- Sen. Rand Paul: ‘I am seriously thinking about’ running for president in 2016
- Sleet, ice, deepfreeze hit large swath of U.S.
- ‘Welcome to the edge of freedom’: Biden’s boots touch down in DMZ
- Obama: Hole U.S. ‘digging out of’ requires billions more in unemployment benefits
- Obama’s regulatory agenda will cost U.S. economy $143B next year: report
- Patriot Act author on James Clapper: Fire, prosecute him
- Russia P.M. Medvedev: No amnesty for political prisoners
- Michigan GOP Senate hopeful reminds government is the ‘servant’
- Christmas, by Congress: Members mull a 15-cent tax on trees
- U.S. unemployment falls to five-year low of 7 percent; 203K jobs added
Prisons bureau alerted to hacking into lockups
Expert: ‘Could open every cell door’
MIAMI — Federal authorities are concerned about new research showing U.S. prisons are vulnerable to computer hackers, who could remotely open cell doors to aid jailbreaks.
The Federal Bureau of Prisons is "aware of this research and taking it very seriously," spokesman Chris Burke told The Washington Times.
Mr. Burke was reacting to research by private experts who found that the security systems in most American prisons are run by computer software vulnerable to hackers.
"You could open every cell door, and the system would be telling the control room they are all closed," said John J. Strauchs, a former CIA operations officer who helped develop a cyber-attack on a simulated prison computer system and described it at a hackers' convention in Miami recently.
The security systems in most American prisons are run by special computer equipment called industrial control systems, or ICS. They are also used to control power plants, water treatment facilities and other critical national infrastructure. ICS has increasingly been targeted by hackers because an attack on one such system successfully sabotaged Iran's nuclear program in 2009.
A malicious cyber-intruder could "destroy the doors," by overloading the electrical system that controls them, locking them permanently open, said Mr. Strauchs, now a consultant who has designed security systems for dozens of state and federal prisons..
Hackers could "shut down secure communications" through the prison intercom system and crash the facility's closed-circuit television system, blanking out all the monitors, he added.
Mr. Strauchs, 67, and his daughter — attorney, professor and computer security researcher Tiffany Strauchs Rad, 37 — told an audience at the recent Hacker Halted conference about the attack they developed in the basement of a Washington area home for less than $2,500.
"Personally, I think the greatest danger is assassination," Mr. Strauchs told The Washington Times afterward. "You create chaos as a way to [implement a plan to] kill someone."
Mr. Strauchs said he and his daughter had been careful to work with U.S. authorities to alert them to the risk before publicly disclosing their attack. They organized a briefing for federal agencies over the summer at CIA headquarters in Northern Virginia.
Sean P. McGurk, who led the Department of Homeland Security's efforts to secure ICS until leaving in September, said the department had looked into the researchers' claims using the special ICS computer test bed at the Idaho National Laboratory.
"We validated the researchers' initial assertion ... that they could remotely reprogram and manipulate" the special software controllers that run the systems, Mr. McGurk said.
Teague Newman, another member of their team, said ICS systems are not supposed to be connected to the Internet.
"But in our experience, there were often connections" to other networks or devices, which were in turn connected to the Internet, making them potentially accessible to hackers, he said.
In some of the facilities the team visited for their research, guards had used the same computer that controls the prison's security systems to check their personal email, exposing it directly to potential hackers, Mr. Teague said.
In many prisons, technical support staff would add connections to enable them to update the system's software remotely after the ICS systems were installed by security specialists.
"We saw that a lot, a lot," said Mr. Teague.
Mr. McGurk said he found Internet connections in every one of the400-plus onsite inspections of control systems in the government and private sector he had overseen in three years at the Homeland Security Department.
"In no case did we ever not find connections," he said. "They were always there."
Even systems that were successfully cut off from the Internet could be attacked by malicious insiders or anyone with enough access to insert a thumb drive into a computer work station, Mr. Strauchs said.
"The mostly likely vector would be to bribe a prison guard to insert a USB drive with malicious programming. Hard to stop and hard to find out who did it," he said.
Mr. Teague said the team's attack was "pretty easy" to develop.
"I had no prior experience with programming ICS" Mr. Newman said, "We did not spend a lot of time, it was cheap, and we did it in my basement."
© Copyright 2013 The Washington Times, LLC. Click here for reprint permission.
About the Author
- Obama: Hole U.S. 'digging out of' requires billions more in unemployment benefits
- Spike in battlefield deaths linked to restrictive rules of engagement
- Bill OReilly reminds: Nelson Mandela was a communist
- PRUDEN: British press horrified as London's new mayor dares to proclaim the truth
- Activists urge Obama to go rogue, sidestep Congress
- Obama tries to calm Israeli fears over Iranian nuke deal 'not based on trust'
- 'Hunger Games' delivers Obama's message on income inequality
- Obamas call to close Vatican embassy is 'slap in the face' to Roman Catholics
- Craigslist killers: Police say newlyweds stabbed man for thrills
- Dick Cheney: Family feud over gay marriage has been 'dealt with'
Independent voices from the The Washington Times Communities
Get in the middle of all the action inside and outside the boxing ring.
Opinion, analysis, and musings on politics, pop culture, reinvention, and the resultant flotsam and jetsam floating around the right-of-center quadrant of the Left Coast.
The cold hard truth about politics in America today and the state of this once great nation.
Find the latest news and happening that effect those in the Washington D.C., Northern Virginia and Maryland Metro region.
White House pets gone wild!