WOW

 
 
Sincerely,
Scott
 
[EMAIL PROTECTED]
www.scottsmarineservices.com
www.boat-parts.net
www.boatparts.us
www.LaWirelessWeb.com
 
Scotts Marine Services
4105 Lincoln ave.
Culver City, California 90232
Phone & Fax 310-559-5353
 
 
 

-----Original Message-----
From: Geoff Shively [mailto:[EMAIL PROTECTED] 
Sent: Friday, August 15, 2003 6:12 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: [SOCALWUG] Power outages related to DCOM Worm, WiFi
accessible?

Jack,

Before reading any of your own text, you may want
to view this PBS documentary. It is only 10 minutes long
and even if you aren't a PBS fan it has good data and support
everything I am saying.

http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/view/

I would hope most review presented data before forming an
argument against it.

> But your logic is so well...
> it's so uh... uh...
> it's uh... it's so lacking, dude.

My logic or my data, or both? Please clarify.

> Are you asking the question or making an assertion?
> The answer is no, in most cases, they're not WiFi accessible.

I was attempting to keep the subject short and concise.

> Some have said, huh. Who are these authoritative folks?

If they were as authoritative as your argument precedes,
then I wouldn't have bothered asking the list about WiFi.

Bernie, CTA [mailto:[EMAIL PROTECTED] had some good data
from his days working with these systems, if you would like
to contact him feel free. I have CC'd Bernie on this thread.

Attached is the original email to the full-disclosure list.

> Lots of talk, eh?? Gosh, I guess that makes it true, No?

No but at the very least I have some data backing my logic,
I see nothing but cynical comments and lacking data to support
your theory that mine is false. Present some and then we can
talk in what I hope is a tactful fashion.

> The changes that you assert "could" have taken place?

I would love to see one bit of evidence that isn't speculative
at this point. Yes, this could have taken place, and to present
it I used research data to form my verbiage. Is this not how
you come about finding an answer?

> "Very well penetrate" - what a convincing argument.

In security, do we not asses risk and mitigate it as necessary?
well before we can mitigate the risk here we have to present
the case for how probable it is to get into one of these systems.

> Thanks for your expert analysis and opinion, oops, you're not really
> an expert are you?

I don't claim to be and never have. This does not take a power expert
to understand. Example, most know how a car works, but could they
ever build one, no. I am simply putting pieces of a puzzle together
based on experts I do speak with, as the members of our national
media are not practicing responsible reporting, and listening to
uneducated guesses about the system's architecture.

> Oh, the industry may be pretty well prepared, Geoff. They may in fact
> have created the problem themselves to get the government
> (Oopps... I mean the taxpayers) to give them 50 or 60 billion dollars
> to "upgrade" the grid (continuing to artificially reduce the supply of
power and
> then trade power at inflated rates at a huge profit)  and make it
easier
for them
> to rip off the nation like they have already ripped-off California. Oh
my
God,
> maybe now I'm the crackpot who's gone "over the edge". Well, at least
that
will
> lend YOU some credibility and make your marketing efforts
> suddenly look legitimate. Don't say I never gave you anything!

I have not made one reference to assumed information as I said before my
information is based upon facts.

Please, do describe what you mean by this marketing?

> "could be"

Could be anything, but facts will lead us to an answer. It really is
that
simple.

> Holy crap!!! With a pile of documents as high as the sky,
> how can you possibly be wrong?

Facts are facts, I don't know what else to say. I could be wrong, and
that
is
my biggest asset. I don't assert that this is definitely what happened.

With that said, I would have preferred that such a tactless and cynical
reply
to what was intending as an informative and inquisitive post be handled
off
of the list. Oh well, live and learn.


Cheers,

Geoff Shively, CHO
PivX Solutions, LLC

Are You Secure?
http://www.pivx.com

----- Original Message ----- 
From: "Jack Unger" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, August 15, 2003 5:04 PM
Subject: Re: [SOCALWUG] Power outages related to DCOM Worm, WiFi
accessible?


