Anti-terror techniques

No Gravatar

Yes, I am going to use current events to scare you. Maybe that way you will DEMAND action from Congress (or your country’s legislature) to pass laws, to fund solutions- to stop problems, before they occur.

First, let me state that protecting against another terrorist attack at the Boston Marathon is something that will be nearly impossible. Unless we want to undergo strip searches every time we cross the street or leave our doors. I know that is not satisfying to those of you who want every risk eliminated, but it is a fact.

We can mitigate these risks, however. By being aware of our surroundings. By wondering why someone would be carrying a big bag, like these guys did, to a marathon. This wasn’t a golf course or a baseball batting cage. No, that does not mean you personally confront the ‘carrier(s)’, but you do alert police to the somewhat anomalous behavior.

Or, like yesterday (from the day I wrote this), when I came home from religious study and noticed a large SUV parked across the street. One that is not normally situated on our block. And, it stayed there for a few hours. When I noticed later that night that there was a funny light inside the otherwise black vehicle. From a computer screen. As I analyzed the wireless signals in the area, I noticed an intruder had tried our two wireless systems- and that there was unusual activity on the other seven or eight in our immediate area. (My neighbors are “Ben Franklin” types- early to bed and early to rise.) So, I called 911. I can’t tell you what happened, because that car hightailed it out of here as soon as I spoke to the 911 operator. (Yes, that probably means there were eavesdropping paraphernalia in the vehicle.) But, the police said (I did not so verify) they had an officer at the exit route from the direction s/he was driving. Who knows?

But, back to the real issue. Our infrastructure- our power plants, our electrical grid, our chemical and petrochemical factories- are not protected from intruders. As a matter of fact, the “computer control” systems they use are generic, so generic that anyone can commandeer the systems and change- or turn off- their operations. (This Technology Review article only hints at the situation.) Think about a blackout that would envelop a large population mass in the US- not only for our lives and comfort, but from a terror point of view.

Or, as Hugh Teso recently presented (HackintheBox removed the original, this is an article about hs speech)  at a hackathon in Amsterdam, anyone- yes, anyone- can take down any individual aircraft with ease. Yup- really. With an android phone, a simple radio transmitter, and the knowledge we all have obtained from using Microsoft’s game, “Flight Simulator” or similar programs.  We don’t even have to be on the airplane to take it down. So, no suicide is required. Because our government and the airline industry do not bother to lock down ACARS (Aircraft Communication Addressing and Reporting System)- no authentication, no encryption at all exist on that critical system.

Hugh had purchased a flight management system from eBay to ascertain the necessary codes and to read and send ACARS messgaes. With his radio transmitter, he audited the airplane codes, and then programmed his own app to deliver messages to an aircraft on his Android phone. And, the second the plane went on autopilot, he could commandeer it. (Yes, the pilots could turn off autopilot- but, that assumes (a) the pilots would recognize they were hijacked and (b) that the plane they were flying still had the systems necessary for manual flying- most don’t!)

But, like the Boston Marathon terrorist, this sort of terror act works by amplification. By killing or maiming a few score of people. And, scaring the rest. But, if our electric grids are commandeered, it is millions of folks at risk- and our economy.

What’s the name of your Senator and Congressman again? Don’t you think it’s time to send that letter?

Share this:
Share this page via Email Share this page via Stumble Upon Share this page via Digg this Share this page via Facebook Share this page via Twitter
Share

25 thoughts on “Anti-terror techniques”

  1. Excellent post, Roy. I don’t have much more to say about it than that, and that you are correct we need to speak to our elected folks to get real things done. I’m not sure why things aren’t in place already. We always seem to get too many carts before our horses are in order.
    Lisa recently posted..Transmission by Lisa Brandel

    1. You have a hard time believing it- or a hard time understanding why we do such things?
      Homeland Security seems to be interested in stopping the attack method that arrived yesterday- with no regard for the one on the way- or in planning for tomorrow, Suerae.

  2. trying to stop further attacks is almost like asking, “How long is a piece of string?” We can speculate on hundreds of possible methods, and how to prevent them, but the possibilities are endless. contingency upon contingency makes it absolutely impossible to stop it all. I do agree, however, that we could be doing more. There are a lot of systems that are vulnerable. Other physical locations are also highly vulnerable. Infrastructure, such as dams that hold back smaller lakes, but could flood thousands of acres if breached, power plants that area easily accessible, the list goes on and on.
    Bill Gelwick recently posted..Purpose

  3. Very good article that I will be sharing with others. My wife and I are on airplanes a fair amount of time. I was on two, for a few hours last week, she will be on two at least twice in the next three weeks, maybe more. This is most unsettling to know because of all the misguided young people that have the knowledge available. I will write the letters today.
    Chef William recently posted..The Food Revolution

    1. Thanks for taking the time to ask someone in government to do something….
      Of course, it could end up exactly where the immigration bill and background check bills have landed…

      Appreciate the read and comment, Chef William.

  4. Pingback: garnicia cambogia
  5. Pingback: Visit

Comments are closed.