:::: The *”Internet of Dangerous Things” ::::
The misconception is that the internet is just the information we access. The internet represents the whole collection of devices that makes up the whole internet realm. Such devices include routers, switches, servers, as well as all Internet Service Providers (ISP’s), and can even be argued to include cell phones that have connectivity, and quite possibly even end-user devices such as media players (Roku, AppleTV’s, etc). The internet is not simply what you access. It is also how you access it and from what device you access it.
Think of all the devices that connect to the internet in your home and start listing them.
- internet router
- laptop / desktop
- web streaming devices like Roku, Apple TV
- smart tv’s
- cell phones with wireless connection, iPods, internet radio devices
- wireless printer/copier
One has to first recognize that the internet is under constant development. New devices are coming on the market all the time. Every device is, or should be, built to standards. These standards include things like hardware standards, security measures, encryption, to keep the device somewhat secure.
3. What are botnets?
4. How big is this problem and how big are these botnets?
:::: Cyber Attack Research :::
5. Have there been recent warnings with regard to cyber security?
The articles below are from dates prior to Krebs recognition regarding the massive problem of device security.
:: USA Today :: Power Grid Vulnerable to Terrorist Attack
:: NY Times :: Power Grid Attacked in Arkansas
:: Fox News :: Digital Sniping Attack on Power Grid
Date: 02/06/2014 in reference to attack on 04/16/2013
:: University of California at Riverside :: Research on Internet-based Attacks on Smart Grid
:: Bloomberg :: Banks and Utilities as Targets of Syrian Attacks
:: Federation of American Scientists :: Physical Security of Grid
:: Fox News :: Reported on “cyber caliphate” prior to Twitter attacks on CentCom
:: Krebs on Security :: Home Routers Used in Recent Attacks
:: Hollywood Reporter :: Google’s Eric Schmidt, “The Internet will disappear…” (an article about how we are incredibly reliant on the Internet)
:::: Cyber Attacks and America ::::
6. Can cyber attacks ever be good for the American people?
I believe there is a mixed answer to this question. There are two fantastic examples of attacks are likely government prompted that probably have our safety in mind. One is Stuxnet, the other, Regin (pronounced: “region” according to Symantec).
If both of these can be attributed to the US government, then we see the role of government stepping between the user and the global internet. I’m undecided what I think about that.
Additionally, in the most recent Snowden releases, we see evidence that the US government further has a network that can intercept attacks and divert the traffic if necessary. It sure seems like great technology, but what happens if/when you can’t trust your government. It seems like they have total control.
7. What are Stuxnet and Regin?
Both Stuxnet and Regin are sophisticated. Stuxnet was used to spin the Iranian centrifuges, used to refine natural Uranium into weapons grade Uranium, out of control and destroy them. One can easily argue that Stuxnet was an incredible success. Stuxnet was likely a cooperative effort between the US and Israel, though neither take credit for the attack.
Though Stuxnet can be pegged as a success, Regin may fall more into a gray area. Regin is part of a massive digital infiltration. Regin is multi-purpose. One purpose is to gather access usernames and passwords to infrastructure. Yet, other purposes are also hidden. The code seems very smart. Those on the control end of the code can use various triggers to make the code do certain things, such as control the computer.
Regin infections are represented here:
:: Wired Magazine :: Stuxnet
:: Symantec :: Regin
:::: Cyber Warfare Damage ::::
8. What damage can cyber-warfare inflict?
In recent news, we know that cyber warfare can bring a company like Sony to its knees. The Sony attack prevented freedom of speech as Sony pulled a movie from the theaters (even though they performed an internet release of the movie).
But, this is just a small example. Krebs (in Spam Nation) discusses how companies use attacks to control companies and their interests on a much larger scale.
From the information you have seen here, do you think it is likely that cyber warfare could be used to…
- take down a bank?
- take down a power plant?
- take down an ISP (Internet Service Provider)?
- take down telecoms infrastructure?
- to gather personal information for identification purposes?
- control or change information on the internet?
Recently, Detroit had a power outage due to a faulty line. The outage had a huge impact on all emergency services (police, fire, etc), the hospital, and buildings were shut down. It was chaos for the few hours when the outage was at its peak. Just imagine the chaos that would be caused by a larger outage.
:::: What Can You Do Against a Cyber Attack? ::::
“Hope for the best, plan for the worst.” – Lee Child
Despite picking up books to help you plan for a disaster, you will unlikely know if you even have what it takes until a disaster hits. Most will pick up books, read them once or twice, and maybe even make a few adjustments to the way they live, but I fear that few people are truly prepared for a disaster. Books often bring subjects to consider, but too often, we don’t make hard decisions until we are forced to.
:::: Decide, then Do. ::::
9. So, how can someone become better prepared?
1. Decide, then Do Change Your Mindset:
You must determine that you are more intelligent than the “infrastructure,” whatever “infrastructure” means to you. Infrastructure could be cellular service, internet, power, transportation, access to health services, or anything else you cannot provide for yourself.
Until you begin changing your mindset, you will do nothing else. You won’t really change.
2. Decide, then Do Prioritize:
Step 1: Make a list of the services/items or items you rely on.
Step 2: Immediately scratch off the items you can do without in an emergency.
Step 3: Prioritize the remaining items in order. Pick the biggest, mark it with a one. Then, the next biggest with a two… and so on.
Some items from your list may include things like… grocery store, fuel, heat/lights, money, communication, internet, healthcare, clothes, job/work or trade.
3. Decide, then Do Learn:
Start with items one, two, and three on your list. You will learn about these three areas first. As you begin to develop confidence in a particular area, move on down the list until you’ve learned basics of many different topics. Ask yourself, “What do I need to do to replace this item on my list?” For example, for grocery store, you should be thinking what hunting/fishing/trapping/foraging/gardening skills and techniques can I learn to help provide for me and my family? Another example is healthcare. Ask yourself, “Do I understand the basics of First Aid?”
I am runner. I have run a few marathons, as well as races from 5k to 25k. What I discovered is that I would not truly be motivated to train for a race until I had registered for the race. In like fashion, get registered for some training. Get registered for a First Aid class. Get registered for a hunter safety class. That could be the start of some great motivation.
4. Decide, then Do Collaborate:
Finding like-minded people can sometimes be a challenge. Take advantage of the situation. For example, if the power goes out in your workplace, start asking your co-workers what they would do if the power went out for the rest of the day, the rest of the week, and what if it went out for a month. If you feel and earthquake tremor, start asking your friends if they have a plan for a earthquake. Next time you get a big storm, ask your friends or co-workers if they have enough food. Their answers may surprise you and you may find some like-minded individuals closer than you think.
Other ideas may be to find a good “prepper” book that you can do without and pass it to a friend or co-worker. If they pass it back with a cross look, then pass it on to someone else.
The point is that collaboration is up to you. Don’t rely on someone else to make it happen.
5. Decide, then Do Plan:
As you start picking up new knowledge and making new “prepper” friends, plan for various emergencies. Pick the biggest threats and plan for them. If you live in a harsh whether environment, plan for that weather. It could be hurricanes, harsh winter storms, etc. If you live in an earthquake zone, plan for earthquakes.
6. Decide, then Do Practice:
Put your plan into action. Of course, you need to note the things that worked and change the things that did not work. Go back to your plan and make whatever revisions need to be made.
TO FIND OUT ABOUT SECURE EMAIL ACCESS, PLEASE CLICK HERE