❌

Normal view

There are new articles available, click to refresh the page.
Today β€” 22 December 2024Main stream

US agriculture primed to be next frontier in cybersecurity in new year, experts, lawmakers say

22 December 2024 at 01:00

Cybersecurity has been a major subject of discussion in recent years, with purported Chinese spy balloons floating overhead, a major Appalachian oil pipeline hacked with ransomware and questions about mysterious drones over New Jersey skies.Β 

But one overlooked area of focus in this regard is agriculture, several prominent figures have said β€” especially with America’s ag states primed to lend their top political leaders to Washington in the new year.

Dakota State University President Jose-Marie Griffiths told Fox News Digital how important the heartland has become geopolitically, with several Dakotans gaining leadership or cabinet roles in the new year β€” including Sen. Mike Rounds, R-S.D., chairing the Senate Armed Services Subcommittee on Cybersecurity.

"I said quite a lot in the past and in [congressional] testimony about my concerns about agriculture and food production’s critical infrastructure, which came rather late to the cybersecurity critical infrastructure table," Griffiths said.

INFLATION, SUSTAINABILITY AND GLOBALISM ARE POTENTIAL DEATH SENTENCE TO US AG: FARMERS

"People [will] start to realize the agricultural vehicles they're using increasingly are autonomous and connecting to broadband [via] satellite β€” and other ways that these become vulnerable. And for people who wish to do us harm, they're exploiting vulnerabilities as much as they can."

Residents across the heartland pay much more attention to the threats China and other rivals pose to the U.S. agriculture sector, she said.Β 

With advancements in technology, hackers can now find their way into harvesters, granaries and the nation’s freight-train network, Griffiths and Rounds said separately.

Whether the cash crop is Pennsylvania potatoes, Florida oranges or Dakotan wheat, all are crucial to the U.S. economy and supply chain, and all can be subject to cyberthreats, Griffiths suggested.

Rounds told Fox News Digital he has studied for some time the potential vulnerabilities of the American agriculture sector when it comes to foreign actors and cybersecurity.

"It’s more than just the vehicles and so forth," he said.

"A lot of it has to do with the infrastructure that we rely on. A good example is your water systems; your electrical systems... All of those right now are connected and they all have cyber-points-of-entry.Β 

"And so, we have been, for an extended period of time, looking at threats that could come from overseas by adversaries that would like to infiltrate not only the water supplies, but also the electrical systems… and in some cases, sewer systems."

Rounds said he and other lawmakers have been focused on where malign actors can proverbially "shoot the arrows at us," and figure out who they are and how to stop them.

GREEN GOVERNANCE IS THE NEW GUISE FOR MERCANTILISM, WILL LEAD TO GLOBAL INSTABILITY: KEVIN ROBERTS

He said the Chinese firm Huawei had been selling cheap hardware to rural telecom entities and could be able to infiltrate communications systems.

"Once we found out that that was in there… that they could be putting in latent materials that could be activated at a later date, we've gotten most of them pulled out. But that's just one example of the ways in which rural areas can be a way into the rest of our communication systems," he said.

Rounds said drones are becoming increasingly used in agriculture, and they, too, have the danger of being hacked.

Vehicles like harvesters and tractors have also greatly advanced technologically in the near term and face similar challenges.

"A lot of that right now is done with GPS. You get into your tractor, you plug it in and basically it'll drive it for you. We leave people in those tractors, but at some stage of the game, some of those might very well become autonomous as well β€” and they're subject to cyber-intervention…" he said.

Grain elevators also can be interfered with, which stymies marketing and transportation, and endangers the greater supply chain and the ability for a farmer to sell on the open market, Rounds said.

Asked if he preferred today’s agriculture sector to the era before automation, Rounds said it’s not about what he thinks, but what is going to happen in the future.

"We will have more and more autonomous vehicles being used in farming. And the reason is we don't have the manpower β€” and we replace it with machinery. The machinery is going to get bigger. It's going to become more sophisticated, and we're going to be expected to do more things with fewer people actually operating them.," he said.

"The supply chain is so critical. We rely on autonomy in many cases for a lot of the delivery of our resources, both to the farmer, but also back out from the farmer in terms of a commodity that he wants to market."

CLICK HERE TO GET THE FOX NEWS APP

If that new technologically-advanced system malfunctions or is hacked, it will greatly disrupt the ability to provide the raw materials to the people and companies "actually making the bread" and such.

Amit Yoran, CEO of exposure management firm Tenable, recently testified before the House Homeland Security Committee and spoke at length about cyber threats to critical U.S. infrastructure.

Asked about cybersecurity in the agriculture realm, Yoran told Fox News Digital recently that there is "no singular defense paradigm that could effectively be applied across all sectors."

"Some critical infrastructure providers have a high degree of cybersecurity preparedness, strong risk understanding and risk management practices, and very strong security programs. Others are woefully ill-prepared," said Yoran, whose company is based in Howard County, Maryland.

Before yesterdayMain stream

How China's cyberespionage has changed

6 December 2024 at 17:30

China is the most active and persistent cyberthreat to American critical infrastructure, but that threat has changed over the last two decades, the Cybersecurity and Infrastructure Security Agency (CISA) says.

