Windpower Engineering & Development

  • Home
  • Articles
    • Most recent posts
    • News
    • Featured
  • Resources
    • Digital issues
    • Podcasts
    • Suppliers
    • Webinars
    • Events
  • Videos
  • 2025 Leadership
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
  • Magazine
  • Advertise
  • Subscribe

Are you ready for your cyber attack?

By Paul Dvorak | October 19, 2015

The nature of warfare changes constantly. Static trench warfare played a big role in WWI, but improved air power and a more mobile battle tank brought much greater fluidity to WWII, making trenches obsolete. Later wars erased the idea of a front line altogether. WWII more importantly, became the information war.pdvorak-400x229

For example, the German Enigma machine, a cypher, let the German High Command communicate with its far-flung resources without fear of the Allies reading its communiques. Simultaneously, a small army of code breakers in the UK, Alan Turing among them, worked feverishly to decipher the Wehrmacht’s orders. For that process, the code breakers invented several digital programmable computers. They worked so well that after the war, timid and short sighted leaders disassembled the computers deeming them too dangerous should they fall into the wrong hands.

Fast forward 70 years and the 1945 authorities actually appear quite prescient. Their worst fear about information technology and security seemed to come true. As engagements in hot wars subside, other forms of information warfare are being waged almost anywhere a significant installation has an Internet connection. A speaker at a technical conference recently remarked that to see something scary, try monitoring the controls of a significant facility while hackers attempt to gain access. When they pose as authorized workers, hackers could reset controls to increase power outputs, turn them off altogether, or make selections that could damage equipment.

One documentary on YouTube.com (See why Obama fears China’s hackers, (https://goo.gl/Wiso4w) probably so titled to capture U.S. attention) interviews several Australian government officials and business leaders dealing with the problem. The image the producers present is one of pervasive and relentless intrusions.

On the business side for instance, Codan Ltd, an Australian manufacturer of metal detectors and military radios, discusses how its design for a metal detector was stolen, copied, reproduced, and sold on the open market. The company discovered the theft when one of the copies came back to the company for warranty work and its sloppy circuit boards and other clues gave the fake away. Suspecting industrial espionage, a close inspection of company computers found malware had infected many of them. Investigators surmise that a salesman in a hotel room could have picked on click bait (such as a fake Viagra ad). The action told intruders an unprotected computer of interest was online. With the malware downloaded, the unwitting salesperson took the infection back to his company. There, it likely enabled the theft of more critical secrets, such as those that let once-secure military radios manufactured by the company perform with no more security than a trucker’s CB radio. Almost invariably, intruders are traced back to China.

The feature article in this issue just scratches the surface of the problem of cyber intrusions and security for utilities. The internet has brought bad guys right to the front door of control rooms. If they can pick the lock, they can appear as authorized users with unfriendly intentions.

Cyber experts don’t guess that an attack might come to the grid. It already has and will come again. Forewarned is forearmed.

—Paul Dvorak


Filed Under: Cybersecurity
Tagged With: cyber attack, paul dvorak
 

About The Author

Paul Dvorak

Related Articles Read More >

Ardexa updates remote renewable operations toolkit with upped security
The winds of change: The future of predictive analytics in wind farm reliability
ISA announces Global Cybersecurity Alliance members
NARUC releases two new manual resources on cybersecurity risks to utilities

Podcasts

Wind Spotlight: Looking back at a year of Thrive with ZF Wind Power
See More >

Windpower Engineering & Development Digital Edition Archive

Digital Edition

Explore the full archive of digital issues of Windpower Engineering & Development, presented in a high-quality, user-friendly format. Access current and past editions, clip, share, and download valuable content from the industry’s leading wind power engineering resource.

Windpower Engineering & Development
  • Wind Articles
  • Solar Power World
  • Subscribe to Windpower Engineering
  • About Us/Contact Us

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising

Search Windpower Engineering & Development

  • Home
  • Articles
    • Most recent posts
    • News
    • Featured
  • Resources
    • Digital issues
    • Podcasts
    • Suppliers
    • Webinars
    • Events
  • Videos
  • 2025 Leadership
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
  • Magazine
  • Advertise
  • Subscribe