US Water Supplies Threatened By Hackers

Watch the water is taking on new meaning in the light of a new report and warning from the Department of Homeland Security. It seems that hackers are threatening the nation’s drinking water and wastewater treatment plants with cyber attacks.

Authorities said they wanted to highlight ongoing malicious cyber activity “by both known and unknown actors” targeting the technology and information systems that provide clean, drinkable water and treat the billions of gallons of wastewater created in the U.S. every year.

The alert, which disclosed three previously unreported ransomware attacks on water treatment facilities, was issued by the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA). It was the result of analytic efforts by DHS, the FBI, the Environmental Protection Agency, and the National Security Agency.

One DHS cybersecurity official described it as the routine sharing of technical information between federal agencies and their industry partners “to help collectively reduce the risk to critical infrastructure in the United States.” Added a second Homeland Security official: “It’s not any indication of a new threat. We don’t want anyone to think that their drinking water supply is under attack.”

Still, though, the nation’s water supply could be held hostage by hostile agents with computers and an internet connection. That is not a threat many Americans consider to be an everyday concern.

And the actors in this sort of scenario do not have to be foreign.

Despite their assurances, the advisory disclosed that in March 2019, a former employee at a Kansas-based water and wastewater treatment facility unsuccessfully tried to threaten drinking water safety by logging in with his user credentials – which had not been revoked at the time of his resignation – to remotely access a facility computer.

In that case, a federal grand jury in Topeka, Kansas accused Wyatt Travnichek, 22, of tampering with the water treatment facilities for the sprawling, eight-county Post Rock Rural Water District.

The indictment, announced March 31, alleges that Travnichek’s job for the utility was to monitor the water plant remotely by logging into its computer system. Two months after he left his job with the water district in January 2019, it said, Travnichek logged in remotely with the intent of shutting shut down the facility’s cleaning and disinfecting procedures.

“By illegally tampering with a public drinking water system, the defendant threatened the safety and health of an entire community,” said Lance Ehrig, special agent in charge of the EPA’s criminal investigation division in Kansas. The federal indictment says Travnichek used a Samsung phone to commit the offense.

Hence why terminated employees’ credentials should always be revoked the minute such people walk out the door.

Just the fact that this could be an issue in the future should put all Americans on alert, and perhaps be vigilant about keeping a non-municipal sourced supply of drinking water on hand.

Please make sure to share our website and articles with your friends, family, and fellow patriots to help us spread the truth!

Let us know your thoughts on this liberal progressive BS in the comment section… Make sure to LIKE US on Facebook too! Like Us On Facebook!

Facebook568
Twitter432
LinkedIn
Share
WeChat
Follow by Email4k
RSS

California Hits New Bottom

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments