The messiness of politics and the vulnerability of the Internet of Things in one big, unwieldy package.

Sara Peters, Senior Editor

July 1, 2015

6 Min Read

It's no secret that Internet of Things devices like Nest smart meters and Fitbits are behind the curve on information security -- lax encryption and access control standards for both wireless network and data security, for starters. So what about when IoT devices run a "smart city," and the public water system, power grid, waste management, traffic control, street lighting, public transportation, and physical security systems are all as vulnerable as that Fitbit on your wrist?  

"Most cities around the world are unprotected to cyber attacks," says Cesar Cerrudo, CTO of IOActive. At DEF CON last year, Cerrudo presented research about serious vulnerabilities in vehicle traffic control systems, which could be exploited to cause traffic jams or crashes. His studies inspired him to create Securing Smart Cities, a global non-profit initiative established in May by IOActive, Kaspersky Lab, Bastille, and the Cloud Security Alliance with the purpose of better definining the security challenges of smart cities and finding workable solutions.  

"Cities are really important, because they're the backbones of civilization. They're the backbones of economy," says Greg Conti, associate professor and director of the Army Cyber Institute at West Point. Conti, along with West Point associate professor David Raymond and Drawbridge Networks CTO Tom Cross, will be presenting a session on "Pen Testing a City" at the Black Hat Briefings in August.

"We're going to be looking at the security of cities, whether they're dumb, moderately intelligent or smart," says Conti.

What makes cities, particularly "smart" cities, uniquely challenging?

Insecure Products & Insufficient Testing

One of the biggest concerns about smart buildings and smart cities is that the sensors in the equipment can be hacked and fed fake data -- which could be used for all manner of mischief, like causing signal failures that shut down subways or allowing contaminants into the water supply.

"Most product vendors are releasing hardware, software without any security, and governments are releasing it without any testing," says Cerrudo. Although they may test rigorously for functionality, cybersecurity won't be part of the process. Cerrudo discovered there were 200,000 vulnerable traffic control sensors installed in cities across the world, including New York, Washington D.C., and London.

Cross says that people's attitudes toward new technology's vulnerabilities often slide through something like the five stages of grief. First it's "denial," when they remain too enamored of the technologies' fun functions to consider the risks. Then they'll move through "anger," "bargaining," "depression," and eventually "acceptance." "Smart cities technology are following the same pattern," he says, and there's still a long way to go before we reach acceptance.

As Cerrudo wrote in a report in April, "At IOActive Labs, we continue to see vendors that do not know anything about cyber security; they lack skilled security people and don’t seem interested in improving security. For instance, many vendors don’t object to giving full privileged access to a device or system to anyone who is on a local network, because they think of the internal network as safe."

Huge, Complex Attack Surface

The trouble is, the notion of "internal network" doesn't really translate to smart cities. The trend is, the smarter the city, the more computer systems, the more integration between the systems, and the more open the access to the data collected by all those systems. 

As futurologist Dr. Simon Moores said at the IFSEC conference last month, the task of integrating an entire city of buildings outfitted with smart electric meters, doors, HVAC systems, and lighting is an "almost intractable problem."

Cross explains that the challenge of integration is not just technological; it's about all the operational interdependencies that exist in a city. "If the subway shuts down, people can't get to their jobs, and then other things don't get done," he says.

Cerrudo explains that attackers know about this "cascade effect," and that they can use it to their advantage by launching an attack on a small, poorly secured system that doesn't seem very critical, and setting off a chain reaction.

The definition of "critical" may vary from city to city, too. Cross says to look at something like Las Vegas. "The economy is very dependent on casinos," he says, "but casinos are not considered critical infrastructure."

The degree of complexity also varies by the age and the size of the city -- an aspect Conti, Cross, and Raymond plan to discuss at Black Hat. "We're getting a sense there may be a sweet spot," says Conti. A city that's somewhere in the middle in terms of size and age, "small enough that it can get its arms around its technology," using "new but not necessarily bleeding-edge" technology" seems to have the best chance of success. "We thought that was an interesting dynamic," he says.

Lack of Oversight and Organization

At IFSEC, Moores posed the rhetorical question, "Who's responsible when a smart city crashes?"

Other experts agree that in many cities there is still no clear cybersecurity leadership, and that cities need to establish city-specific CERTs and/or security operations centers -- not just for information sharing, but also for cross-function vulnerability assessment and incident response planning.

"Each fiefdom can't develop infrastructure in a vacuum," says Cross.

IOActive's Cerrudo says cities need to start treating cybersecurity in the same way the private sector does.

Shifting Politics, Shifting Budgets

That's all easier said than done.

"Cities are ultimately political beasts, with responsibilities to the populace," and with that comes increased visibility, Conti says. That increased visibility can ultimately be either good or bad for security, but either way it will be subject to public scrutiny in a way that regular companies don't need to consider.

Plus, getting budget for security always requires a process of educating leaders and obtaining their buy-in. However, in the public sector, the leaders and the budgets may change severely every time there's an election.

"If [the elected official gets] tossed out, you have to start the process over again," Cross says. 
"You constantly have to reeducate and resell."

Conti adds that often there will be a failure or a breach that is the event that transforms a leader's attitude towards security. "The new leader," he says, "hasn't gone through the same transformative event."

And the security skills shortage tends to be worse in the public sector, according to Cross. "The most talented people work in the private sector," he says, "because they get better salary and compensation."

"Security problems in cities are real and are current," Cerrudo says. "The possibilities are out there ... So we need to start working on improving security right now."

Read more about:

Black Hat News

About the Author(s)

Sara Peters

Senior Editor

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights