{"id":4058,"date":"2015-06-15T17:08:46","date_gmt":"2015-06-15T17:08:46","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=4058"},"modified":"2019-11-15T22:59:06","modified_gmt":"2019-11-15T11:59:06","slug":"smart-cities-future-utopia-or-inevitable-dystopia","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/smart-cities-future-utopia-or-inevitable-dystopia\/4058\/","title":{"rendered":"Smart Cities \u2013 future Utopia or inevitable Dystopia?"},"content":{"rendered":"<p>Smart cities \u2013 a brilliant concept of various automata assisting humans in their everyday urban lives \u2013 \u00a0had been envisioned way before computers emerged, and had been featured in sci-fi fiction both in Utopian and dystopian tones, depending on the author\u2019s goals. Now it is on the brink of becoming an everyday reality. Still, the question lingers: will it be Utopia or Dystopia?<\/p>\n<p>Will it help to solve those countless problems of modern urbanism, or are we going to get used to sudden-to-regular outbursts of cyber-assisted mayhem instead? Both variants are possible for now.<\/p>\n<p><strong>Outrunning the cautions<\/strong><\/p>\n<p>Technology implementation outrunning cautions and risk estimates is nothing new. Profits and fashion come first, then come \u201cunforeseen consequences\u201d that were actually quite foreseeable, but remained\u00a0ignored for some reason.<\/p>\n<p>Here\u2019s a\u00a0somewhat typical cyberpunk plot: a certain tech company manages to get to the right place, right time and mounts a certain trend, releasing a product which soon becomes ubiquitous. It has its problems (namely, substandard security), but rather than fixing the issues the company uses its now-formidable marketing power to mute and\/or discredit its critics and competitors, while distracting users\u2019 attention from the apparent problems towards its usefulness and utility, as well as \u201clifestyle aspects\u201d, \u201cstatusness\u201d, etc. Then there is the \u201ceveryone makes mistakes\u201d mantra as an ultimate (and hard-to-refute) argument.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#smartcity \u2013 future Utopia or inevitable Dystopia? #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FeV4X&amp;text=%23smartcity+%E2%80%93+future+Utopia+or+inevitable+Dystopia%3F+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Sounds vaguely familiar, does it not? As a matter of fact we\u2019ve seen similar stories in the recent past, when certain software packages have become extremely popular, along with their flaws. Does \u201cSlammer worm\u201d ring a bell?<\/p>\n<p>The \u201cSmart Cities\u201d are a different story\u00a0however: Ultimately there are lives at stake here, not just comfort and efficient performance of urban utilities. The cities are the critical infrastructure (in every possible sense), and if their computerization is conducted without considering security from day one, the problems may be dire and take place on a much more dramatic scale than today\u2019s often discussed issues of critical infrastructure\u2019s cybersecurity. This question must be addressed early on.<\/p>\n<p><strong>Challenges<\/strong><\/p>\n<p>What are the primary challenges with Smart Cities\u2019 information systems, in relation to cybersecurity? Four come to mind immediately:<\/p>\n<ol>\n<li>Large number of technologies and practical solutions that have to interoperate and communicate with each other.<\/li>\n<li>Possible uneven quality of different embedded technologies.<\/li>\n<li>Remote and onsite exploitability of Smart City information systems.<\/li>\n<li>Huge amounts of data to analyze and store.<\/li>\n<\/ol>\n<p>It\u2019s easy to see that the familiar cybersecurity issues are intertwined with each of them. On the most superficial level, interoperability and intercommunication between various systems means that hackers may try to exploit weaknesses in one system to seize control over another, more important one. For instance: exploiting an on-board Wi-Fi system in a modern passenger jet to get a grip on its avionics \u2013 then extrapolate this on a city-wide scale. Unless the networks are isolated from each other properly, this is a possibility.<\/p>\n<p>Then there is \u201cuneven quality\u201d \u2013 most likely, there is going to be a hotchpotch of technologies belonging to different generations.<\/p>\n<p>We have already seen how it may look: The essential reason there are problems with \u201cmodern\u201d industrial\/utility critical systems is that those are often anything but modern. At the same time, they are retrofitted with connectivity that wasn\u2019t there when these systems were designed and built. We have <a href=\"https:\/\/business.kaspersky.com\/so-malware-attacks-against-critical-infrastructure-are-inevitable-whats-next-2\/2647\" target=\"_blank\" rel=\"noopener nofollow\">written about this before<\/a>.<\/p>\n<p>The possible hackability of the smart cities systems, by the way, is well illustrated by the recent research of video surveillance systems in a certain city \u2013 <a href=\"https:\/\/securelist.com\/blog\/research\/70008\/does-cctv-put-the-public-at-risk-of-cyberattack\/\" target=\"_blank\" rel=\"noopener\">published at Securelist<\/a>. The urban CCTV network proved to have a number of weaknesses, from sloppy set up and unprotected labeling of the hardware to unencrypted data transmittance, etc.<\/p>\n<p>The research is definitely worth reading, as it has a number of important insights on how the most unexpected things may undermine security.<\/p>\n<p>Then there is Big Data and its associated security problems <a href=\"https:\/\/business.kaspersky.com\/in-the-age-of-big-data-risks-are-big-too\" target=\"_blank\" rel=\"noopener nofollow\">to be solved<\/a>.<\/p>\n<p>And all of these problems, along with many others, should be considered ahead of the \u201csmartening\u201d of every city.