{"id":14166,"date":"2024-02-16T07:57:33","date_gmt":"2024-02-16T10:57:33","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=14166"},"modified":"2024-02-16T07:57:33","modified_gmt":"2024-02-16T10:57:33","slug":"amenazas-a-la-infraestructura-critica-ee-uu-una-realidad-aterradora","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=14166","title":{"rendered":"Amenazas a la infraestructura cr\u00edtica EE.UU., una realidad aterradora"},"content":{"rendered":"<p>Los piratas inform\u00e1ticos amenazan los complejos sistemas de infraestructura cr\u00edtica (que incluyen energ\u00eda, finanzas, alimentaci\u00f3n y agricultura, atenci\u00f3n m\u00e9dica, servicios municipales, transporte, agua y muchos m\u00e1s) son vulnerables, y no solo para los actores estatales. Incluso peque\u00f1os grupos de delincuentes han dejado a miles de personas sin electricidad, cortaron las comunicaciones de los socorristas.<\/p>\n<hr \/>\n<p>On Jan. 31, FBI Director Christopher Wray\u00a0<a href=\"https:\/\/www.cnn.com\/2024\/01\/31\/politics\/china-hacking-infrascture-fbi-director-christopher-wray\/index.html\" target=\"_blank\" rel=\"noopener\">testified<\/a>\u00a0before Congress, explaining how Chinese government hackers were trying \u201cto find and prepare to destroy or degrade the civilian critical infrastructure that keeps us safe and prosperous.\u201d<\/p>\n<p>These hackers, Wray continued, \u201care positioning on American infrastructure in preparation to wreak havoc and cause real-world harm to American citizens and communities, if or when China decides the time has come to strike.\u201d<\/p>\n<p>Wray&#8217;s testimony offered a glimpse into the frightening possibilities attacks on U.S. critical infrastructure might unleash. But the truth is actually scarier: The American homeland has been under attack for the past two decades, with little in the way of meaningful response.<\/p>\n<p>Policymakers must, then, begin to strengthen private sector and local preparedness for these ongoing attacks, as well as developing and resourcing the federal interagency for complex emergencies, with an emphasis on societal resilience.<\/p>\n<p>As early as\u00a0<a href=\"https:\/\/abcnews.go.com\/Technology\/story?id=7287945\" target=\"_blank\" rel=\"noopener\">2009<\/a>, Chinese and Russian hackers infiltrated America&#8217;s electrical grid, installing malware that could be used for future attacks. One year later,\u00a0<a href=\"https:\/\/money.cnn.com\/2014\/07\/17\/technology\/security\/nasdaq-hack\/index.html\" target=\"_blank\" rel=\"noopener\">Russia<\/a>\u00a0hacked the NASDAQ stock exchange and not only attempted to steal data but left behind what experts described as a \u201cdigital bomb\u201d that could, when detonated, damage financial networks.<\/p>\n<p>In 2013, disaster was narrowly averted after Iranian hackers\u00a0<a href=\"https:\/\/www.nytimes.com\/2016\/03\/26\/nyregion\/rye-brook-dam-caught-in-computer-hacking-case.html\" target=\"_blank\" rel=\"noopener\">infiltrated<\/a>\u00a0the control systems of the Bowman Avenue Dam in New York and nearly flooded a small town.<\/p>\n<p>A\u00a0<a href=\"https:\/\/www.kcur.org\/news\/2022-03-24\/federal-officials-say-russian-spies-tried-to-hack-into-a-kansas-nuclear-power-plant\" target=\"_blank\" rel=\"noopener\">2017<\/a>\u00a0hack of the Wolf Creek nuclear power plant in Kansas was later revealed to be the work of Russian hackers, as was a\u00a0<a href=\"https:\/\/www.cnn.com\/2021\/06\/02\/business\/beef-hack-jbs\/index.html\" target=\"_blank\" rel=\"noopener\">2022<\/a>\u00a0attack on an international food company, which temporarily closed all of its meatpacking plants in the United States.<\/p>\n<p>China reportedly breached and surveilled the networks of the New York City\u00a0<a href=\"https:\/\/www.nytimes.com\/2021\/06\/02\/nyregion\/mta-cyber-attack.html\" target=\"_blank\" rel=\"noopener\">subway<\/a>\u00a0system in 2021. Just this past May,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/05\/24\/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques\/\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a>\u00a0reported that the China-backed hacker network\u00a0<a href=\"https:\/\/www.wired.com\/story\/china-volt-typhoon-hack-us-critical-infrastructure\/\" target=\"_blank\" rel=\"noopener\">Volt Typhoon<\/a>\u00a0compromised its IT systems to access critical infrastructure on Guam.<\/p>\n<p>These complex systems of critical infrastructure\u2014which include energy, finance, food and agriculture, healthcare, municipal services, transportation, water and many\u00a0<a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\" target=\"_blank\" rel=\"noopener\">more<\/a>\u2014are vulnerable, and not just to state actors. Even small groups of criminals have left thousands without\u00a0<a href=\"https:\/\/www.nytimes.com\/2023\/09\/07\/us\/power-substation-attacks-washington-guilty.html\" target=\"_blank\" rel=\"noopener\">electricity<\/a>, cut off\u00a0<a href=\"https:\/\/www.nbcnews.com\/news\/us-news\/baltimore-s-911-emergency-system-hit-cyberattack-n860876\" target=\"_blank\" rel=\"noopener\">responders&#8217;<\/a>\u00a0communications in major cities and prevented patients from receiving care at\u00a0<a href=\"https:\/\/www.nbcnews.com\/tech\/security\/emergency-rooms-least-3-states-diverting-patients-ransomware-attack-rcna126890\" target=\"_blank\" rel=\"noopener\">hospitals<\/a>.