Anthony M. Townsend - Smart Cities - Big Data, Civic Hackers, and the Quest for a New Utopia

Здесь есть возможность читать онлайн «Anthony M. Townsend - Smart Cities - Big Data, Civic Hackers, and the Quest for a New Utopia» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: Технические науки, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

An unflinching look at the aspiring city-builders of our smart, mobile, connected future. From Publishers Weekly
Technology forecaster Townsend defines a smart city as an urban environment where information technology is combined with infrastructure, architecture, everyday objects, and even our bodies to address social, economic, and environmental problems. They're already being made, usually piecemeal but sometimes wholesale (as in planned automated cities like South Korea and Cisco's somewhat ill-fated Songdo), and involve refashioning old systems like the electricity grid as well as deploying the latest infrastructure—such as the network of radio waves operating our wireless gadgets—and much more. Of interest to urban planners and designers, tech leaders, and entrepreneurs, Townsend's globe-hopping study examines the trend toward smart cities while addressing pros and cons, as top-down corporate models develop alongside communitarian and entrepreneurial initiatives. Skeptical of the vision and influence of tech giants, Townsend points to smaller stories in making the case that local ingenuity should lead the way, albeit in concert with the corporate innovation and power. The author's perspective is based partly on direct experience (among other things, he was an organizer, in 2002, of NYCwireless, an open-source group distributing free Wi-Fi access in Manhattan). The autobiographical passages and close readings of other scrappy innovators are the most enjoyable part of this impressive survey, which tries to secure democratic impulses amid a new gold rush. Agent: Zoë Pagnamenta, Zoë Pagnamenta Agency. (Oct.)
From  Everyone these days is familiar with smartphones and smart homes (even if most can’t afford the latter), but how many people are familiar with smart cities? While there is no master controller—at least not yet—who manipulates apps that keep a city running, increasingly such things as traffic patterns, sewage flow, and street lighting are all being guided by sophisticated software. In this far-reaching overview of all the ways computer technology is transforming life for today’s metropolitan dwellers, urban planning specialist Townsend takes a look at how modern cities around the world are upgrading their infrastructure for the Internet age. From New York to Beijing, city mayors are partnering with organizations like Siemens and IBM to strengthen networks, communications, and crisis-intervention tools such as monitoring flu outbreaks. Although the omnipresent surveillance that accompanies this interconnectivity may make some readers nervous, Townsend persuasively demonstrates how ubiquitous information resources can provide more protection, as it did in the Boston marathon bombing case, and facilitate a more comfortable, less stress-inducing city-living experience. --Carl Hays

Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia — читать онлайн бесплатно полную книгу (весь текст) целиком

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Centralization of smart-city infrastructure is risky, but decentralization doesn’t always increase resilience. Uncoordinated management can create its own brittle structures, such as the Internet’s “bufferbloat” problem. Buffering, which serves as a kind of transmission gearbox to sync fast-flowing and congested parts of the Internet, is a key tool to smoothing out surges of data and reducing errors. But in 2010 Jim Gettys, a veteran Internet engineer, noticed that manufacturers of network devices had taken advantage of rapidly falling memory prices to beef up buffers far beyond what the Internet’s original congestion-management scheme was designed for. “Manufacturers have reflexively acted to prevent any and all packet loss and, by doing so, have inadvertently defeated a critical TCP congestion-detection mechanism,” concluded the editors of ACM Queue , a leading computer networking journal, referring to the Internet’s traffic cop, the Transmission Control Protocol. The result of bufferbloat was increasing congestion and sporadic slowdowns.' What’s most frightening about bufferbloat is that it was hiding in plain view. Gettys concluded; “the issues that create delay are not new, but their collective impact has not been widely understood ... buffering problems have been accumulating for more than a decade.”39

What a laundry list of accidental ways smart cities might be brittle by design or oversight! But what if someone deliberately tried to bring one to its knees? The threat of cyber-sabotage on civil infrastructure is only just beginning to capture policy makers’ attention. Stuxnet, the virus that attacked Iran’s nuclear weapons plant at Natanz in 2010, was just the beginning. Widely believed to the product of a joint Israeli-American operation, Stuxnet was a clever piece of malicious software, or malware, that infected computers involved with monitoring and controlling industrial machinery and infrastructure. Known by the acronym SCADA (supervisory control and data acquisition) these computer systems are industrial-grade versions of the Arduinos discussed in chapter 4. At Natanz some six thousand centrifuges were being used to enrich uranium to bomb-grade purity. Security experts believe Stuxnet, carried in on a USB thumb drive, infected and took over the SCADA systems controlling the plant’s equipment. Working stealthily to knock the centrifuges off balance even as it reported to operators that all was normal, Stuxnet is believed to have put over a thousand machines out of commission, significantly slowing the refinement process, and the Iranian weapons program.40

