Securing the Cyber City of the Future: Our Urban Infrastructure Is Now under Constant Threat of Cyberattack and a Growing Range of Disasters-Both Natural and Man-Made. Our Privacy Is under Threat from Overzealous Response. Real Places and City Services Are Vulnerable to Hackers, but We Can Protect Our Water, Power, Transportation, and Other Vital Systems

By Singh, Indu B.; Pelton, Joseph N. | The Futurist, November-December 2013 | Go to article overview
Save to active project

Securing the Cyber City of the Future: Our Urban Infrastructure Is Now under Constant Threat of Cyberattack and a Growing Range of Disasters-Both Natural and Man-Made. Our Privacy Is under Threat from Overzealous Response. Real Places and City Services Are Vulnerable to Hackers, but We Can Protect Our Water, Power, Transportation, and Other Vital Systems


Singh, Indu B., Pelton, Joseph N., The Futurist


On October 11, 2012, on board the USS Intrepid aircraft carrier, then--Secretary of Defense Leon Panetta warned Americans that the nation faces the prospect of a "cyber Pearl Harbor"--an attack that could come with devastating losses.

"An aggressor nation or extremist group could use ... cyber tools to gain control of critical switches to ... derail passenger trains or--even more dangerous--derail passenger trains loaded with lethal chemicals. They could contaminate the water supply in major cities or shut down the power grid across large parts of the country," he said, pulling no punches. Panetta's challenge to Congress was primarily aimed at passage of new legislation to impose new cyber-security standards, but a number of experts confirmed his warnings to be far from hyperbole.

We think of cyberterrorism as a threat that affects only national governments or perhaps large corporations--a problem of "zeroes and ones" of concern only to IT departments--not as something that could affect the neighborhoods where we live and work. A wide range of databases and command centers control smart electrical grids, water purification and sewage processing plants, and nuclear power plant cooling systems. Unless these critical systems are sealed off from electronic networks, they are all vulnerable to cyberattack.

UNSEEN VULNERABILITIES

One of the biggest cyber vulnerabilities to urban infrastructure comes from the many supervisory control and data acquisition (SCADA) systems that play a critical role in infrastructure functioning around the world. These systems are used almost ubiquitously to control pipeline flows and to command power substations and electrical power flow through the grid. SCADA even performs such mundane tasks as traffic-signal timing.

Many SCADA systems operate with their original security codes, unchanged from those created by the manufacturer, and thus can be wirelessly controlled by a hacker to do pranks--or much, much worse. Recently in a mid-sized city in the United States, when a citizen advisory group asked for a review of the security on all the SCADA systems, it was found that the systems that controlled the flow of water and sewers and the timing of traffic lights were all operated via wireless SCADA equipment with rudimentary security in place.

These systems were operated by different divisions of the local government, with no independent oversight or security review. Today, all of the SCADA systems in that city are re-equipped with sophisticated new security codes. An independent consultant, under the supervision of a single technology-savvy agency, reviews security on new and existing SCADA systems. The problem is that numerous other cities have not yet conducted this type of security review.

The striking point of this particular case study is that the city in question is one of the most educated communities in America and has even dealt with terrorist attacks. Its advisory commissions are loaded with PhDs and experts with many years of industry expertise. If any city administrators should have had the know-how to avoid these problems, it should have been these!

There are a number of security-review services that focus almost exclusively on SCADA systems that control power substations, oil, gas, sewer and water pipeline flows, traffic signals, and even operations within large factories, power plants, and military bases. In some cases, these ubiquitous systems still lack rigorous security oversight. When Secretary Panetta issued his warning about the United States being potentially vulnerable to cyberattack, he had these systems in mind.

The good news is that this is a cyberthreat that can be fixed. It's important for city officials to inventory all of the SCADA systems within their city and ensure that they are protected. Their security codes should be routinely updated, and the entire SCADA networks for the city should be independently reviewed by a third-party security auditor at least every two years.

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
Loading One moment ...
Project items
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited article

Securing the Cyber City of the Future: Our Urban Infrastructure Is Now under Constant Threat of Cyberattack and a Growing Range of Disasters-Both Natural and Man-Made. Our Privacy Is under Threat from Overzealous Response. Real Places and City Services Are Vulnerable to Hackers, but We Can Protect Our Water, Power, Transportation, and Other Vital Systems
Settings

Settings

Typeface
Text size Smaller Larger
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

While we understand printed pages are helpful to our users, this limitation is necessary to help protect our publishers' copyrighted material and prevent its unlawful distribution. We are sorry for any inconvenience.
Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.

Are you sure you want to delete this highlight?