the importance of information technology (it) for...

35
The Importance of Information Technology (IT) for Transportation Security John C. Falcocchio and Rae Zimmerman WISSP10, Abu Dhabi, October 4, 2010 This presentation is for use at WISSP10, and not for further distribution or electronic posting without the permission of authors.

Upload: buithien

Post on 01-Apr-2018

218 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

The Importance of Information Technology (IT) for Transportation Security

John C. Falcocchioand

Rae Zimmerman

WISSP10, Abu Dhabi, October 4, 2010

This presentation is for use at WISSP10, and not for further distribution or electronic posting without the permission of authors.

Page 2: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

Presentation Outline

I. A Brief Overview of the Transportation System

II. IT and TransportationIII. IT and Transportation SecurityIV. ConclusionsV. Policy RecommendationsVI. Recommended Research Directions

Page 3: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

I. Brief Overview of the Transportation System

Four Core Components:• Physical Infrastructure• Vehicles • Operators / Operations• Customers

Page 4: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

Interfaces of Transportation System Components

Physical Infrastructure and Vehicles

Operators

Customers

Page 5: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

II. IT and Transportation

• IT has made these interfaces more efficient by leading to the creation of an:Intelligent Infrastructure

andIntelligent Vehicles

Page 6: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

Intelligent Infrastructure Services for Highways

• Arterial Management• Freeway Management• Crash Prevention and Safety• Road Weather Management• Roadway Operations and Management (lighting, signaling; maintenance)• Traffic Incident Management• Emergency Management• Electronic Payment and Pricing• Traveler Information• Information Management• Commercial Vehicles• Intermodal Freight

Reference: http://www.itsoverview.its.dot.gov/default.asp

Page 7: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

How IT Interfaces with Highways:

• These services are enabled by traffic surveillance and detection techniques, such as sensors, or cameras monitoring traffic flow

• The surveillance and detection techniques used to monitor traffic flow in support of ITS applications can also be used to monitor key transportation facilities for security purposes

Page 8: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

Intelligent Infrastructure Services for Transit

Include:

• Operations and Fleet Management• Information Dissemination• Transportation Demand Management• Safety and Security

Page 9: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

How IT Interfaces with Transit• These services are enabled by automated

vehicle location (AVL) systems, computer- aided dispatch (CAD) systems, computerized control of heating, ventilating and air conditioning (HVAC) systems, and remote vehicle and facility surveillance cameras

• Transit management centers can monitor in-vehicle and in-terminal surveillance systems to improve service and improve the safety and security of passengers and operators

Page 10: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

Intelligent Vehicles Services

• Accident Prevention/Avoidance– Collision Avoidance– Collision Notification– Driver Assistance

• Security- Intrusion detection- Monitoring of incidents- Dissemination of warning messages- Deployment of security personnel

Page 11: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

III. IT and Transportation Security

• In avoiding, mitigating or coping with security breaches– Highways– Transit

Page 12: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

Highways

New York City, September 11, 2001:•Updated all VMS signs to “Avoid Lower Manhattan” message•Shared video feeds with NYPD•Monitored highways and streets for emergency access•Implemented “outbound” traffic signal patterns

Page 13: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

Example: Advanced Traveler Information

Page 14: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

TransitNew York City, September 11, 2001:

Communication averted adverse consequences such as deaths in trains in the area at the time of the attack by allowing train operators time to roll back trains or not have them start on what would have been a perilous journey (U.S. DOT, Volpe Center):

• Within a minute of the first plane hitting the north tower a train operator alerted the control center of MTA of an explosion and emergency procedures begin

• Within six minutes PATH begins emergency procedures

Page 15: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

Transit

• London Train Bombings, 2005:CCTV enabled the authorities to initially track the perpetrators and finally apprehend them, though it was not able to avoid the attack

Page 16: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

III. IT and Transportation Security, cont’d.

• Vulnerabilities of the interfaces

Page 17: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

Interdependency of Interconnected Systems

Page 18: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

1. IT and Transportation

• Failures of IT from accidents produce consequences that are similar to those that might be expected from deliberate attacks.

Page 19: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

IT/Transit Failures

• On August 20, 2003, the entire CSX transportation system shut down in 23 states due to the shut down of a computer system that monitors train movement and CSX signals; system restoration began with manual overrides (Daniels, August 20, 2003)

• On May 25, 2006, 112 Amtrak trains and 45 NJ Transit trains were disrupted when a 4 year old computer part failed to relay an order to restore power at one of the six substations providing power to the Amtrak system after electricity had been reduced for maintenance. Amtrak acted to manage such situations, for example, by having substations manned in peak hours, not reducing power capacity for maintenance, and having spare locomotives to move stalled trains (Associated Press, February 23, 2007).

Page 20: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

2. IT and other Interconnected Systems: Energy for

Transportation

• Oil and Gas Pipelines and IT• Electricity and IT

Page 21: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

Electric Power, IT, and Transportation

• Transportation is heavily dependent on electric power which in turn is dependent on IT

• Electric power has also experienced outages from IT failures both from accidents and deliberate attacks

Page 22: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

Electric Power and IT Failures

• August 2003 Blackout. First Energy control room operators were unaware visually and audibly that an alarm had gone off, since their computer system was impaired. This delayed the detection of something going wrong with the electrical system. Subsequently, computer control servers became disabled. (U.S.-Canada Power System Outage Task Force April 2004).

