Colonial Pipeline

I suppose the operation of a pipeline requires coordinated control of pumps and valves along its 5000 mile length. This could certainly be done securely.

  • Employees at stations along the pipeline could operate the equipment. Instructions could come from telephone calls, couriers, or text messages. This would be crude and expensive but secure.
  • A private communication network with telephone wires or radio communication links is possible. This would also be secure, but expensive.

Evidently the designers decided to use cheap computers and internet communications. This left the pipeline vulnerable to hackers. It was a cheap solution, but not secure. The design evidently had no provisions for backup, so when the computer system was attacked, the flow of fuel ceased.

The company decided to pay ransom. I believe this should be illegal. If companies were forbidden to pay, the ransomware criminals would be out of business. Paying guarantees future attacks.

About whungerford

* Contributor at NewNY23rd.com where we discuss the politics, economics, and events of the New New York 23rd Congressional District (Allegany, Cattaraugus, Chautauqua, Chemung, (Eastern) Ontario, Schuyler, Seneca, Steuben,Tioga, Tompkins, and Yates Counties) Please visit and comment on whatever strikes your fancy.
This entry was posted in Terrorism and tagged . Bookmark the permalink.

1 Response to Colonial Pipeline

  1. josephurban says:

    Paying a ransom is “positive reinforcement”. Like training a dog. He sits, he gets a treat. That is why you never pay hostage takers. It only serves as a reward and encourages future behavior.

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.