{"id":103486,"date":"2019-11-18T06:00:45","date_gmt":"2019-11-18T14:00:45","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=103486"},"modified":"2020-04-21T14:17:00","modified_gmt":"2020-04-21T21:17:00","slug":"cyber-canon-blackout","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/11\/cyber-canon-blackout\/","title":{"rendered":"Cybersecurity Canon Candidate Book Review: Blackout: Tomorrow Will Be Too Late"},"content":{"rendered":"<p><span style=\"font-weight: 400;\"><strong>Cyber Canon Book Review:<\/strong>\u00a0\"<\/span><span style=\"font-weight: 400;\">Blackout: Tomorrow Will Be Too Late,\" by Marc Elsberg<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Book Reviewed by:<\/strong> Sergej Epp, Chief Security Officer, Central Europe<\/span><\/p>\n<p><b>Bottom Line: <\/b><i><span style=\"font-weight: 400;\">I recommend this book for the Cybersecurity Canon Hall of Fame.<\/span><\/i><b>\u00a0<\/b><\/p>\n<p><b>Review:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Our modern society will not work without electricity. It gives us warmth, light, food and the possibility of social connectivity through the internet and mobile phones. Electricity is an indispensable, integral part of everybody\u2019s life in the twenty-first century. But what happens if we suddenly lose this privilege?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cBlackout\u201d is <\/span><span style=\"font-weight: 400;\">a conspiracy thriller describing an intercontinental collapse of power grids<\/span><span style=\"font-weight: 400;\"> caused by a terrorist group. It\u2019s an exciting thriller about a former hacker and IT professional trying to hunt for a terrorist group that used cyber and physical-enabled attacks to cause a collapse of the electrical grids across Europe.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The author describes, in a well-researched way, how simple tampering with smart meter software could cause a domino effect leading to a fatal disaster for our society. Since its release in 2012 (German) and 2017 (English), this book contributed significantly to the discussion about the vulnerabilities in critical infrastructure and the importance of cybersecurity in its journey to digitalization. For example, in 2014, \u201cBlackout\u201d was selected as Scientific Book of the Year by the German Scientific Society. Since then, Marc Elsberg has been invited on a regular basis to professional cybersecurity conferences to discuss critical infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The story starts with Piero Manzano, a former hacker who discovers malicious code installed on his smart meter at home before the blackout. After recognizing that the backdoor can be used to switch off smart meters, which he believes to be a potential root cause for the outages, Piero tries to warn local law enforcement. Because nobody takes him seriously, he starts an investigation on his own. Very soon, he identifies further traces proofing a cyber-attack on the Europeen power grid. However, the perpetrators are very successful in hiding their traces, making it difficult for Manzano to uncover them. Moreover, Monzano himself soon becomes a prime suspect, after a suspicious email emerges, suggesting he\u2019s one of the conspirators.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s an almost realistic scenario about the dependencies of our society on electricity and what happens if we lose it, starting from a simple toilet flush or gas stations not working anymore up to a nuclear disaster, which can be caused due to a lack of electricity for nuclear plants.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This book touched me personally when I read it the first time a few years ago, since I myself, probably due to the influence of my cybersecurity career, anticipate technical facts of vulnerabilities in our journey to digitalization more emotionally than the average person.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most novels - especially thrillers - lack realistic explanations of cybersecurity or its dependencies. On the other hand, professional cybersecurity books are often not exciting enough for non-cybersecurity people.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0In \u201cBlackout,\u201d Elsberg successfully combines both a thrilling story with well-researched facts about the potential impact of a cyber-enabled sabotage campaign against electricity providers in Europe.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this book, the terrorist used a vulnerability\/backdoor in smart meters in order to manipulate demand for electricity on a massive scale. One of the sabotage techniques used by the terrorist is manipulation of several power plants and electricity switching points by malware. Manzano discovers a relationship between all the power plants causing the problems. Apparently, all affected power plants used the same software from a fictitious software developer called Talaefer. Furthermore, there is an indication that the chief architect of this company introduced a hidden backdoor into the same SCADA software prior to its release. As a result of this manipulation, the European grid frequency was heavily destabilized due to power fluctuations. Step by step, this triggers blackouts across all of Europe.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Extreme and rapid power fluctuations are indeed a serious problem as <\/span><a href=\"https:\/\/www.zeit.de\/2012\/50\/Stromversorgung-Winter-Blackout-Marc-Elsberg-Jochen-Homann\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">confirmed by the German Federal Network Agency<\/span><\/a><span style=\"font-weight: 400;\"> and also proven in incidents like the <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Northeast_blackout_of_2003#Water_supply\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">US Northern blackout of 2003<\/span><\/a><span style=\"font-weight: 400;\">. Supply of electricity always has to be matched by equal demand to avoid a crash of electrical grids. On the other hand, it\u2019s obviously possible to manipulate smart meters at scale in an easy way. Security Researcher Mike Davis <\/span><a href=\"https:\/\/www.darkreading.com\/risk-management\/black-hat-smart-meter-worm-attack-planned\/d\/d-id\/1081747\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">showed this initially<\/span><\/a><span