Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-25 Thread Joel jaeggli
On 11/25/11 12:02 , Jay Hennigan wrote: > On 11/25/11 11:34 AM, Joel jaeggli wrote: > >> Cars generically cause at lot more deaths than faulty traffic >> controllers 13.2 per 100,000 population in the US annually. > > The cars don't (often) cause them. The drivers do. Yes, there are the > rare

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-25 Thread Jay Hennigan
On 11/25/11 11:34 AM, Joel jaeggli wrote: > Cars generically cause at lot more deaths than faulty traffic > controllers 13.2 per 100,000 population in the US annually. The cars don't (often) cause them. The drivers do. Yes, there are the rare mechanical failures but the most likely cause is wet

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-25 Thread Joel jaeggli
On 11/22/11 08:16 , Jay Ashworth wrote: > - Original Message - >> From: "Owen DeLong" > >> As in all cases, additional flexibility results in additional ability >> to make mistakes. Simple mechanical lockouts do not scale to the >> modern world. The benefits of these additional capabiliti

Re: First real-world SCADA attack in US

2011-11-23 Thread Michael Painter
Hal Murray wrote: Like any of the decades largest breaches this could have been avoided by following BCP's. In addition SCADA networks are easily protected via behavioral and signature based security technologies. Is there a BCP that covers security for SCADA? Note that Google for "BCP SCADA"

Re: First real-world SCADA attack in US

2011-11-23 Thread Hal Murray
> Like any of the decades largest breaches this could have been avoided by > following BCP's. In addition SCADA networks are easily protected via > behavioral and signature based security technologies. Is there a BCP that covers security for SCADA? Note that Google for "BCP SCADA" finds BS-

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-23 Thread Thomas Maufer
I have to jump in on this thread. Traffic light controllers are a fun category of technical artifacts. The weatherproof boxes that the relays used to live in have stayed the same size for decades, but now the controllers just take a teeny tiny circuit board rattling around in this comparativel

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-23 Thread Brett Frankenberger
On Wed, Nov 23, 2011 at 05:45:08PM -0500, Jay Ashworth wrote: > > Yeah. But at least that's stuff you have a hope of managing. "Firmware > underwent bit rot" is simply not visible -- unless there's, say, signature > tracing through the main controller. I can't speak to traffic light controller

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-23 Thread Jay Hennigan
On 11/23/11 3:38 PM, Jay Ashworth wrote: > Yes: but as Don Norman would ask: *where was the failure here*? You can't > blame all of it on the field tech, even though he had the Last Clear Chance > to avoid it, if the rest of the system wasn't designed to help protect him > (procedures, labeling,

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-23 Thread Jay Ashworth
Original Message - > From: "Jay Hennigan" > A somewhat inexperienced technician arrived on scene rebooted the > controller and it went back to factory defaults which are N/S vs. E/W. > Had the conflict monitor (a circuit board with a diode array, hardware - > not software) been correctly

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-23 Thread Jay Hennigan
On 11/23/11 2:52 PM, Jay Ashworth wrote: > Well, sure: what's the *incidence* of conflicting greens? > > I wasn't suggesting that the incidence of accidents would be any different > between conflicting greens and other types of failures (though my intuition > is that it would be higher), but that

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-23 Thread Jay Ashworth
- Original Message - > From: "Owen DeLong" > >> but that's not the only risk. When the traffic > >> signal is failing, even if it's failing with dark or red in every > >> direction, the intersection becomes more dangerous. Not as > >> dangerous as conflicting greens, >

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-23 Thread Jay Ashworth
> Within each intersection controller is a PC board with a diode matrix > called a "conflict monitor". It has inputs from all of the green and > yellow phases including pedestrian walk signals, turn arrows, etc. > > It's the job of the traffic engineer installing the system to program > the confli

Re: First real-world SCADA attack in US

2011-11-23 Thread Mike Andrews
On Tue, Nov 22, 2011 at 04:00:52PM -0800, Joe Hamelin wrote: > This might be of interest to those wishing to dive deeper into the subject. > > Telecommunications Handbook for Transportation Professionals: The Basics of > Telecommunications by the Federal Highway Administration. > > http://ops.fhw

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-23 Thread Robert E. Seastrom
Mark Radabaugh writes: > On 11/23/11 11:23 AM, valdis.kletni...@vt.edu wrote: >> On Wed, 23 Nov 2011 11:14:34 EST, Bryan Fields said: >>> So really all a hacker needs is a pair of dykes, some electrical tape, and >>> an >>> all black jumpsuit. >> Actually, you want a really dark blue jumpsuit.