<\/p>\n<p><strong>A side-topic: a jet case<\/strong><\/p>\n<p>\u2026What have I said about hacking a plane? Well, <a href=\"https:\/\/www.kaspersky.com.au\/blog\/hack-it-in-the-air\/\" target=\"_blank\" rel=\"noopener\">according to Kaspersky Lab\u2019s Andrey Nikishin<\/a>, Head of Future Technology Projects, avionics data are usually transmitted via an isolated bus, not connected to Wi-Fi and\/or onboard entertainment network.<\/p>\n<p>However, the U.S. Federal Aviation Administration <a href=\"http:\/\/archive.wired.com\/politics\/security\/news\/2008\/01\/dreamliner_security\" target=\"_blank\" rel=\"noopener nofollow\">reportedly warned Boeing seven years ago<\/a> that it had a flaw in the Wi-Fi design of Boeing 787 Dreamliner jets, as well as Airbus A350 and A380 aircrafts, that make them vulnerable to hacking. In April of this year, the FAA <a href=\"http:\/\/www.wired.com\/2015\/04\/hackers-commandeer-new-planes-passenger-wi-fi\/\" target=\"_blank\" rel=\"noopener nofollow\">reported<\/a> that Dreamliner may be still hackable.<\/p>\n<p>And a certain cybersecurity consultant going by the name Chris Roberts bragged all over Twitter that he has managed to hack into jet\u2019s control systems. Roberts ended up enjoying the FBI\u2019s hospitality, despite the lack of any actual harm inflicted, and according to court records, he told FBI officers that he had indeed hacked into computer systems aboard airliners up to 20 times and <a href=\"http:\/\/edition.cnn.com\/2015\/05\/17\/us\/fbi-hacker-flight-computer-systems\/\" target=\"_blank\" rel=\"noopener nofollow\">managed to control an aircraft engine during a flight<\/a>.<\/p>\n<p>Unless Roberts was lying, there is indeed a critical flaw in the plane\u2019s systems. If critical and non-critical networks are indeed separated by a firewall alone (and firewalls are hackable, you know?), these jets are, mildly put, insecure.<\/p>\n<p>Imagine something similar on a city-wide level. Or watch \u201c<a href=\"http:\/\/en.wikipedia.org\/wiki\/Live_Free_or_Die_Hard\" target=\"_blank\" rel=\"noopener nofollow\">Live Free or Die Hard<\/a>\u201d (aka \u201cDie Hard 4.0\u201d), as it really gives a proper picture \u2013 except for the fact that a single hero wouldn\u2019t be enough to clean up the resulting mess.<\/p>\n<p><strong>Thinking ahead of trouble<\/strong><\/p>\n<p>\u201cRetrofitted and added cybersecurity\u201d is not an option for the Smart Cities concept: risks are too dire to build \u201cseven cities of cyber-Troy\u201d upon each other. Our position here is that cybersecurity should be considered early on, at every possible level.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Retrofitted #cybersecurity is not an option for the #smartcity concept.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FeV4X&amp;text=Retrofitted+%23cybersecurity+is+not+an+option+for+the+%23smartcity+concept.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>That\u2019s the reason why a number of leading IT security companies, including, of course, Kaspersky Lab, are joining the Securing Smart Cities non-profit global initiative, launched late in May.<\/p>\n<p>The initiative aims to solve the cybersecurity challenges smart cities face through collaboration and information sharing. The group will serve as a communications node for business entities, governments, media outlets, not-for-profit initiatives, and individuals across the world involved in the creation, improvement, and promotion of smart and safe technologies for modern cities. The initiative also aims to solve cyber-problems at every stage of a smart city\u2019s development: from planning to the actual implementation of smart technologies.<\/p>\n<p>Smart Cities are inevitable, and so are problems to be solved. But the number of the issues would be decreased dramatically with a proper \u201csecurity from the ground up\u201d approach. And that is what the new initiative is all about.<\/p>\n<p>More details about it are available <a href=\"http:\/\/securingsmartcities.org\/\" target=\"_blank\" rel=\"noopener nofollow\">at the official site<\/a> of the initiative.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cRetrofitted and added cybersecurity\u201d is not an option for the Smart Cities concept: risks are too dire to build \u201cseven cities of cyber-Troy\u201d upon each other. Our position here is that cybersecurity should be considered early on, at every possible level.<\/p>\n","protected":false},"author":209,"featured_media":15662,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[756,2313],"class_list":{"0":"post-4058","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-critical-infrastructure","10":"tag-smartcity"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/smart-cities-future-utopia-or-inevitable-dystopia\/4058\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/smart-cities-future-utopia-or-inevitable-dystopia\/4058\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/smart-cities-future-utopia-or-inevitable-dystopia\/8421\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/smart-cities-future-utopia-or-inevitable-dystopia\/4058\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/critical-infrastructure\/","name":"critical infrastructure"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=4058"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4058\/revisions"}],"predecessor-version":[{"id":24743,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4058\/revisions\/24743"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15662"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=4058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=4058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=4058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}