Government Technology

Internet Takedown


June 3, 2004 By

As the nation relies more on the Internet to conduct vital business and government functions, it increasingly puts them at risk by banking on a system that grows more vulnerable to disruption.

Though right now the notion of a digital Pearl Harbor -- a malicious attack that cripples the Internet -- is merely a theory, an event such as the northeastern blackout in August 2003 demonstrates the real probabilities. The blackout, which cut off electricity to 50 million people in the Northeastern United States and Canada, resulted from one company's reliance on a computer that failed.

Similar incidents can be expected in the future. Experts warn that chances for disruption are increasing because of the Internet's growth and our reliance upon it for critical tasks, such as power grids, air traffic control and 911 services, to name a few. Add the Internet's openness and the prevalence of defect-laden software, and disruptions become all but inevitable in the face of so many threats.

"The problem with the Internet is we developed it so fast and furiously, and didn't take a step back and build it foundationally with security in mind," said Phyllis Schneck, chairwoman of the national board of directors for the FBI's InfraGard. "We're in the process of correcting that now, but everything done thus far has been a Band Aid."

In the short term, there is no real solution except to reduce the number and severity of interruptions. "I'm of the school that says something is going to happen," said John McCarthy, executive director of the Critical Infrastructure Protection Project at the George Mason School of Law. "You're not going to stop everything."

Threats range from electrical sabotage by terrorists, to accidental cutting of cables by construction crews, to perhaps the most likely culprit, a virus. Nearly 80 percent of e-mails businesses receive are spam, according to Schneck. "Every piece of electronic content I intended to send and you didn't intend to receive is a potential attack."

Walter Tong, senior information security adviser for the Georgia Technology Authority (GTA) sees hackers as the biggest near-term threat. "That's what's on my mind. It can get scary."

What's scary is the potential for a hacker to exploit the Internet's vulnerabilities and cause a major disruption. Those vulnerabilities might not be yours; they could be your neighbor's, but everyone is at risk.

"We're all virtual now, so it doesn't matter," Tong said. "I could have a super-duper security policy and my technologies lined up to it supertight so nobody can get in, but if I have connectivity to somebody who's not [protected], that's my vulnerability."

It's easy for hackers to find holes in software because it's so defective, said Watts Humphrey, a fellow at the Carnegie Mellon University Software Engineering Institute.

"We've got basically terrible practices today being practiced by software developers, even software researchers," he said, adding that even good quality software has plenty of defects and can create havoc like in the Northeast blackout.

In that instance, Ohio-based FirstEnergy Corp. neglected to trim trees that encroached over power lines, which started the chain of events that led to the blackout. A software bug, however, was responsible for the alarm system's failure to alert FirstEnergy to the problem until it was too late.

The chaos that followed included darkness for 50 million people in seven states and parts of Canada. At least 10 major airports and nine nuclear plants were shut down; thousands of people were stranded on subways; hospitals, prisons and emergency service providers had to switch to generators; ATMs stopped working; and the Mets game was canceled.

Some have warned that the Northeast blackout could serve as a blueprint for a hacker wanting to disable an infrastructure.

Internet Nodes Vulnerable

Systems fail because


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Improving Emergency Response with Digital Communications
Saginaw County, Mich., increases interoperability, communication and collaboration with a digital voice and data network, as well as modern computer-aided dispatch.
Reduce Talk Time in Your Support Center by 40%
As the amount of information available to citizens and employees grows each year, so do customer expectations for efficient service. Contextual Knowledge makes information easy to find, dropping resolution times and skyrocketing satisfaction.
Emerging Technology Adoption in Local Government
In a recent survey conducted by Government Technology, 125 local government leaders shared their challenges, benefits and priorities when adopting emerging technologies such as cloud, mobility and IP. Read how your jurisdiction’s adoption of technology compares to your peers.
View All

Featured Papers