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-23 Thread Mark Radabaugh
On 11/23/11 11:23 AM, valdis.kletni...@vt.edu wrote: On Wed, 23 Nov 2011 11:14:34 EST, Bryan Fields said: So really all a hacker needs is a pair of dykes, some electrical tape, and an all black jumpsuit. Actually, you want a really dark blue jumpsuit. All-black creates a sillouette in all but

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-23 Thread Valdis . Kletnieks
On Wed, 23 Nov 2011 11:14:34 EST, Bryan Fields said: > So really all a hacker needs is a pair of dykes, some electrical tape, and an > all black jumpsuit. Actually, you want a really dark blue jumpsuit. All-black creates a sillouette in all but the very darkest conditions. pgprHPVYAjpnH.pgp De

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-23 Thread Bryan Fields
On 11/22/2011 23:29, Jay Hennigan wrote: > But, an external cracker even with full access won't be able to cause a > conflict. Massive traffic jams by messing with the timing, short or > long cycles, etc. but not a conflict. So really all a hacker needs is a pair of dykes, some electrical tape, a

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-22 Thread Jay Hennigan
On 11/22/11 8:16 AM, Jay Ashworth wrote: > - Original Message - >> From: "Owen DeLong" > >> As in all cases, additional flexibility results in additional ability >> to make mistakes. Simple mechanical lockouts do not scale to the >> modern world. The benefits of these additional capabilit

Re: First real-world SCADA attack in US

2011-11-22 Thread andrew.wallace
"There is no evidence to support claims made in initial reports -- which were based on raw, unconfirmed data and subsequently leaked to the media."  http://jeffreycarr.blogspot.com/2011/11/latest-fbi-statement-on-alleged.html From what I'm seeing and hearing is the report by the fusion centr

Re: First real-world SCADA attack in US

2011-11-22 Thread Michael Painter
On Nov 22, 2011, at 8:08 58PM, Steven Bellovin wrote: They do state categorically that "After detailed analysis, DHS and the FBI have found no evidence of a cyber intrusion into the SCADA system of the Curran-Gardner Public Water District in Springfield, Illinois." I'm waiting to see Joe Weiss'

Re: First real-world SCADA attack in US

2011-11-22 Thread Ryan Pavely
Note to self. When my opc/modbus code goes to hell and wipes out an hvac unit; blame cyber terrorists, crappy vendors, and provide a random shady ip address. This was sad when it was possibly an unprotected network, with poor password procedures, horrible protection code in the logics, etc et

Re: First real-world SCADA attack in US

2011-11-22 Thread Dennis
Like any of the decades largest breaches this could have been avoided by following BCP's. In addition SCADA networks are easily protected via behavioral and signature based security technologies. Steven Bellovin wrote: > >On Nov 22, 2011, at 8:08 58PM, Steven Bellovin wrote: > >> >> On Nov

Re: First real-world SCADA attack in US

2011-11-22 Thread Jay Ashworth
- Original Message - > From: "Jimmy Hess" > So you have 3 circuits, and any one circuit can detect the most > severe potential failure of any pair of the other circuits. Just so. Byzantine monitoring, just like a Byzantine clock. Cheers, -- jra -- Jay R. Ashworth Bayl

Re: First real-world SCADA attack in US

2011-11-22 Thread Jimmy Hess
On Tue, Nov 22, 2011 at 5:23 PM, Brett Frankenberger wrote: > On Tue, Nov 22, 2011 at 06:14:54PM -0500, Jay Ashworth wrote: > in a manner that removes voltage from the relays).  It doesn't protect > against the case of conflicting output from the controller which the > conflict monitor fails to de