"I do not think it is possible to design a foolproof system, but I do not think that should be the goal. The goal should be to make it very difficult to get in," Cris Thomas, sometimes known as Space Rogue, a member of L0pht Heavy Industries, said during testimony before the Governmental Affairs Committee May 19, 1998.

L0pht Heavy Industries was part of one of the first congressional hearings on cybersecurity threats. Members of the group warned it was possible to take down the internet in 30 minutes and that it was nearly impossible to make a defense system that was 100% foolproof. It also had difficulties when it came to tracking where threats came from.

FBI, CISA SAY CHINESE HACKERS BREACHED MULTIPLE US TELECOM PROVIDERS IN TARGETED ATTACK

"Backtracking and reverse hacking is a relatively tricky area. Based upon the relatively antiquated protocols that you are dealing with, there is not a tremendous amount of information as to where things came from, just that they came," said another member of the group, Peiter Zatko, who testified under his codename, "Mudge."

By the time the hearing took place, China was likely already at work. In the early 2000s, the U.S. government became aware of Chinese espionage targeting government entities. One string of operations known as Titan Rain started as early as 2003 and included hacks on the U.S. departments of State, Homeland Security and Energy. The public became aware of the attacks several years later.

Around that time, the current CISA Director, Jen Easterly, was deployed to Iraq to investigate how terrorists were using new technology.

"I actually started in the world of counterterrorism, and I was deployed to Iraq and saw how terrorists were using communications technologies for recruitment and radicalization and operationalizing improvised explosive devices," Easterly said.

T-MOBILE HACKED BY CHINESE CYBER ESPIONAGE IN MAJOR ATTACK ON US TELECOMS

At that time the U.S. government was investing in cyberwarfare. The Bush administration had ordered studies on computer network attacks, but officials eventually expressed concern over the amount of damage those attacks could cause. Instead, the U.S. moved to a more defensive posture that focused on defending against attacks.

"When I stood at the Army's first cyber Battalion and was involved in the stand-up of U.S. Cyber Command, we were very focused on nation-state adversaries," Easterly said. "Back then, China was really an espionage threat that we were focused on."

Threats from China would eventually intensify. According to the Council on Foreign Relations’ cyber operations tracker, in the early 2000s, China’s cyber campaigns mostly focused on spying on government agencies.

"Officials have rated China's aggressive and wide-ranging espionage as the leading threat to U.S. technology," Sen. Kit Bond, R-Mo., warned in 2007.

By then, China had a history of spying on U.S. innovation and using it to replicate its own infrastructure. In 2009, Chinese hackers were suspected of stealing information from Lockheed Martin’s Joint Strike Fighter Program. Over the years, China has debuted fighter jets that look and operate like U.S. planes.

CHINESE HACKERS OUTNUMBER FBI CYBER PERSONNEL β€˜BY AT LEAST 50 TO 1,’ WRAY TESTIFIES

"China is the preeminent threat to the U.S.," Easterly said. "We are laser-focused on doing everything we can to identify Chinese activity, to eradicate it and to make sure we can defend our critical infrastructure from Chinese cyber actors."

In 2010, China shifted its targets to the public sector and began targeting telecommunications companies. Operation Aurora was a series of cyberattacks in which actors conducted phishing campaigns and compromised the networks of companies like Yahoo, Morgan Stanley, Google and dozens more. Google left China after the hacks and has yet to return its operations to the country. By the turn of a new decade, evidence showed China was also spying on critical infrastructure in the U.S. and abroad.

"Now we are looking at them as a threat to do disruptive and destructive operations here in the U.S. That is really an evolution that, frankly, I was not tracking and was pretty surprised when we saw this campaign," Easterly said.

The Council on Foreign Relations Cyber Operation Tracker reveals China has frequently targeted trade operations and military operations in the South China Sea, and one of its favorite targets in the past decade has been Taiwan.

"We have seen these actors burrowing deep into our critical infrastructure," Easterly said. "It's not for espionage, it's not for data theft. It's specifically so that they can launch disruptive or destructive attacks in the event of a crisis in the Taiwan Strait."

Taiwan is the world’s largest producer of semiconductors, and data shows how China has spied on all companies involved in all parts of that supply chain from mining to semiconductor producers.

"A war in Asia could have very real impacts on the lives of Americans. You could see pipelines blowing up, trains getting derailed, water getting polluted. It really is part of China's plan to ensure they can incite societal panic and deter our ability to marshal military might and citizen will. This is the most serious threat that I have seen in my career," Easterly said.

China’s public and private sector are closely intertwined by regulation, unlike in the U.S., where partnerships are key for defense.

"At the end of the day, it is a team sport. We work very closely with our intelligence community and our military partners at U.S. Cyber Command. And we have to work together to ensure that we are leveraging the full tools across the U.S. government and, of course, working with our private sector partners," Easterly said.Β 

"They own the vast majority of our critical infrastructure. They are on the front lines of it. And, so, ensuring that we have very robust operational collaboration with the private sector is critical to our success in ensuring the safety and security of cyberspace."

❌
❌