style=\"font-weight: 400;\"> at Blackhat 2009, and with IoT malware like <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Mirai_(malware)\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Mirai<\/span><\/a><span style=\"font-weight: 400;\">, it\u2019s been proven at a large scale in the wild by cyber criminals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The topic of supply-chain vulnerabilities gained a lot of press attention since the <\/span><a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2018-10-04\/the-big-hack-the-software-side-of-china-s-supply-chain-attack\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">controversial Bloomberg story<\/span><\/a><span style=\"font-weight: 400;\"> in<\/span><span style=\"font-weight: 400;\"> 2018. The security community agrees that beyond proper code checks for vulnerabilities there should be zero-tolerance for weaknesses in the software development process around critical infrastructure such as lack of segregation of duties, the four-eye principle and proper release management.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most of us have experienced an electricity blackout for a few minutes or hours, due to a downed power line or some other reason. However, I had never thought about how bad the complications might be after a few days without electricity. Some immediate effects are clear to all of us: <\/span><span style=\"font-weight: 400;\">frozen food starts to melt, internet and lights stop working, the gas stations will not be able to provide fuel and you won\u2019t be able to flush the toilet, etc. However, humans and animals would also be in danger very soon simply due to traffic chaos or people stuck in elevators. Cows would suffer because milking machines could no longer pump their milk. Elsberg describes these chain reactions step by step, covering how the situation evolves to a horrible disaster due to failing cooling systems in nuclear plants and the closing of hospitals. It\u2019s not a surprise that this part sounds so realistic because Elsberg sourced a <\/span><a href=\"http:\/\/www.tab-beim-bundestag.de\/de\/pdf\/publikationen\/berichte\/TAB-Arbeitsbericht-ab141.pdf\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">scientific study<\/span><\/a><span style=\"font-weight: 400;\"> on \u201cThreats and Vulnerabilities of Modern Societies based on example of Electricity Blackout,<\/span><span style=\"font-weight: 400;\">\u201d<\/span> <span style=\"font-weight: 400;\">created for the German parliament.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the book, Manzano is still able to use the internet from multiple locations, like the Europol headquarters, during the blackout. While the classical internet protocols were made with the purpose of surviving such scenarios or even a nuclear war, readers question if the internet will still be available during a nationwide or even continent-wide blackout. Considering the fact that some websites or internet services are hosted outside of Europe, and therefore not affected by blackout, emergency generators and satellite uplinks can be used to establish internet connectivity. Furthermore, multiple countries are running independently powered networks for critical communication, such as BDBOS in Germany. A recent blackout in Venezuela in 2019 is a good example, which shows that even countries with limited investment in network infrastructure will not lose 100% of connectivity <\/span><a href=\"https:\/\/netblocks.org\/reports\/venezuela-knocked-offline-amid-nationwide-power-outage-PW801YAK\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">in such a scenario<\/span><\/a><span style=\"font-weight: 400;\">.<br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Overall, this book is a thrilling and intelligently written novel, which addresses the concerns of our modern digitalized society, the related cybersecurity concerns and dependency on electricity. While some technical and story details are not completely accurate (e.g. how is a terrorist able to travel from Turkey to Brussels without a plane?), t<\/span><span style=\"font-weight: 400;\">he general threats projected in this thriller are very real. In 2015, we saw in Ukraine the first real <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/December_2015_Ukraine_power_grid_cyberattack\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">cyberattacks on power grids<\/span><\/a><span style=\"font-weight: 400;\"> in the wild. Consequently, it's more than important to create awareness and explain the potential implications of a serious cyberattack to public society and decision makers.<\/span> <span style=\"font-weight: 400;\">Sometimes all you need to anticipate a complex topic is a novel told in a thrilling and simple way.<\/span><\/p>\n<p><i>We modeled the\u00a0<\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/\"><i>Cybersecurity Canon<\/i><\/a><i>\u00a0after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that.\u00a0Please write a review and nominate your favorite.\u00a0<\/i><\/p>\n<p><i>The Cybersecurity Canon is a real thing for our community. We have designed it so that you can\u00a0<\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/nominate-a-book\/\"><i>directly participate in the process<\/i><\/a><i>. Please do so!<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sergej Epp recommends the novel, \u201cBlackout: Tomorrow Will Be Too Late,\u201d by Marc Elsberg, for the Cybersecurity Canon Hall of Fame.<\/p>\n","protected":false},"author":663,"featured_media":32398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4521,6724],"tags":[4270],"coauthors":[6885],"class_list":["post-103486","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canon","category-points-of-view","tag-cybersecurity-canon-review"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=103486"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103486\/revisions"}],"predecessor-version":[{"id":103491,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103486\/revisions\/103491"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/32398"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=103486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=103486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=103486"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=103486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}