> Nice marketing piece, Geoff...
>
> Hey - don't take this personally - I have no arguement
> with you. But your logic is so well...
> it's so uh... uh...
> it's uh... it's so lacking, dude.
>
> Geoff Shively wrote:
>
> > Power outages related to DCOM Worm, are SCADA and DCS WiFi
Accessible?
>
> Are you asking the question or making an assertion?
> The answer is no, in most cases, they're not WiFi accessible.
>
> > Some
> > have said that they are accessible via WiFi and a potential attacker
could
> > break protection mechanisms thus gaining access to control and
acquired
> > data.
>
> Some have said, huh. Who are these authoritative folks?
>
> > Is there any truth to this, any SCADA, DCS, or HMI experts on the
> > list?
>
> Probably not. This is a wireless list.
>
> >
> > Furthermore, there has been allot of talk on bugtraq, full
disclosure,
and
> > dsheild about the latest American power crisis being caused by
malicious
> > computer activities or worm.
>
> Lots of talk, eh?? Gosh, I guess that makes it true, No?
>
> >
> > A bit of background on the systems that control power facilities.
> > Distributed control systems (DCS) and supervisory control and data
> > acquisition (SCADA) systems are the key elements of facility
control.
remote
> > terminal units "RTU".  SCADA runs under Win2000 / XP and the
telemetry
to
> > the RTU is accessible via the Internet.
>
> So these control systems are Internet accessible, huh? Got any
convincing
> proof of that?
>
> >
> > SCADA (Supervisory Control And Data Acquisition) and DCS
(Distributed
> > Control Systems) are highly vulnerable to attack.
>
> Oh really, can't you be more specific? But wait, your just throwing a
bunch of
> acronyms around, huh? No real facts there...
>
> > An attacker could very
> > well penetrate these systems to make changes or implement simple
scripts
to
> > cause a legitimate operator to make unnecessary changes to a large
scale
> > power grid.
>
> "Very well penetrate" - what a convincing argument.
>
> > These changes could result in massive failure causing an
> > international power crisis.
>
> The changes that you assert "could" have taken place?
>
> >
> > Be it from a worm or home grown hack, these latest power failures
were
> > unlikely to have been caused by a physical failure that would have
surfaced
> > by now.
>
> Thanks for your expert analysis and opinion, oops, you're not really
> an expert are you?
>
> > Power failures from the years past have brought about legislation
> > and system changes that deal with most large scale issues as they
arise
to
> > mitigate risk of large scale failure, whatever happened this time
was a
new
> > problem the industry was not prepared for.
>
> Oh, the industry may be pretty well prepared, Geoff. They may in fact
> have created the problem themselves to get the government
> (Oopps... I mean the taxpayers) to give them 50 or 60 billion dollars
> to "upgrade" the grid (continuing to artificially reduce the supply of
power and
> then trade power at inflated rates at a huge profit)  and make it
easier
for them
> to rip off the nation like they have already ripped-off California. Oh
my
God,
> maybe now I'm the crackpot who's gone "over the edge". Well, at least
that
will
> lend YOU some credibility and make your marketing efforts
> suddenly look legitimate. Don't say I never gave you anything!
>
> >
> > We know that SCADA and DCS systems are supplied by one of 5 major
vendors
> > and these system are advertised on the vendors websites to run
Microsoft
> > Windows versions 95, 2000 and NT. Also advertised is DCOM and RPC
support
> > within these systems, RPC/DCOM recently became famous as the
Lovsan/Blaster
> > worm exploited this protocol to spread across the internet. With
this
said
> > it is likely
>
> It's very truly "likely", Geoff - because you said that it's
likely....
> that makes it true, No?
>
> > that an infected system infected a SCADA or DCS, and could be
>
> "could be"
>
> >
> > why we are seeing large scale outages across the country. This is
not a
> > Microsoft problem as many would like to say, though it is a problem
with
> > patch management.
> >
> > Below is documentation on the problem, the first one sums up the
problem
> > nicely (DCOM
> > and SCADA white papers):
>
> Holy crap!!! With a pile of documents as high as the sky,
> how can you possibly be wrong?
>
> >
> > http://www.automationtechies.com/sitepages/pid641.php
> >
> > http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/view/
> >
> > http://www.scada-system.com/scada-software-windows.htm
> >
> > http://www.data-acquisition-software.com/index.htm
> >
> > Cheers,
>
> Cheers, Geoff.... and thank you again for such a well-planted
> marketing piece - opps I mean such an accurate, informative,
> scientific and enlightening post. I'll look forward to your next
> post where you'll tell us how to use WiFi to take over control
> of cruise missiles.
>                              jack
>
> > Geoff Shively, CHO
> > PivX Solutions, LLC
> >
> > Are You Secure?
> > http://www.pivx.com
>
> --
> Jack Unger - President, Wireless InfoNet Inc.
> Author of the WISP Handbook - "Deploying License-Free Wireless WANs"
> http://www.ask-wi.com/book.html
> True Vendor-Neutral WISP Training-Troubleshooting-Consulting
> http://www.ask-wi.com/services.html
> Email: [EMAIL PROTECTED]  Phone: (818)227-4220
>
>
>

Reply via email to