security\" src=\"http:\/\/andrewwheen.com\/wpress\/wp-content\/uploads\/2013\/09\/Cyber-Security-300x161.jpg\" width=\"741\" height=\"210\" \/><\/p>\n<p>Of course, utilities are fully aware of their responsibilities. However, there can sometimes be a focus on threats that have been a problem in the past rather than those that might be a problem in the future. Furthermore, disaster recovery plans are often based on the implicit assumption that damage is constrained to one system or one geographical area. The white paper challenges such comfortable assumptions.<\/p>\n<p>The tendency of technologies to build on other technologies means that the failure of something like the electricity grid or the GPS system can create a domino effect that spreads far beyond the original problem. It was the failure to recognise systemic risks in a highly-interconnected system that led directly to the financial crisis of 2008. As was the case with the banks in 2008, many disaster recovery plans are likely to be of little or no value when confronted with new or unusual threats &#8211; such as those discussed in the <a title=\"Unconventional Threats White Paper\" href=\"http:\/\/www.ict.mottmac.com\/innovationblog\/\" target=\"_blank\">white paper<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I recently published a white paper describing some unconventional threats to utility infrastructure. In addition to rather unusual (but potentially devastating) threats such as coronal mass ejections from the sun, electromagnetic pulses and space debris, the paper also talks about &hellip; <a href=\"https:\/\/andrewwheen.com\/index.php\/2013\/09\/13\/time-for-unconventional-thinking\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[96],"tags":[130,129,14,128,16,15,127,21],"class_list":["post-832","post","type-post","status-publish","format-standard","hentry","category-telecom-ramblings","tag-cyber-terrorism","tag-cyber-warfare","tag-dot-dash-to-dot-com","tag-infrastructure","tag-internet","tag-telecoms","tag-utility","tag-world-wide-web"],"_links":{"self":[{"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/posts\/832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/comments?post=832"}],"version-history":[{"count":9,"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/posts\/832\/revisions"}],"predecessor-version":[{"id":843,"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/posts\/832\/revisions\/843"}],"wp:attachment":[{"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/media?parent=832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/categories?post=832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/andrewwheen.com\/index.php\/wp-json\/wp\/v2\/tags?post=832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}