Hacking the Russian Power Grid

Jun 18, 2019 · 14 comments
Thomas Busse (San Francisco)
What about the Israeli Talpiot program? There were so many Soviet "refugees" to Israel in the 80's and 90's who now work in high technology in Israel (it's little known but much of Soviet persecution was at the behest of the Israeli government in order to obtain settlers), and most major US tech firms as well as the Pentagon have substantial operations in Israel. In recent years, there have been major Israeli investments into China with technology transfer, and the leaked Diplomatic Cables showed Rice ordered the US to spy on Israel due to leaking US Technology. If anyone is able to throw a kill switch on the grid or on the internet, it would be Israel. In other words, Isn't it more likely that any US infiltration efforts are being funneled to China/Russia via Israel, perhaps with the cooperation of US officials in government and corporations such as David Ivry? One part of the whole Russiagate issue that was never truly investigated was the Alfa Bank phenomenon.
A Eeyore (UK)
Another great thought provoking article that's also perhaps a bit scary. In terms of the Geneva convention and cyberwarfare perhaps there should also be a look at developing the morals of the forced used along the lines of 'Jus ad Bellum' or maybe 'Jus ad Vim' as well?
TZ (Ohio)
Another great episode. The first twenty minutes had a pro-Trump feel to it. Finally, the guy seems to have made a good decision. Even a broken clock, etc....But, then, the final 10 minutes of "fake news" came. BTW, what is the piano piece that ended the Russian Grid part? I would like to listen to more of it.
David (NYC)
The big issue with cyber attack’s that no one is talking about; why are all these sensitive operations running Microsoft Windows? Is a very insecure OS with a ton of malware and viruses. Plus it’s full of bugs. Remember that time the US Army had its webpage defaced? They switched to a macOS server and it was hack proof. At the very least run a secure Unix server.
Rick Howard (Santa Clara, CA)
Excellent interview with David Sanger today. Is there a way to get a text transcript of the interview?
Felipe (└A)
@Rick Howard Transcript avail by clicking on the little text block icon to the right of the timeline, left of the speaker/sound icon!
Jacqueline (New York)
Hi, what was the name of the piano piece at the end of the main segment on cyber tactics? Thanks
Jo (Canada)
@Jacqueline I would also really like to know it's name... It's too bad it's not written anywhere in the credits. I would love to find it's name?
Adriene (Bailey)
Gail - sad that your opening volley is a gender based dig that has no substance but plays to negative images and historical subjugation of women - which has NOTHING to do with the job SHS did. You can do better.
Felipe (└A)
Anyone know the name of the piano song that played at the tail end of the A block? Is it Russian?
TZ (Ohio)
@Felipe It reminded me of Amelie's Waltz, but i am also interested. https://www.youtube.com/watch?v=isLHx3tDXr8 https://www.youtube.com/watch?v=bn1hbNwLWhE
PC (Aurora, Colorado)
First off: thank you Michael Barbaro, Eric Krupke, Luke Vander Ploeg, Jessica Cheung, Larissa Anderson and David Sanger. Give up certain cyber capabilities in hopes that our adversaries will follow certain ‘norms’ of electronic warfare? Who’s smoking? Has pot been legalized in Washington? I’ll cut to the chase. My opinion only. 1. There are no norms 2. Defensive posture only. Lethal defensive, as in when they attack, it’s suicide. 3. Go after the money. Don’t bother with cutting electricity to hospitals or taint water the supply, just go after the Swiss or Malta bank accounts of the Leaders, e.g. Putin. It’s more humane and just as effective. 4. Don’t publish your actions. Your enemies will find out soon enough. 5. Develop a custom language based upon a custom chip whose compiler or interpreter exists only in the US. This should make reverse engineering more difficult. 6. No scripts. 7. No stupid people. Do not pick up thumb drives. Do not click on -anything- within an email. Hackers loathe effort, even computer effort. They will always want you to do most of the work. 8. Do not trust your Commander in Chief if their inept. If our adversaries lack the capacity to worship God, and they become more venal in their actions, then the US will have to retreat back unto itself, physically and electronically, in order to survive.
Katherine Stahl (Cambridge MA)
The Daily is my essential go-to. Today’s cyber security article uncovers the history, the strategy -what we all need to know. Thank you!!! And last week’s all week coverage of European populism, the desire to end liberal democracy, was just terrific. In this terribly frightening time, your in depth coverage helps me to stay focused instead of running from the news!
Barbara (Yonkers NY)
An excellent point made that federal support for tuition assistance and debt forgiveness should not be paying for climbing walls and water parks. Colleges should be required to charge for those kinds of luxuries with separate fees that won’t be covered. Then students and families will be free to choose between amusement parks with classrooms (where they will pay more out of pocket ) and colleges like the CUNY system that already offer excellent faculty and programs on no-frills campuses with nationally -lauded low tuition rates.