Re: First real-world SCADA attack in US

2011-11-22 Thread Steven Bellovin
On Nov 22, 2011, at 8:08 58PM, Steven Bellovin wrote: > > On Nov 22, 2011, at 7:51 59PM, valdis.kletni...@vt.edu wrote: > >> On Tue, 22 Nov 2011 13:32:23 -1000, Michael Painter said: >> http://jeffreycarr.blogspot.com/2011/11/latest-fbi-statement-on-alleged.html >> >>> And "In addition,

Re: First real-world SCADA attack in US

2011-11-22 Thread Steven Bellovin
On Nov 22, 2011, at 7:51 59PM, valdis.kletni...@vt.edu wrote: > On Tue, 22 Nov 2011 13:32:23 -1000, Michael Painter said: > >>> http://jeffreycarr.blogspot.com/2011/11/latest-fbi-statement-on-alleged.html > >> And "In addition, DHS and FBI have concluded that there was no malicious >> traffic

Re: First real-world SCADA attack in US

2011-11-22 Thread Valdis . Kletnieks
On Tue, 22 Nov 2011 13:32:23 -1000, Michael Painter said: > > http://jeffreycarr.blogspot.com/2011/11/latest-fbi-statement-on-alleged.html > And "In addition, DHS and FBI have concluded that there was no malicious > traffic from Russia or any foreign entities, as > previously reported." It's i

Re: First real-world SCADA attack in US

2011-11-22 Thread Joe Hamelin
This might be of interest to those wishing to dive deeper into the subject. Telecommunications Handbook for Transportation Professionals: The Basics of Telecommunications by the Federal Highway Administration. http://ops.fhwa.dot.gov/publications/telecomm_handbook/ I'm still digging through it t

Re: First real-world SCADA attack in US

2011-11-22 Thread Michael Painter
andrew.wallace wrote: Here is the latest folks, "DHS and the FBI have found no evidence of a cyber intrusion into the SCADA system in Springfield, Illinois." http://jeffreycarr.blogspot.com/2011/11/latest-fbi-statement-on-alleged.html Andrew And "In addition, DHS and FBI have concluded that

Re: First real-world SCADA attack in US

2011-11-22 Thread Brett Frankenberger
On Tue, Nov 22, 2011 at 06:14:54PM -0500, Jay Ashworth wrote: > - Original Message - > > From: "Matthew Kaufman" > > > Indeed. All solid-state controllers, microprocessor or not, are required > > to have a completely independent conflict monitor that watches the > > actual HV outputs to t

Re: First real-world SCADA attack in US

2011-11-22 Thread Jay Ashworth
- Original Message - > From: "Matthew Kaufman" > Indeed. All solid-state controllers, microprocessor or not, are required > to have a completely independent conflict monitor that watches the > actual HV outputs to the lamps and, in the event of a fault, uses > electromechanical relays to

Re: First real-world SCADA attack in US

2011-11-22 Thread Michael Painter
Steven Bellovin wrote: On Nov 21, 2011, at 4:30 PM, Mark Radabaugh wrote: Probably nowhere near that sophisticated. More like somebody owned the PC running Windows 98 being used as an operator interface to the control system. Then they started poking buttons on the pretty screen. Somew

Re: First real-world SCADA attack in US

2011-11-22 Thread andrew.wallace
Here is the latest folks, "DHS and the FBI have found no evidence of a cyber intrusion into the SCADA system in Springfield, Illinois." http://jeffreycarr.blogspot.com/2011/11/latest-fbi-statement-on-alleged.html Andrew

Re: First real-world SCADA attack in US

2011-11-22 Thread Matthew Kaufman
On 11/22/2011 5:59 AM, Brett Frankenberger wrote: The typical implementation in a modern controller is to have a separate conflict monitor unit that will detect when conflicting greens (for example) are displayed, and trigger a (also separate) flasher unit that will cause the signal to display

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-22 Thread Owen DeLong
> >> but that's not the only risk. When the traffic >> signal is failing, even if it's failing with dark or red in every >> direction, the intersection becomes more dangerous. Not as dangerous >> as conflicting greens, > > By 2 or 3 orders of magnitude, usually; the second th

