This is beyond belief. You would think that in a prison where security is chief and the price the feds pay to build a secure prison that this would be impossible. But alas, it is not and if the consequences were not so disasterous it would be funny. For sure, this is the stuff of books and movies.
MIAMI — Federal authorities are concerned about new research showing U.S. prisons are vulnerable to computer hackers, who could remotely open cell doors to aid jailbreaks.
Mr. Burke was reacting to research by private experts who found that the security systems in most American prisons are run by computer software vulnerable to hackers.
“You could open every cell door, and the system would be telling the control room they are all closed,” said John J. Strauchs, a former CIA operations officer who helped develop a cyber-attack on a simulated prison computer system and described it at a hackers’ convention in Miami last week.
The security systems in most American prisons are run by special computer equipment called industrial control systems, or ICS. They are also used to control power plants, water treatment facilities and other critical national infrastructure. ICS has increasingly been targeted by hackers because an attack on one such system successfully sabotaged Iran’s nuclear program in 2009.
A malicious cyber-intruder could “destroy the doors,” by overloading the electrical system that controls them, locking them permanently open, said Mr. Strauchs, now a consultant who has designed security systems for dozens of state and federal prisons..
Hackers could “shut down secure communications” through the prison intercom system and crash the facility’s closed-circuit television system, blanking out all the monitors, he added.
Mr. Strauchs, 67, and his daughter — attorney, professor and computer security researcher Tiffany Strauchs Rad , 37 — told an audience at the Hacker Halted conference about the attack they developed in the basement of a Washington area home for less than $2,500.
“Personally, I think the greatest danger is assassination,” Mr. Strauchs told The Washington Times afterward. “You create chaos as a way to [implement a plan to] kill someone.”
Mr. Strauchs said he and his daughter had been careful to work with U.S. authorities to alert them to the risk before publicly disclosing their attack. They organized a briefing for federal agencies over the summer at CIA headquarters in Northern Virginia.
Sean P. McGurk, who led the Department of Homeland Security’s efforts to secure ICS until leaving in September, said the department had looked into the researchers’ claims using the special ICS computer test bed at the Idaho National Laboratory.
“We validated the researchers’ initial assertion … that they could remotely reprogram and manipulate” the special software controllers that run the systems, Mr. McGurk said.
Teague Newman, another member of their team, said ICS systems are not supposed to be connected to the Internet.
“But in our experience, there were often connections” to other networks or devices, which were in turn connected to the Internet, making them potentially accessible to hackers, he said.
In some of the facilities the team visited for their research, guards had used the same computer that controls the prison’s security systems to check their personal email, exposing it directly to potential hackers, Mr. Teague said.