Information Warfare: July 17, 2002

Archives

A classic Information War vulnerability are the three million SCADA (Supervisory Control and Data Acquisition) systems installed around the world. Over the last three decades, SCADA use has become more popular, as it is a cheaper and more effective way to monitor and control power, water, agricultural, sewage treatment and industrial systems. Al Qaeda computers have been captured containing research on SCADA systems. What makes SCADA vulnerable to al Qaeda attack is the increasing use of wireless transmission of data between sensors and control systems, as well as using the Internet for moving information and commands. Nearly all SCADA data is not encrypted, and any one using the right, off-the-shelf, equipment can intercept SCADA and manipulate the systems. On the plus side, there are a lot of different SCADA system types out there, and you need people with some SCADA experience to figure out how to manipulate the systems to destructive ends. In addition, there are not a lot of programmers and SCADA engineers among the al Qaeda faithful. But the potential is there, and it's well to remember that a few years ago no al Qaeda members knew how to fly a jet airliner. 

 

X

ad

Help Keep Us From Drying Up

We need your help! Our subscription base has slowly been dwindling.

Each month we count on your contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage.
Subscribe   Contribute   Close