{"id":12543,"date":"2015-06-13T16:11:10","date_gmt":"2015-06-13T16:11:10","guid":{"rendered":"http:\/\/rafaelfajardo.com\/portfolio\/basic-parts-of-our-infrastructure-are-vulnerable\/"},"modified":"2015-06-13T16:11:10","modified_gmt":"2015-06-13T16:11:10","slug":"basic-parts-of-our-infrastructure-are-vulnerable","status":"publish","type":"post","link":"https:\/\/rafaelfajardo.com\/portfolio\/basic-parts-of-our-infrastructure-are-vulnerable\/","title":{"rendered":"Basic parts of our infrastructure are vulnerable to hacking"},"content":{"rendered":"<p><a href=\"http:\/\/stoweboyd.com\/post\/121351932087\/basic-parts-of-our-infrastructure-are-vulnerable\" class=\"tumblr_blog\">stoweboyd<\/a>:<\/p>\n<blockquote id=\"geom_inter_5_1434211857499_26\"><p><b>Concerns about cybersecurity are rising, but most people think about hackers stealing credit card data from corporate databases, while it may be just as critical to worry about services we take for granted, like the electric grid or air traffic control.<\/b><\/p>\n<hr>\n<p>The Internet of Things (IoT) is bringing a new awareness of security vulnerabilities into broad daylight. And this isn\u2019t being driven by new technologies rolling out \u2013 like s<a href=\"http:\/\/www.csmonitor.com\/Technology\/2015\/0610\/How-a-new-smart-oven-will-do-your-cooking-for-you-perfectly\">martphone-controlled ovens<\/a>\u00a0\u2013 but mostly by researchers demonstrating how public infrastructure is dangerously insecure.<\/p>\n<p>Consider our traffic light infrastructure, providing vital services in every city and town across the country and most of the world. Researchers, like Cesar Cerrudo of IOActive Labs, have demonstrated that these systems can be hacked. Cerrudo flew to Washington DC last year and found he could break into the capital\u2019s traffic system, and change red lights to green: he could have,\u00a0\u2018paralyzed emergency responders,\u2019 as Nicole Perlroth <a href=\"http:\/\/bits.blogs.nytimes.com\/2015\/06\/10\/traffic-hacking-caution-light-is-on\/?ref=todayspaper\">put it in the New York Times<\/a>.<\/p>\n<p>When he approached the company that designed the traffic sensors involved, he was ignored. Apparently the traffic on the sensor network is unencrypted. Cerrado said in <a href=\"http:\/\/securityaffairs.co\/wordpress\/37757\/hacking\/hacking-traffic-lights-2.html\">a recent interview<\/a>,\u00a0<\/p>\n<blockquote>\n<p>What I found is that cities are filled with security problems that could have a very direct and physical impact on our lives.<\/p>\n<\/blockquote>\n<p id=\"geom_inter_3_1434211857498_19\">Yes, it does sound like a Hollywood movie, like the <i>Italian Job<\/i> or <i>Live Free or Die Hard<\/i>, but Cerrado and others researchers have shown it\u2019s not special effects. A team from the University of Michigan led by J. Alex Halderman <a href=\"http:\/\/www.technologyreview.com\/news\/530216\/researchers-hack-into-michigans-traffic-lights\/\">found<\/a> three major weaknesses in the traffic infrastructure:<\/p>\n<ol>\n<li>Unencrypted traffic<\/li>\n<li id=\"geom_inter_4_1434211857498_15\">the use of default passwords and user names<\/li>\n<li>a debugging port too easily attacked.<\/li>\n<\/ol>\n<p id=\"geom_inter_6_1434211857499_28\">Traffic systems are designed for the convenience to traffic engineers, rather than public safety. For example, once tapped in to any point of entry, the entire system can be accessed, in many cases.<\/p>\n<p>Concerns about cybersecurity are rising, but most people think about hackers stealing credit card data from corporate databases, while it may be just as critical to worry about services we take for granted, like the electric grid or air traffic control.<\/p>\n<hr>\n<p><b>I\u2019m not writing about someday-in-the-future drones or the 2020 smart home: these are relatively pedestrian networked systems in place today, that we all rely on.<\/b><\/p>\n<hr>\n<p>Another disturbing bit of research along these lines appeared this month, when security researcher Billy Rios <a href=\"http:\/\/www.wired.com\/2015\/06\/hackers-can-send-fatal-doses-hospital-drug-pumps\/\">discovered<\/a> that a popular drug infusion pump has vulnerabilities that would allow a hacker to remotely monitor and change the dosage of drugs being administered to patients in hospitals.<\/p>\n<p>As Cory Doctorow <a href=\"http:\/\/boingboing.net\/2015\/06\/08\/internet-connected-hospital-dr.html\">summarizes<\/a> at BoingBoing,<\/p>\n<blockquote>\n<p>The companies whose products Rios analyzed are in denial about their mistakes. Hospira, who have at least 325,000 vulnerable Plum A+ models in hospitals worldwide (and unknown numbers of other vulnerable models), insist that they are invulnerable because the devices\u2019 communications modules are physically isolated from the pumps\u2019 circuitry. But although these two functions are separated on two physical boards, these boards are connected by a serial cable that allows them to talk to each other, and the pumps do not validate the firmware their receive from the communications modules.<\/p>\n<\/blockquote>\n<p>So, a hacker would only need access to the hospital\u2019s network, which is likely to be connected to the Internet, and boom! All the pumps are shut off.<\/p>\n<p>I feel like I am drafting the screenplay of a dystopian sci fi novel, but I\u2019m not. (Or should I be?)\u00a0<\/p>\n<p>These are just the most recent examples of the findings of researchers who are probing the <i><b>existing<\/b><\/i> infrastructure that our world runs on. I\u2019m not writing about someday-in-the-future drones or the 2020 smart home: these are relatively pedestrian networked systems in place today, that we all rely on. And they\u2019re as full of holes as Swiss cheese.<\/p>\n<hr>\n<p><i>This post was written as part of the <a href=\"http:\/\/goo.gl\/gn2A8\">IBM for Midsize Business<\/a> program, which provides midsize businesses with the tools, expertise and solutions they need to become engines of a smarter planet. I\u2019ve been compensated to contribute to this program, but the opinions expressed in this post are my own and don\u2019t necessarily represent IBM\u2019s positions, strategies or opinions.<\/i><\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>stoweboyd: Concerns about cybersecurity are rising, but most people think about hackers stealing credit card data from corporate databases, while it may be just as critical to worry about services we take for granted, like the electric grid or air traffic control. The Internet of Things (IoT) is bringing a new awareness of security vulnerabilities [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[10],"tags":[],"class_list":["post-12543","post","type-post","status-publish","format-standard","hentry","category-words"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p6PWot-3gj","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/posts\/12543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/comments?post=12543"}],"version-history":[{"count":0,"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/posts\/12543\/revisions"}],"wp:attachment":[{"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/media?parent=12543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/categories?post=12543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/tags?post=12543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}