<\/p>\n<p>These known threats to civilian critical infrastructure are made worse because our national defense is\u00a0<a href=\"https:\/\/www.rand.org\/pubs\/commentary\/2022\/01\/the-future-and-past-of-war-and-disease.html\" target=\"_blank\" rel=\"noopener\">dependent upon<\/a>\u00a0some of these very same systems. For example, the ability of the U.S. military to deploy forces overseas depends upon the civilian\u00a0<a href=\"https:\/\/mwi.westpoint.edu\/cyber-at-sea-protecting-strategic-sealift-in-the-age-of-strategic-competition\/\" target=\"_blank\" rel=\"noopener\">maritime<\/a>\u00a0industry,\u00a0<a href=\"https:\/\/abcnews.go.com\/Technology\/cyberattacks-reported-us-airports\/story?id=91287965\" target=\"_blank\" rel=\"noopener\">airlines<\/a>,\u00a0<a href=\"https:\/\/www.nbcsandiego.com\/local\/port-of-san-diego-hit-with-ransomware-hackers-demanded-payment-in-bitcoin\/50375\/\" target=\"_blank\" rel=\"noopener\">ports<\/a>\u00a0and\u00a0<a href=\"https:\/\/apps.dtic.mil\/sti\/pdfs\/ADA595998.pdf\" target=\"_blank\" rel=\"noopener\" download=\"\">railroads (<abbr title=\"Portable Document Format\">PDF<\/abbr>)<\/a>\u2014all of which have been disrupted by cyberattacks from various bad actors within the past 10 years.<\/p>\n<p>In 2014, the Senate Armed Services Committee\u00a0<a href=\"https:\/\/www.armed-services.senate.gov\/press-releases\/sasc-investigation-finds-chinese-intrusions-into-key-defense-contractors\" target=\"_blank\" rel=\"noopener\">reported<\/a>\u00a0that Chinese hackers repeatedly breached the networks of U.S. Transportation Command&#8217;s civilian contractors, upon whom the military would rely for logistical support in the event of war. As Jen Easterly, the director of the U.S. Cybersecurity and Infrastructure Agency,\u00a0<a href=\"https:\/\/www.nbcnews.com\/tech\/security\/top-us-cyber-official-warns-infrastructure-attack-risk-china-tensions-rcna99625\" target=\"_blank\" rel=\"noopener\">warned<\/a>\u00a0last year, a foreign adversary could choose to target U.S. infrastructure to gain an advantage in a military conflict.<\/p>\n<p>Given these known threats to the U.S. homeland, policymakers from the national to the local level must act now to better prepare their communities for the impacts of critical infrastructure attacks.<\/p>\n<p>Among the first things policymakers can do is improve collaboration, as most critical infrastructure is owned by the private sector and overseen by local governments. Local officials and private companies should work to improve the security of both the physical facilities they manage, as well as their networks. Both groups should also plan for emergencies collaboratively, perhaps incorporating training and exercises with first responders as well.<\/p>\n<p>National decisionmakers should also better evaluate different federal agencies&#8217; ability to manage multiple crises at once. The challenges of the\u00a0<a href=\"https:\/\/www.rand.org\/pubs\/research_reports\/RRA210-1.html\" target=\"_blank\" rel=\"noopener\">COVID-19<\/a>\u00a0pandemic could serve as useful starting points for developing, posturing and resourcing federal departments and agencies to respond to widespread disasters created by attacks on critical infrastructure.<\/p>\n<p>The final piece of preparedness does not come from policymakers, but from the rest of us, as societal resilience is critical to not making the bad effects of critical infrastructure attacks much worse. In 2021, when a ransomware attack shut down the Colonial Pipeline, gasoline shortages were caused not by the direct disruption to supply, but by widespread\u00a0<a href=\"https:\/\/www.npr.org\/2021\/05\/11\/996044288\/panic-drives-gas-shortages-after-colonial-pipeline-ransomware-attack\" target=\"_blank\" rel=\"noopener\">panic buying<\/a>.<\/p>\n<p>Leaders at the local level should therefore engage their communities in preparedness planning. At the national level, leaders should be cognizant of our current state of political polarization. As in any attack meant to sow disruption and division, we do our enemies&#8217; work for them when we panic.<\/p>\n<p>Instead, we may do well to remember the lessons of the last major attack on the U.S. homeland. On Sept. 11, 2001, there was little room for vitriol and prejudice. Instead, if we act with the understanding that the homeland is already under attack, everyday Americans may realize that they are their neighbors&#8217; best hope for safety and security.<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.rand.org\/pubs\/commentary\/2024\/02\/threats-to-americas-critical-infrastructure-are-now-a-terrifying-reality.html??cutoff=true&amp;utm_source=AdaptiveMailer&amp;utm_medium=email&amp;utm_campaign=7014N000001SnimQAC&amp;utm_term=00v4N00000YLEH1QAP&amp;org=1674&amp;lvl=100&amp;ite=284602&amp;lea=580590&amp;ctr=0&amp;par=1&amp;trk=a0wQK0000026QczYAE\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.rand.org<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Los piratas inform\u00e1ticos amenazan los complejos sistemas de infraestructura cr\u00edtica (que incluyen energ\u00eda, finanzas, alimentaci\u00f3n y agricultura, atenci\u00f3n m\u00e9dica, servicios municipales, transporte, agua y muchos&hellip; <\/p>\n","protected":false},"author":1,"featured_media":14167,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/14166"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14166"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/14166\/revisions"}],"predecessor-version":[{"id":14168,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/14166\/revisions\/14168"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/14167"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}