EEE会議(北米大停電とコンピュータ・ウィルス)..............................................2003.8.28
北米大停電の原因調査の過程で判明したことの1つは、米国の送電網がコンピュー
ター・ウィルスの攻撃に弱く、もっと安全保障対策を強化する必要があるということ
だそうです。例えばオハイオ州のDavis-Besse原発(圧力容器の上蓋の腐食事件など
問題原発として有名)でも今年初め、ウィルスにやられたが、たまたま運転停止中
だったので大事に至らなかったということで、今回の大停電も、こうしたコンピュー
ター・ウィルスの仕業である可能性を全く排除できない由。 詳しくは、New
Scientistsの最新号(8/27)の記事をどうぞ。
--KK
******************************************
Electricity
grids left wide open to hackers
27 August 03
The revelation that a
computer worm disabled a safety system in a US nuclear
power station in
January has led to fresh calls for security on electricity
grids to be
overhauled. Experts say much of the grid's critical
infrastructure is too
accessible to the virus-ridden public internet.
News of the safety flaw
came as teams investigating the North American
electricity blackout on 14
August said they still could not rule out
computer problems as a contributory
cause of the outage. Control system
experts warn that it is only a matter of
time before worms like MSBlaster or
Sobig.F - which uses spamming technology
to amplify its presence on the
net - cripple a power station or
grid.
When the Davis-Besse nuclear power plant in Ohio was hit by the
Slammer worm
earlier in 2003, the reactor happened to be offline. But the
worm disabled a
safety monitoring system for nearly five hours. "We are still
working
through the information to find out what happened," says a spokesman
for
Akron-based FirstEnergy, which owns the plant.
Some sources
suggest the worm may have entered the plant's network via a
connection to an
insecure network. But critical systems like power stations
should be cut off
from the outside world and the internet, says Joel Gordes,
a grid expert at
Environmental Energy Solutions in Riverton, Connecticut.
But this is not seen
as a practical option in today's cost-conscious and
highly competitive energy
market.
Integrate or isolate
It was cheaper to integrate
these systems than to isolate them, says Bill
Flynt, former director of the
US Army's Homeland Security Threats Office and
now with TRC Infrastructure
Security in Connecticut. "It was a different
security environment," he
says.
It is not just nuclear power stations we should be worried about,
says Joe
Weiss, a control systems expert with KEMA Consulting of Fairfax,
Virginia.
Weiss is concerned that although the PC-based software used by
operators to
monitor power stations and transmission lines is usually
protected by
firewalls, the real-time control electronics that they oversee
is not. "The
technology currently does not exist to protect them," he
says.
These real-time systems tend to be embedded in non-PC based
customised
electronics in power plants and substations, but their behaviour
can be
affected because at some points PCs are used to switch them on and off
-
with potentially disastrous consequences for the grid.
"So far we've
been lucky," says Weiss. "These embedded systems were designed
to be open to
easy, remote access." This was appropriate before the rise of
the internet,
when grids operated on a dedicated, closed infrastructure -
but today this
level of openness poses a serious threat.
In June, the North American
Electric Reliability Council described how a
worm brought down another
network designed to allow operators to control
parts of the grid in remote
areas. Known as Supervisory Control and Data
Acquisition systems, or SCADAs,
these are heavily relied upon to keep grids
running round the
world.
"It's a genuine problem," says Flynt. "We have to redesign the
grid." Weiss
says he has tried raising awareness of the issue in Congress.
"We have spent
a very large amount of money to secure the internet and our
IT
infrastructure," says Weiss. "But there has been no money spent to
protect
[utility] control systems."
However, the US Department of
Energy is spending $114 million on a
large-scale mock-up of the US grid, in a
900-square-mile block of desert in
Idaho. The aim of its "SCADA Testbed"
project is to boost control-system
security.