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-22 Thread Brett Frankenberger
On Tue, Nov 22, 2011 at 02:26:34PM -0500, Jay Ashworth wrote: > > Yes, but the complexity of a computerized controller is 3-6 orders of > magnitude higher, *and none of it is visible* You can't see the electrons in the relays either. > > Some other things to consider. > > > > Relays are more li

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-22 Thread Jay Ashworth
> Relay logic has the potential for programming (i.e. wiring) errors > also. Yes, but the complexity of a computerized controller is 3-6 orders of magnitude higher, *and none of it is visible* > It's not fair to compare "conflict monitor" to "properly programmed > relay logic". We either have to

Re: OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-22 Thread Brett Frankenberger
On Tue, Nov 22, 2011 at 11:16:54AM -0500, Jay Ashworth wrote: > - Original Message - > > From: "Owen DeLong" > > > As in all cases, additional flexibility results in additional > > ability to make mistakes. Simple mechanical lockouts do not scale > > to the modern world. The benefits of

OT: Traffic Light Control (was Re: First real-world SCADA attack in US)

2011-11-22 Thread Jay Ashworth
- Original Message - > From: "Owen DeLong" > As in all cases, additional flexibility results in additional ability > to make mistakes. Simple mechanical lockouts do not scale to the > modern world. The benefits of these additional capabilities far > outweigh the perceived risks of program

Re: First real-world SCADA attack in US

2011-11-22 Thread Brett Frankenberger
On Tue, Nov 22, 2011 at 10:16:56AM -0500, Jay Ashworth wrote: > - Original Message - > > From: "Brett Frankenberger" > > > The typical implementation in a modern controller is to have a separate > > conflict monitor unit that will detect when conflicting greens (for > > example) are displ

Re: First real-world SCADA attack in US

2011-11-22 Thread Jay Ashworth
- Original Message - > From: "Brett Frankenberger" > The typical implementation in a modern controller is to have a separate > conflict monitor unit that will detect when conflicting greens (for > example) are displayed, and trigger a (also separate) flasher unit that > will cause the sig

Re: First real-world SCADA attack in US

2011-11-22 Thread Brett Frankenberger
On Mon, Nov 21, 2011 at 11:16:14PM -0500, Jay Ashworth wrote: > > Precisely. THe case in point example these days is traffic light > controllers. > > I know from traffic light controllers; when I was a kid, that was my dad's > beat for the City of Boston. Being a geeky kid, I drilled the guys i

Re: First real-world SCADA attack in US

2011-11-22 Thread Valdis . Kletnieks
On Mon, 21 Nov 2011 14:24:48 PST, "andrew.wallace" said: > If NSA had no signals information prior to the attack, this should be a wake > up call for the industry. Actually, it should be a wake up call whether or not NSA had signals information. However, it's pretty obvious that the entire SCADA

Re: First real-world SCADA attack in US

2011-11-21 Thread Valdis . Kletnieks
On Tue, 22 Nov 2011 07:11:43 +0200, Jussi Peltola said: > Anybody who has seen what kind of bizarre malfunctions failed > electrolytics cause in consumer electronics will probably not feel very > comfortable trusting traffic lights whose safety relies on software that > is proven correct. Beware

Re: First real-world SCADA attack in US

2011-11-21 Thread Jen Linkova
On Tue, Nov 22, 2011 at 8:35 AM, Mark Radabaugh wrote: > Having worked on plenty of industrial and other control systems I can safely > say security on the systems is generally very poor.   The vulnerabilities > have existed for years but are just now getting attention.    This is a > problem that

Re: First real-world SCADA attack in US

2011-11-21 Thread Jussi Peltola
On Mon, Nov 21, 2011 at 11:16:14PM -0500, Jay Ashworth wrote: > That implies to me that it is *physically* possible to get opposing greens > (which we refer to, in technical terms as "traffic fatalities") out of the > controller box... in exactly the same way that it didn't used to be. Not necess

Re: First real-world SCADA attack in US

2011-11-21 Thread Jay Ashworth
- Original Message - > From: "Jimmy Hess" > On Mon, Nov 21, 2011 at 3:35 PM, Mark Radabaugh > wrote: > > On 11/21/11 10:32 AM, Jay Ashworth wrote: > > education / resource issue. The existing methods that have been used for > > years with reasonable success in the IT industry can 'fix' t

Re: First real-world SCADA attack in US

2011-11-21 Thread Jimmy Hess
On Mon, Nov 21, 2011 at 3:35 PM, Mark Radabaugh wrote: > On 11/21/11 10:32 AM, Jay Ashworth wrote: > education / resource issue.   The existing methods that have been used for > years with reasonable success in the IT industry can 'fix' this problem. The "existing normal methods" used by much of

RE: First real-world SCADA attack in US

2011-11-21 Thread George Bonser
> Subject: First real-world SCADA attack in US > > On an Illinois water utility: > > http://www.msnbc.msn.com/id/45359594/ns/technology_and_science-security "that which does not kill us makes us stronger" --Friedrich Nietzsche

Re: First real-world SCADA attack in US

2011-11-21 Thread Steven Bellovin
On Nov 21, 2011, at 4:30 PM, Mark Radabaugh wrote: >> >> > Probably nowhere near that sophisticated. More like somebody owned the PC > running Windows 98 being used as an operator interface to the control system. > Then they started poking buttons on the pretty screen. > > Somewhere there

Re: First real-world SCADA attack in US

2011-11-21 Thread andrew.wallace
If NSA had no signals information prior to the attack, this should be a wake up call for the industry. Andrew From: Jay Ashworth To: NANOG Sent: Monday, November 21, 2011 3:32 PM Subject: First real-world SCADA attack in US On an Illinois water utility

Re: First real-world SCADA attack in US

2011-11-21 Thread Hal Murray
> On an Illinois water utility: > http://www.msnbc.msn.com/id/45359594/ns/technology_and_science-security That URL says: > The Nov. 8 incident was described in a one-page report from the Illinois > Statewide Terrorism and Intelligence Center, according to Joe Weiss, a > prominent expert on protec

Re: First real-world SCADA attack in US

2011-11-21 Thread Christopher Morrow
On Mon, Nov 21, 2011 at 4:51 PM, Jason Gurtz wrote: >> Having worked on plenty of industrial and other control systems I can >> safely say security on the systems is generally very poor.   The >> vulnerabilities have existed for years but are just now getting >> attention. > > +1 > > Just for cont

RE: First real-world SCADA attack in US

2011-11-21 Thread Jason Gurtz
> Having worked on plenty of industrial and other control systems I can > safely say security on the systems is generally very poor. The > vulnerabilities have existed for years but are just now getting > attention. +1 Just for context, let me tell everyone about an operational characteristic o

Re: First real-world SCADA attack in US

2011-11-21 Thread Jay Nakamura
On Mon, Nov 21, 2011 at 10:32 AM, Jay Ashworth wrote: > On an Illinois water utility: > > http://www.msnbc.msn.com/id/45359594/ns/technology_and_science-security > > Cheers, > -- jra I can say from experience working on one rural sewage treatment plant that IT security is not even in their consci

Re: First real-world SCADA attack in US

2011-11-21 Thread Mark Radabaugh
On 11/21/11 4:38 PM, Charles Mills wrote: Having worked on plenty of industrial and other control systems I can safely say security on the systems is generally very poor. The vulnerabilities have existed for years but are just now getting attention.This is a problem that doesn't really ne

Re: First real-world SCADA attack in US

2011-11-21 Thread Charles Mills
Having worked on plenty of industrial and other control systems I can safely say security on the systems is generally very poor. The vulnerabilities have existed for years but are just now getting attention. This is a problem that doesn't really need a bunch of new legislation. It's an educati

Re: First real-world SCADA attack in US

2011-11-21 Thread Mark Radabaugh
On 11/21/11 10:32 AM, Jay Ashworth wrote: On an Illinois water utility: http://www.msnbc.msn.com/id/45359594/ns/technology_and_science-security Cheers, -- jra Having worked on plenty of industrial and other control systems I can safely say security on the systems is generally very poor. The

