Weaknesses in Industrial Cyber Security Described
The vulnerabilities of critical energy infrastructure installations to potential cyber attack are normally treated as restricted information and are exempt from public disclosure. But a recent Department of Energy report was able to openly catalog and describe the typical vulnerabilities of energy infrastructure facilities because it did not reveal the particular locations where they were discovered.
“Although information found in individual… vulnerability assessment reports is protected from disclosure, the security of the nation’s energy infrastructure as a whole can be improved by sharing information on common security problems,” the DOE report (pdf) said. “For this reason, vulnerability information was collected, analyzed, and organized to allow the most prevalent issues to be identified and mitigated by those responsible for individual systems without disclosing the identity of the associated… product.”
The specific vulnerabilities that were found are no big surprise — open ports, unsecure coding practices, and poor patch management. But by describing the issues in some detail, the new report may help to demystify the cyber security problem and to provide a common vocabulary for publicly addressing it. See “NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses,” Idaho National Laboratory, May 2010.
A lack of sustained federal funding, deteriorating research infrastructure and networks, restrictive immigration policies, and waning international collaboration are driving this erosion into a full-scale “American Brain Drain.”
With 2000 nuclear weapons on alert, far more powerful than the first bomb tested in the Jornada Del Muerto during the Trinity Test 80 years ago, our world has been fundamentally altered.
As the United States continues nuclear modernization on all legs of its nuclear triad through the creation of new variants of warheads, missiles, and delivery platforms, examining the effects of nuclear weapons production on the public is ever more pressing.
“The first rule of government transformation is: there are a lot of rules. And there should be-ish. But we don’t need to wait for permission to rewrite them. Let’s go fix and build some things and show how it’s done.”