The wide spread of Stuxnet was shocking. Unlike the laser-guided, bunker-busting smart bombs that would have been used in a conventional strike on the Natanz plant, Stuxnet attacked with all the precision of carpet bombing. By the time Ralph Langner, a German computer-security expert who specialized in SCADA systems, finally deduced the purpose of the unknown virus, it had been found on similar machinery not only in Iran but as far away as Pakistan, India, Indonesia, and even the United States. By August 2010, over ninety thousand Stuxnet infections were reported in 115 countries.41

Stuxnet was the first documented attack on SCADA systems, but it is not likely to be the last. A year later, in an interview with CNET, Langer bristled at the media’s focus on attributing the attack to a specific nation. “Could this also be a threat against other installations, U.S. critical infrastructure?” he asked. “Unfortunately, the answer is yes because it can be copied easily. That’s more important than the question of who did it.” He warned of Stuxnet copycat attacks, and criticized governments and companies for their widespread complacence. “Most people think this was to attack a uranium enrichment plant and if I don’t operate that I’m not at risk,” he said. “This is completely wrong. The attack is executed on Siemens controllers and they are general-purpose products. So you will find the same products in a power plant, even in elevators.”42

Skeptics argue that the threat of Stuxnet is overblown. Stuxnets payload was highly targeted. It was programmed to only attack the Natanz centrifuges, and do so in a very specific way. Most importantly, it expended a highly valuable arsenal of “zero-day” attacks, undocumented vulnerabilities that can only be exploited once, after which a simple update will be issued by the softwares supplier. In its report on the virus, security software firm Symantec wrote “Incredibly, Stuxnet exploits four zero- day vulnerabilities, which is unprecedented.”43

Stuxnets unique attributes aside, most embedded systems aren’t located in bunkers, and they are increasingly vulnerable to much simpler attacks on their human operators. Little more than a year after Stuxnet was uncovered, a lone hacker known only as “prOf ” attacked the water utility of South Houston, a small town of seventeen thousand people just outside Texas’s most populous city. Enraged by the US government’s downplaying of a similar incident reported in Springfield, Illinois, prOf homed in on the utility’s Siemens SIMATIC software, a Web-based dashboard for remote access to the waterworks’ SCADA systems. While the Springfield attack turned out to be a false alarm—federal officials eventually reported finding “no evidence of a cyber intrusion”—prOf was already on the move, and the hacker didn’t even need to write any code.44 It turned out that the plant’s operators had chosen a shockingly weak three-letter password. While prOf’s attack on South Houston could have easily been prevented, SIMATIC is widely used and full of more fundamental vulnerabilities that hackers can exploit. That summer Dillon Beresford, a security researcher at (oddly coincidentally) Houston-based network security outfit NSS Labs, had demonstrated several flaws in SIMATIC and ways to exploit them. Siemens managed to dodge the collateral damage of Stuxnet, but the holes in SIMATIC are indicative of far more serious risks it must address.

Another troubling development is the growing number of “forever day” vulnerabilities being discovered in older control systems. Unlike zero-day exploits, for which vendors and security firms can quickly deploy countermeasures and patches, forever-day exploits target holes in legacy embedded systems that manufacturers no longer support—and therefore will never be patched. The problem affects industrial-control equipment sold in the past by both Siemens and GE, as well as a host of smaller firms.45 It has drawn increased interest from the Cyber Emergency Response Team, the government agency that coordinates American cyber-security efforts.

One obvious solution for securing smart-city infrastructure is to stop connecting it to the Internet. But “air-gapping,” as this technique is known, is only a stopgap measure at best. Stuxnet, much like Agent.btz, the virus that infected the Defense Department’s global computer network in 2008, were likely both walked into secure facilities on USB sticks 46 Insecure wireless networks are everywhere, even emanating from inside our own bodies. Researchers at the security firm McAfee have successfully hijacked insulin pumps, ordering the test devices to release a lethal dose of insulin, and a group of computer scientists at the University of Washington and University of Massachusetts have disabled heart-defibrillator implants using wireless signals.47

These vulnerabilities are calling the entire open design of the Internet into question. No one in those early days of ARPANET ever imagined the degree to which we would embed digital networks in the support systems of our society, the carelessness with which we would do so, and the threat that malevolent forces would present. Assuring that the building blocks of smart cities are reliable will require new standards and probably new regulation. Colin Harrison, IBM’s smarter-cities master engineer, argues that in the future, “if you want to connect a computer system to a piece of critical national infrastructure it’s going to have to be certified in various ways.”48 We’ll also have take stronger measures to harden smart cities against direct assault. South Korea has already seen attacks on its civil infrastructure by North Korean cyber-warriors. One strike is believed to have shut down air traffic control in the country for over an hour.49

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia»

Представляем Вашему вниманию похожие книги на «Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia»

Обсуждение, отзывы о книге «Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x