Re: First real-world SCADA attack in US

2011-11-21 Thread Mark Radabaugh
On 11/21/11 4:09 PM, Leigh Porter wrote: On 21 Nov 2011, at 20:23, "Ryan Pavely" wrote: Might I suggest using 127.0.0.2 if you want less spam :P Pretty scary that folks have 1. Their scada gear on public networks, not behind vpns and firewalls. Do people really do that? Just dump a /24 of ro

Re: First real-world SCADA attack in US

2011-11-21 Thread Leigh Porter
On 21 Nov 2011, at 20:23, "Ryan Pavely" wrote: > Might I suggest using 127.0.0.2 if you want less spam :P > > Pretty scary that folks have > 1. Their scada gear on public networks, not behind vpns and firewalls. Do people really do that? Just dump a /24 of routable space on a network and use

Re: First real-world SCADA attack in US

2011-11-21 Thread Jay Ashworth
- Original Message - > From: "Mark Foster" > "First" Hey; I don't write em; I just quote em. :-) > https://ciip.wordpress.com/2009/06/21/a-list-of-reported-scada-incidents/ The Willows CA is the only one in the first part of that list that was a) an actual attack, b) that actually had

Re: First real-world SCADA attack in US

2011-11-21 Thread Stefan Bethke
Am 21.11.2011 um 21:22 schrieb Ryan Pavely: > But then again I don't want to goto jail for leaving my car door open and > having someone steal my car, so nix that idea. Oh, but you are. (Not sure about criminal liability, but definitely civil.) -- Stefan BethkeFon +49 151 14070811

Re: First real-world SCADA attack in US

2011-11-21 Thread Mark Foster
"First" https://ciip.wordpress.com/2009/06/21/a-list-of-reported-scada-incidents/ On 22/11/11 04:32, Jay Ashworth wrote: > On an Illinois water utility: > > http://www.msnbc.msn.com/id/45359594/ns/technology_and_science-security > > Cheers, > -- jra

Re: First real-world SCADA attack in US

2011-11-21 Thread Jay Ashworth
- Original Message - > From: "Ryan Pavely" > Perhaps the laws people suggest we need to protect ourselves should be > added to. If you are the operator of a network and due to complete > insanity leave yourself wide open to attack, you are just as guilty as > the bad guys... But then agai

Re: First real-world SCADA attack in US

2011-11-21 Thread Ryan Pavely
Might I suggest using 127.0.0.2 if you want less spam :P Pretty scary that folks have 1. Their scada gear on public networks, not behind vpns and firewalls. 2. Allow their hardware vendor to keep a list of usernames / passwords. 2b. Obviously don't change these so often. Whens the last time t

Re: First real-world SCADA attack in US

2011-11-21 Thread Leigh Porter
I checked the SCADA boxes used in our "smart" building. They are all using 127.0.0.1 Is that a security risk? -- Leigh Porter On 21 Nov 2011, at 19:20, "Arturo Servin" wrote: > >I wonder if they are using private IP addresses. > > -as > > On 21 Nov 2011, at 13:32, Jay Ashworth wrote:

Re: First real-world SCADA attack in US

2011-11-21 Thread -Hammer-
LOL. I see what you did there. -Hammer- "I was a normal American nerd" -Jack Herer On 11/21/2011 01:17 PM, Arturo Servin wrote: I wonder if they are using private IP addresses. -as On 21 Nov 2011, at 13:32, Jay Ashworth wrote: On an Illinois water utility: http://www.msn

Re: First real-world SCADA attack in US

2011-11-21 Thread Arturo Servin
I wonder if they are using private IP addresses. -as On 21 Nov 2011, at 13:32, Jay Ashworth wrote: > On an Illinois water utility: > > http://www.msnbc.msn.com/id/45359594/ns/technology_and_science-security > > Cheers, > -- jra > -- > Jay R. Ashworth Baylink

First real-world SCADA attack in US

2011-11-21 Thread Jay Ashworth
On an Illinois water utility: http://www.msnbc.msn.com/id/45359594/ns/technology_and_science-security Cheers, -- jra -- Jay R. Ashworth Baylink j...@baylink.com Designer The Things I Think RFC 2100 Ashworth & Associ