{"id":2869,"date":"2006-05-15T17:02:28","date_gmt":"2006-05-15T21:02:28","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/dbnews\/2006\/05\/15\/devestating-scada-attack-could-cripple"},"modified":"2006-05-15T17:02:28","modified_gmt":"2006-05-15T21:02:28","slug":"devestating-scada-attack-could-cripple-usa","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/2006\/05\/15\/devestating-scada-attack-could-cripple-usa\/","title":{"rendered":"Devestating SCADA Attack Could Cripple USA"},"content":{"rendered":"<p><a name='a8447'><\/a><\/p>\n<table width=\"537\" border=\"0\">\n<tr>\n<td>\n<p align=\"justify\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/cyber.law.harvard.edu\/blogs\/static\/dowbrigade\/jbaue.jpg\" width=\"331\" height=\"341\" align=\"left\">WASHINGTON &#8212; Attacks on US computer networks could<br \/>\n        escalate from mere inconveniences to disasters that ruin companies or<br \/>\n        even kill people, according to the head of a cyber-security unit working<br \/>\n        with the government.<\/p>\n<p>      Scott Borg, director of the Cyber Consequences Unit, or CCU, a Department<br \/>\n      of Homeland Security advisory group, said increasing intelligence &#8221;chatter&quot; was<br \/>\n      pointing to possible criminal or terrorist schemes to destroy physical<br \/>\n      infrastructure, such as power grids.<\/p>\n<p>      The CCU is considering how to prevent attacks beyond ubiquitous e-mail<br \/>\n      hoaxes or computer viruses, with concerns rising about plots to cause power<br \/>\n      blackouts, tamper with pharmaceutical products, or reprogram machinery<br \/>\n      to build dangerously defective products.<\/p>\n<p align=\"justify\">Attractive targets include vital &#8221;supervisory control<br \/>\n        and data acquisition&quot; systems, like those in a power plant that<br \/>\n        open and close valves or adjust temperature and pressure.<\/p>\n<p>        &#8221;Chatter on SCADA attacks is increasing,&quot; Borg said, referring<br \/>\n        to patterns of behavior his unit has observed suggesting that criminal<br \/>\n        gangs and militant groups like al Qaeda are becoming capable of carrying<br \/>\n        out such attacks.<\/p>\n<p>        Borg&#8217;s CCU, a small independent unit funded by Homeland Security, spends<br \/>\n        its time trying to imagine how technology could be used to cripple the<br \/>\n      United States.<\/p>\n<p align=\"justify\"><em>Wait a sec! Isn&#8217;t CCU Jack Bauer&#8217;s outfit! With Jack<br \/>\n        on the case we are sure this cyber-threat thing can be cleared up in<br \/>\n        a day or two. Three at the most. Althoough everything seems to have gone<br \/>\n        to hell since President Palmer was assassinated&#8230;..<\/em><\/p>\n<p align=\"justify\">from <a href=\"http:\/\/www.boston.com\/business\/technology\/articles\/2006\/05\/15\/cyber_attacks_could_be_devastating_expert_says\/\">Reuters<\/a><\/p>\n<\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>WASHINGTON &#8212; Attacks on US computer networks could escalate from mere inconveniences to disasters that ruin companies or even kill people, according to the head of a cyber-security unit working with the government. Scott Borg, director of the Cyber Consequences &hellip; <a href=\"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/2006\/05\/15\/devestating-scada-attack-could-cripple-usa\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":299,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[142],"tags":[],"class_list":["post-2869","post","type-post","status-publish","format-standard","hentry","category-technology"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/posts\/2869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/users\/299"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/comments?post=2869"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/posts\/2869\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/media?parent=2869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/categories?post=2869"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/tags?post=2869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}