Information Warfare: July 17, 2002

Archives

A classic Information War vulnerability are the three million SCADA (Supervisory Control and Data Acquisition) systems installed around the world. Over the last three decades, SCADA use has become more popular, as it is a cheaper and more effective way to monitor and control power, water, agricultural, sewage treatment and industrial systems. Al Qaeda computers have been captured containing research on SCADA systems. What makes SCADA vulnerable to al Qaeda attack is the increasing use of wireless transmission of data between sensors and control systems, as well as using the Internet for moving information and commands. Nearly all SCADA data is not encrypted, and any one using the right, off-the-shelf, equipment can intercept SCADA and manipulate the systems. On the plus side, there are a lot of different SCADA system types out there, and you need people with some SCADA experience to figure out how to manipulate the systems to destructive ends. In addition, there are not a lot of programmers and SCADA engineers among the al Qaeda faithful. But the potential is there, and it's well to remember that a few years ago no al Qaeda members knew how to fly a jet airliner. 

X

ad

Help Keep StrategyPage Open

First came Facebook, then came Twitter, and finally, AI has arrived. They have all caused a decline in our business, but AI may be the deadliest innovation. We are currently in survival mode. Our writers and staff receive no payment in some months, and even when they do, it is below the minimum wage for their efforts. You can support us with your donations or subscriptions. Please help us keep our doors open.

Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on X.

Subscribe   Donate   Close