Open Menu Close Menu

SCADA Security and the "Most Monumental Non-Nuclear Explosion and Fire"

You probably have to be of a certain age to remember that the Internet itself came about as a U.S. defense project to create a distributed information network that would still function even if parts of it were destroyed. Let me brag that I have in fact *heard* of SCADA before, but temper that by saying that I knew little of it and appreciate frequent guest-commentator J'e St Sauver asking us, this week, to think about this other aspect of national security that apparently hasn't kept up with the Internet.
-----------


SCADA Security and the "Most Monumental Non-Nuclear Explosion and Fire"

By J'e St Sauver
University of Oregon Computing Center

Like Cliff Claven (the jovial factoid-sharing postal carrier of the syndicated television comedy, "Cheers"), I'm easily enthralled by trivia. For example, I bet you didn't know that Hells Canyon, location in remote northeastern Oregon, is North America's deepest river gorge, did you? Well, it is... see: http://www.fs.fed.us/hellscanyon/overview/index.shtml

Now that you know my attraction to trivia, you can imagine my reaction when I came across news reports of a Siberian explosion in 1982, an explosion that was said to have been the "most monumental non-nuclear explosion and fire ever seen from space." This incident was first disclosed by Thomas Reed, Ronald Reagan's Secretary of the Air Force, in his new book, At the Abyss: An Insider's History of the Cold War (Presidio Press, March 2004, ISBN 0891418210).

According to published reports, (see http://www.washingtonpost.com/ac2/wp-dyn?pagename=article&node=&contentId=A10432-2004Feb26—Found=true ) the United States arranged for the Soviets to receive intentionally flawed process control software for use in conjunction with the USSR's natural gas pipelines. Reed stated that "The pipeline software that was to run the pumps, turbines, and values was programmed to go haywire, after a decent interval, to reset pump speeds and valve settings to produce pressures far beyond those acceptable to pipeline joints and welds." The result? A three-kiloton blast in a remote area of Siberia in 1982, which, only by some miracle, apparently didn't result in any deaths. (For context, the Halifax Fire Museum lists the massive 1917 Mont Blanc ship explosion in the Halifax Harbor at a force of 2.9 kilotons.)

As with any sort of covert operation, it is hard to know for sure what really happened, and what's disinformation. For example, a senior KGB veteran, Vasily Pchelintsev, has publicly stated that while a gas pipeline explosion did occur in 1982, it was the result of poor pipeline design and construction flaws, and was a minor incident that was rebuilt in "one day." (see the English language story at http://www.themoscowtimes.ru/stories/2004/03/18/014.html )

Regardless of whose version of the Siberian gasline explosion story you believe, by now you may be asking, "What d'es all this have to do with IT Trends?"

The answer is simple: While higher education IT managers have been worried about business system-related issues, such as viruses and worms infecting office computers or swamping networks and servers, there's a additional area of cyber security, a hugely important area of cybersecurity, that we've been ignoring, and that's SCADA security. (But if you're like most IT professionals, even most IT security professionals, you've never even heard the word "SCADA" till now.)

SCADA stands for "Supervisory Control and Data Acquisition," and consists of the software, devices, and networks that collectively control the world's power grids, gas pipelines, chemical plants, transportation systems, and other national critical infrastructure.

There's ample evidence that SCADA security is a hot area right now (no gas pipeline-fire-related puns intended); for example, note:

o The General Accounting Office has just released a 47-page report entitled "Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems," GAO-04-354 (http://www.gao.gov/cgi-bin/getrpt?GAO-04-354 ) this past March, which concluded that "The systems that monitor and control the sensitive processes and physical functions of the nation's critical infrastructures are at increasing risk from threats of cyber attacks" and that improving the security of control systems against cyberattack should be a "high priority."

o The Chairman of the House Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, Rep. Adam Putnam (R-FL) has been publicly quoted as saying that the lack of a national strategy to deal with SCADA system security makes the nation "undeniably vulnerable" to cyberterrorism, and that "Today's SCADA systems have been designed with little or no attention to computer security." (March 31, 2004: http://www.computerworld.com/securitytopics/security/story/0,10801,91790,00.html )

We understand that those Washington DC folks are talking about strategic national vulnerabilities, and that you might (perhaps appropriately) wonder whether those "big picture" vulnerabilities are really relevant to us in higher education, as opposed to powerline operators or refinery administrators sitting in some control room. I believe the answer is yes, if only for three reasons:

First, and perhaps most importantly, we should be teaching our students about SCADA security as part of our network security education efforts. There is much we need to learn collectively about SCADA, and while SCADA systems are definitely "their own animal," there are still many lessons from enterprise network security that can be usefully ported to the SCADA arena.

Second, SCADA issues really are something that will be of direct local pragmatic relevance to each of us, if only because each of our campuses have SCADA-controlled and monitored local systems. (You may not know it, but trust me, they're out there).

Third, and perhaps most importantly, we, as opinion leaders, have a burden to shoulder: We need to put SCADA security on the national center stage. If we don't speak up and make sure that folks pay attention to SCADA-related issues, there will come a day when we will collectively wish we had.

I wish I could give you a SCADA tutorial in a single brief column, but I can't. What I can do is give you some starting points. Everyone, each and every one reading this, should review "21 Steps to Improve Cyber Security of SCADA Networks," an excellent and very approachable booklet written by the Department of Energy
( http://www.ea.d'e.gov/pdfs/21stepsbooklet.pdf ).

Assuming you want to go beyond that (and you should), the first thing you should know is that while many legacy SCADA systems were built around closed proprietary protocols, the modern trend is to use MODBUS (see http://www.modbus.org/) or FIELDBUS (http://www.fieldbus.org/), both comparatively simple open protocols, increasingly deployed over TCP/IP ethernet-based networks. To understand SCADA security, begin by understanding MODBUS and FIELDBUS.

As you do, you'll see that these are very simple protocols. Because security hasn't historically been a high priority, and because there's a very real fear that security measures may inadvertently result in a loss of positive control during a critical incident, what you'll see will remind you of where typical campus network security was five or ten years ago. (For example, end-to-end encryption is still exceedingly rare in the MODBUS and FIELDBUS world, and MODBUS-aware firewalls, except for the open source MODBUS firewall at http://modbusfw.sourceforge.net/ , are still equally scarce).

Or consider a couple of items from GAO-04-354 (pp. 18):

"…existing security technologies, as well as strong user authentication and patch management practices, are generally not implemented in control systems because control systems usually have limited processing capabilities, operate in real time, and are typically not designed with cybersecurity in mind…"

and

"…complex passwords and other strong password practices are not always used to prevent unauthorized access to control systems, in part because this could hinder a rapid response to safety procedures during an emergency. As a result, according to experts, weak passwords that are easy to guess, shared, and infrequently changed are reportedly common in control systems, including the use of default passwords or even no passwords at all…"

Not very reassuring, is it? We cannot let our critical infrastructure be deployed this way. If you wouldn't let the PCs your campus uses for word processing get deployed with that sort of security, we cannot as a nation run our critical SCADA cyberinfrastructure that way either. We need to harden our SCADA systems now, unless we want to face an "abyss" that would make Hells Canyon look like a crack in the sidewalk.

J'e St Sauver, Ph.D. (j'[email protected]) is the director of user services and network applications at the University of Oregon Computing Center.


----------------------------

This sounds like one more call for IT managers to make sure they're in regular communication with the folks who maintain that other infrastructure, you know, the physical infrastructure. There are a lot of places where the information infrastructure and the physical infrastructure meet, and it sounds like SCADA-type issues might arise there. Thanks, J'e.

comments powered by Disqus