Just how reliant are we on computing infrastructure? Sometimes it takes just a little outage to get a taste of the interwoven dependency we don’t readily see.
Lines of Travelers
It can be small. The international travelers landing in U.S. airports on January 3rd, one of the busiest travel days of the year, found themselves stuck in long lines due to a temporary outage with the customs processing system. Mobs of disgruntled holiday travelers waited for the issue to clear up. Airports across the country reported delays from half an hour to over two hours.
The technical issue, not attributed to a cyber attack, impacted the travel of over 30 flights into Miami International. In Atlanta, at the biggest airport in the world, Hartsfield-Jackson was impacted for 90 minutes.
Even the most mundane things, like crossing a border, can be impacted when technology goes awry. Modern day systems are built for efficiency therefore have deeper dependencies on upstream components. Like dominoes, when one thing breaks, the ecosystem is not built to absorb the loss and instead comes to a grinding halt. This creates a backup and like ripples in a pond have far reaching consequences.
Social without Internet
In October 2016, simple devices connected to the Internet were recruited by attackers to form a botnet and collectively sent network traffic to Dyn, a Domain Name System (DNS), internet service company, which resulted in significant blackouts and slowness to major Internet sites like Twitter, Spotify, Reddit, the New York Times, Wired, Github, Etsy, and many others. It became a stinging Distributed Denial of Service (DDoS) attack the likes we have not seen in years.
DDoS attacks are not new. They have been around for many years. Technology infrastructure and security services have evolved to protect against such attacks, making them largely ineffective. Until recently that is. When instead of big powerful systems trying to cause damage, attackers shifted tactics and approached it like a colony of ants. Home routers, DVD players, consumer internet cameras, and a host of other small IoT devices were harvested like crops and their collective power was pointed at targets. The impact was unprecedented. A number of such attacks, starting in the back half of 2016, continue to pose a risk to online properties. Dyn was just one simple target. What happens if such attacks are made against critical systems?
Dominion Over Electricity
Ukraine has already suffered two separate power outages attributed to hackers, the latest in mid December, which affected regions around its capital. Customers were without power for over an hour, as personnel had to manually switch equipment to restore electricity. The attack was largely seen as sending a message, rather than trying to cripple a nation.
President Obama, in his final press conference of 2016, stated the U.S. is more vulnerable than other potential adversaries
"Our economy is more digitized, it's more vulnerable, partly because we're a wealthier nation, and we're more wired than other nations" – Obama 2016
Former FBI agent Austin Berglas stated:
"A three-pronged attack against our power grid, transportation, and financial systems would be devastating and potentially viewed as a terrorist attack against the United States".
Aggregate at Risk
The United States operates at an extremely high pace with huge efficiencies. We are a modern nation and have crafted our world to move at a dizzying pace where unimaginable systems work together like cogs to turn the engine of our everyday lives. The very foundations of which are now becoming more dependent on computers, data, and the Internet. Our transportation, power, financial systems, healthcare, emergency services, fuel infrastructure, communication networks, food distribution networks, and government services are all reliant in some way on digital technology that can be targeted by attackers.
Much like the butterfly-effect, situations in one small system may cascade to cause catastrophic impacts elsewhere. Who could have imagined that home cameras and DVR’s left with default passwords, by apathetic consumers, would be the engine used take down huge chunks of the Internet? Yet it did. Sadly, those were not even the nation-state level threats. They were likely just curious hackers looking to experiment with what they ‘could do’. The big players have much more powerful tools in the tool-box, which are designed for greater impact over a longer period of time.
As we go into 2017, entranced with the glistening of new technology, we must also understand there is a risk that accompanies it, which aggregates and compounds over time. Cybersecurity must play a part in the foundations of every step forward we make.
For more such intel Modern Code and tools from Intel, please visit the Intel® Modern Code
Other Popular Deals
- Top 10 Android launchers (December 2016)The 10 best job hunting apps on Android
- The 10 scariest horror games on AndroidAndroid app stores: 5 best alternatives to Google Play Store
- Best Android apps for rooted devices18 apps for a memorable Valentine's Day
- Top 15 Android games that you should playThe 20 best looking games for mobile phones
- 8 Android apps to tickle your funny bone17 must have apps for any Android device (plus alternatives)
- 5 apps to get the Android Lollipop look on your smartphoneTake control of your Android device with these apps
- 7 weird and strange apps for your Smartphone10 neat Google apps you may not know of
- 10 essential Indian apps for Android devicesPerfect Viewer