In many prisons, technical support staff would add connections to enable them to update the system’s software remotely after the ICS systems were installed by security specialists.
“We saw that a lot, a lot,” said Mr. Teague.
Mr. McGurk said he found Internet connections in every one of the400-plus onsite inspections of control systems in the government and private sector he had overseen in three years at the Homeland Security Department.
“In no case did we ever not find connections,” he said. “They were always there.”
Even systems that were successfully cut off from the Internet could be attacked by malicious insiders or anyone with enough access to insert a thumb drive into a computer work station, Mr. Strauchs said.
“The mostly likely vector would be to bribe a prison guard to insert a USB drive with malicious programming. Hard to stop and hard to find out who did it,” he said.
Mr. Teague said the team’s attack was “pretty easy” to develop.
“I had no prior experience with programming ICS” Mr. Newman said, “We did not spend a lot of time, it was cheap, and we did it in my basement.”
© Copyright 2013 The Washington Times, LLC. Click here for reprint permission.
By Andrew P. Napolitano
The president's men trash the Constitution to pursue antagonists
Independent voices from the TWT Communities
Television commentary, reviews, news and nonstop DVR catch-up.
Manhattan-based free-market urban bloggers bringing original political content with fresh, young voices
Musings of a bilingual, agnostic, combat veteran and jewelry maker.
Benghazi: The anatomy of a scandal
Vietnam Memorial adds four names
Cinco de Mayo on the Mall
NRA kicks off annual convention