Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Tuesday February 19 2019, @03:37PM   Printer-friendly
from the did-they-check-the-evil-bit? dept.

Padar's militia of amateur IT workers, economists, lawyers, and other white-hat types are grouped in the city of Tartu, about 65 miles from the Russian border, and in the capital, Tallinn, about twice as far from it. The volunteers, who've inspired a handful of similar operations around the world, are readying themselves to defend against the kind of sustained digital attack that could cause mass service outages at hospitals, banks, and military bases, and with other critical operations, including voting systems. Officially, the team is part of Estonia's 26,000-strong national guard, the Defense League.

Formally established in 2011, Padar's unit mostly runs on about €150,000 ($172,000) in annual state funding, plus salaries for him and four colleagues. (If that sounds paltry, remember that the country's median annual income is about €12,000.) Some volunteers oversee a website that calls out Russian propaganda posing as news directed at Estonians in Estonian, Russian, English, and German. Other members recently conducted forensic analysis on an attack against a military system, while yet others searched for signs of a broader campaign after discovering vulnerabilities in the country's electronic ID cards, which citizens use to check bank and medical records and to vote. (The team says it didn't find anything, and the security flaws were quickly patched.)

Mostly, the volunteers run weekend drills with troops, doctors, customs and tax agents, air traffic controllers, and water and power officials. "Somehow, this model is based on enthusiasm," says Andrus Ansip, who was prime minister during the 2007 attack and now oversees digital affairs for the European Commission. To gauge officials' responses to realistic attacks, the unit might send out emails with sketchy links or drop infected USB sticks to see if someone takes the bait.


Original Submission

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(1)
  • (Score: 0) by Anonymous Coward on Tuesday February 19 2019, @04:31PM (2 children)

    by Anonymous Coward on Tuesday February 19 2019, @04:31PM (#803521)

    When will I T wake up and stop connecting critcal operations to the internet?

    There are good and bad reasons to do so but security DO NOT COME NNECT IF NNOOTT NEEDED!!

    • (Score: 3, Touché) by DannyB on Tuesday February 19 2019, @05:09PM (1 child)

      by DannyB (5839) Subscriber Badge on Tuesday February 19 2019, @05:09PM (#803541) Journal

      For real safety critical infrastructure should t not bbe connected tto the internet. It sshuould be dial up. That way critLGOical infrasGJSl2GK sgl22 lh6l2 a

      NO CARRIER

      --
      The lower I set my standards the more accomplishments I have.
      • (Score: 0) by Anonymous Coward on Tuesday February 19 2019, @06:42PM

        by Anonymous Coward on Tuesday February 19 2019, @06:42PM (#803599)

        good one ... but unfortunately the IOT hack will leave you in a state where the "NO CARRIER" message cannot even be displayed or reported.
        this should acctually be the test: if the system craps out (gets hacked) and leaves you in a state that the "NO CARRIER" msg cannot be communicated to the user then something very very bad got hocked up that shouldn't be hocked up and shouldn't be reachable from any point on the internet ?

(1)