White House Chronicle

News Analysis With a Sense of Humor

  • Home
  • King’s Commentaries
  • Random Features
  • Photos
  • Public Speaker
  • WHC Episodes
  • About WHC
  • Carrying Stations
  • ME/CFS Alert
  • Contact Us

Utilities Beware: The Whole IoT Is At Risk From Itself

November 26, 2022 by Llewellyn King Leave a Comment

Has the internet of things — the vast, interconnected, computer-centered ecosystem of today — reached a point where it is so complex, so multilayered, has so many architects, and has so many national interests embedded in it that it has become a threat to itself?

Will the electric grid, the financial system or the air traffic control apparatus implode not by the hand of a malicious hacker but because the system — which is now systems of systems — has become the most subtle threat it faces?

Worse, as the speed of telephony increases with 5G, will that speed up the system implosion with devastating consequences?

Will this technological meltdown be triggered from within by a long-forgotten piece of code, a failed sensor or inferior products in vital, load-bearing points in this system?

This kind of disaster from complexity is known as “emergent behavior.” Remember that concept. Likely, you will hear a lot about it going forward.

Emergent behavior is what happens when various objects or substances come together and trigger a reaction which can’t be predicted, nor can the trigger be predetermined.

Robert Gardner, founder and principal at New World Technology Partners and a National Security Agency consultant, tells me that the computer ecosystem is highly subject to emergent behavior in the so-called complex, adaptive system of systems which is today’s cyberworld. It is a world which has been built over time with new layers of complexity added willy-nilly as computing, and what has been asked of it, has become a huge, impregnable structure, beyond the reach of its present-day architects and minders, including cybersecurity aficionados.

In At The Creation

Gardner, to my mind, is worth listening to because he was, if you will, in at the beginning. At least, he was on hand and worked on the computer evolution, starting in the 1970s when he helped build the first supercomputers and has consulted with various national laboratories, including Lawrence Livermore and Los Alamos. He has also played a key role in the development of today’s super-sophisticated financial computing infrastructure, known as “fintech.”

Gardner says of emergent behaviors in complex systems, “They can’t be predicted by examining individual components of a system as they are produced by the system as a whole — facilitating a perfect storm that conspires to produce catastrophe.”

Complexity is the new adversary, he says of these huge, virtual systems of systems.

Gardner adds, “The complexity adversary does not require outside assistance; it can be summoned by minor user, environmental or equipment failures, or timing instabilities in the ordinary operation of a system.

“Current threat detection software does not seek or detect these system conditions, leaving them highly vulnerable.”

Gardner cites two examples where the system failed itself. The first example is when a tree branch which fell on a power line in Ohio set in motion a blackout across the Michigan, New York, and Canada. The system became the problem: It went berserk, and 50 million people lost power.

The second example is how something called “counterparty risk” sped the demise of Lehman Brothers, the Wall Street colossus. That was when a single default embedded in the system initiated the implosion of the whole structure.

No Nefarious Actors

Of these, Gardner says, “There were no nefarious actors to defend against; the complex, heterogeneous nature of the systems themselves led to emergent behaviors.”

Going forward, the best practices in cyber hygiene won’t defend against catastrophe. The entwined systems are their own enemy. Utilities take note.

And the danger may get worse, according to Gardner.

The villain is 5G: the super-fast phone and data system now being deployed across the country. It will come in what are called “slices,” but for that you can read stages.

· Slice one is what is being built out now: It is faster than today’s 4G, which is what phones and data use currently. It features mobile broadband.

· Slice two, called “machine to machine,” is faster yet.

· Slice three will move vast quantities of data at astounding speeds which, if the data is damaging to the system and has occurred at an unidentifiable location, represents a threat to a whole tranche of human activity.

Self-destroying machines will be unstoppable when they have 5G slice three to speed bad information throughout their system and connected systems. Tech Armageddon.

Email, RSS Follow
Email

Filed Under: King's Commentaries

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

White House Chronicle on Social

  • Facebook
  • Twitter
  • Vimeo
  • YouTube
IRENA Panel Urges Youth To Move from Anger to Action on Energy Transition

IRENA Panel Urges Youth To Move from Anger to Action on Energy Transition

Linda Gasparello

ABU DHABI, United Arab Emirates — Greta Thunberg, the Swedish climate change canary, didn’t participate in the 13th assembly of the International Renewable Energy Agency (IRENA), held in Abu Dhabi on Jan. 14 to 15. Perhaps it was because she was otherwise engaged in protesting against the razing of the German village of Lützerath for […]

Big Tech First Cornered the Ad Market, Now Practices Censorship

Big Tech First Cornered the Ad Market, Now Practices Censorship

Llewellyn King

Big tech has siphoned off advertising and wants to be a global censor.  The Department of Justice has filed suit against Google for its predatory advertising practices. Bully! Not that I think Google is inherently evil, venal or greedier than any other corporation. Indeed, it is a source of much good through its awesome search […]

Going Green Is a Palpable Need but a Tough Transition

Going Green Is a Palpable Need but a Tough Transition

Llewellyn King

ABU DHABI, United Arab Emirates — I first heard about global warming being attributable to human activity about 50 years ago. Back then, it was just a curiosity, a matter of academic discussion. It didn’t engage the environmental movement, which marshaled opposition to nuclear and firmly advocated coal as an alternative. Twenty years on, there […]

My Adventures With Classified Documents

My Adventures With Classified Documents

Llewellyn King

It is easy to start hyperventilating over classified documents. It isn’t the classification but what is in the documents that counts. Much marked classified is rubbish. I have been around the classification follies for years. In 1970, I did what might be called a study, but it was just a freelance article on hovercraft use […]

Copyright © 2023 · White House Chronicle Theme on Genesis Framework · WordPress · Log in