Page 23: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

Electric Power and IT Failures

• “In January 2003, the Slammer worm infected the safety monitoring system at the Davis-Besse nuclear power plant in Oak Harbor, Ohio, and replicated so fast that it disabled the system for nearly five hours. The worm knocked out the plant's central command system for six hours. A report from the North American Electric Reliability Council found that power wasn't disrupted, but the failure stopped commands to other power utilities.” (Arnone May 8, 2006)

• A false oil flow alarm shut an electricity transmission line down, causing a widespread blackout in Southern California affecting 500,000 people (Veiga September 1, 2005).

Page 24: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

3. Methods to Quantify Dependencies and Interdependencies: Ratio Approaches

• A ratio was constructed of the time it took for an infrastructure dependent on electric power to recover and the time it took electric power to recover: T(i) / T(e)

• This was applied to various outages where infrastructure was affected and the recovery times for both electric power and the dependent infrastructure were known

• Such an approach is valuable given that the duration of outages varies considerably and even a given outage varies in time from place to place.

Source: R. Zimmerman and C. Restrepo, “The Next Step: Quantifying Infrastructure Interdependencies to Improve Security,” International Journal of Critical Infrastructures, Vol. 2, Nos. 2/3, 2006, pp. 215-230.

Page 25: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

Results for the August 2003 Blackout: Electricity Outage Durations T(e) and Affected

Infrastructure Outage Duration T(i)

Outage Durations for the August 2003 Blackout

(Total Duration = 42-72 hours)

T(i)/T(e)

Transit-electrified Rail (NYC) 1.3Traffic Signals (NYC) 2.6

Source: R. Zimmerman and C. Restrepo, “The Next Step: Quantifying Infrastructure Interdependencies to Improve Security,” International Journal of Critical Infrastructures, Vol. 2, Nos. 2/3, 2006, pp. 215-230. Summarized from Table 3.

Page 26: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

IV. Conclusions

• Transportation security is compromised when a hacked computer will cause a crash, or when an IT system component fails because of poor maintenance or human error

• Maintenance of IT components at the interfaces of IT, Transportation, and other infrastructure systems (e.g., electric power) is a critical aspect of transportation security

Page 27: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

V. Policy Recommendations

• Policies regarding the use of IT in critical infrastructures must take into account the benefits of IT when everything functions as expected, as well as the risks of incorporating IT when one or more of its components fail

Page 28: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

V. Policy Recommendations, cont’d.

• Such policies should be pervasive in marketing guidelines and regulations, since the risks can be very great

Page 29: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

VI. Recommended Research Directions

• Review and assess international practices in maintenance and operations at the interfaces of IT, Transportation, and other Infrastructure systems for high risk locations (e.g., tunnels, bridges, stations where many lines converge)

Page 30: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

VI. Research Directions, cont’d.

• Review and assess the skills of personnel assigned to maintain and operate critical system components

• Review and assess the reliability of funding mechanisms needed for preventive maintenance and for the safe operations of IT components

Page 31: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

VI. Research Directions, cont’d.

• Identify best practices and recommend new policies that improve/assure IT reliability in transportation security

• Review and assess how maintenance practices are managed (who is in charge?) at the interfaces of IT and other interdependent systems and which agency has lead responsibility

Page 32: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

VI. Research Directions, cont’d.

• Explore the feasibility of establishing an independent agency with the responsibility and authority to address the critical interconnections at the security interfaces of the transportation system, IT, and other interconnected systems

Page 33: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

Thank You

Page 34: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

References• Bugliarello, G.“A Note on the Interfacial Vulnerabilities of

Transportation Systems,” Countering Terrorism – Biological Agents, Transportation Networks, and Energy Systems, Summary of a US-Russian Workshop, National Research Council of the National Academies, Washington DC, 2009.

• Falcocchio, J.C. “Transportation Planning for Evacuations,” Countering Terrorism – Biological Agents, Transportation Networks, and Energy Systems, Summary of a US-Russian Workshop, National Research Council of the National Academies, Washington DC, 2009.

• FHWA, Publication Number FHWA – HRT-10-004, Public roads, July- August 2010.

• Research and Innovative Technology Administration, Intelligent Transportation Systems, http://www.itsoverview.its.dot.gov/default.asp

• Zimmerman, R. and C. Restrepo, “The Next Step: Quantifying Infrastructure Interdependencies to Improve Security,” International Journal of Critical Infrastructures, Vol. 2, Nos. 2/3, 2006, pp. 215-230.

Page 35: The Importance of Information Technology (IT) for …crissp.poly.edu/wissp10/material/falcocchio.pdf ·  · 2011-06-13Information Technology (IT) for Transportation Security John

Anecdotes on IT/Transportation failures and successes and interdependencies were drawn from R. Zimmerman’s contribution to the following conference presentations and subsequent presentations:

March 11, 2008. C. E. Restrepo (presenter), R. Zimmerman, and J. S. Simonoff, “Risk Communication in Support of Energy, Transportation and Water Services,” 2008 Risk Symposium, Santa Fe, NM.

November 6, 2008. R. Zimmerman, “Securing Infrastructure Services in the Digital Age,” Hooked on Technology: The Benefits and Dangers of the Digital Age, at the Fall 2008 Speakers on the Square Lecture presented by the NYU Alumni Association.

October 14, 2009. R. Zimmerman, “Infrastructure Dependencies, Interdependencies, and Security: Measuring Anecdotes,” Infrastructure Security Workshop, Rutgers University, New Brunswick, NJ.

Portions of this work were supported by an NYU-Poly seed grant, Center for Interdisciplinary Studies in Security and Privacy (CRISSP).

Acknowledgements