
How vulnerable is critical infrastructure to cyberattack in the US?
Now, when tensions escalate — like when the US bombed nuclear facilities in Iran this month — the safety of these systems becomes of paramount concern. If conflict erupts, we can expect it to be a 'hybrid' battle, Joshua Corman, executive in residence for public safety & resilience at the Institute for Security and Technology (IST), tells The Verge.
'With great connectivity comes great responsibility.'
Battlefields now extend into the digital world, which in turn makes critical infrastructure in the real world a target. I first reached out to IST for their expertise on this issue back in 2021, when a ransomware attack forced the Colonial Pipeline — a major artery transporting nearly half of the east coast's fuel supply — offline for nearly a week. Since then, The Verge has also covered an uptick in cyberattacks against community water systems in the US, and America's attempts to thwart assaults supported by other governments.
It's not time to panic, Corman reassures me. But it is important to reevaluate how we safeguard hospitals, water supplies, and other lifelines from cyberattack. There happen to be analog solutions that rely more on physical engineering than putting up cyber firewalls.
This interview has been edited for length and clarity.
As someone who works on cybersecurity for water and wastewater, healthcare, food supply chains, and power systems — what keeps you up at night?
Oh, boy. When you look across what we designate as lifeline critical functions, the basic human needs — water, shelter, safety — those are among some of our most exposed and underprepared. With great connectivity comes great responsibility. And while we're struggling to protect credit card cards or websites or data, we continue to add software and connectivity to lifeline infrastructure like water and power and hospitals.
We were always prey. We were just kind of surviving at the appetite of our predators, and they're getting more aggressive.
How vulnerable are these systems in the US?
You might have seen the uptick in ransomware starting in 2016. Hospitals very quickly became the number one preferred target of ransomware because they're what I call 'target rich, but cyber poor.' The unavailability of their service is pretty dire, so the unavailability can be monetized very easily.
You have this kind of asymmetry and unmitigated feeding-frenzy, where it's attractive and easy to attack these lifeline functions. But it's incredibly difficult to get staff, resources, training, budget, to defend these lifeline functions.
If you're a small, rural water facility, you don't have any cybersecurity budget. We often usher platitudes of 'just do best practices, just do the NIST framework.' But they can't even stop using end of life, unsupported technology with hard-coded passwords.
'You have this kind of asymmetry and unmitigated feeding-frenzy'
It's about 85 percent of the owners and operators of these lifeline critical infrastructure entities that are target rich and cyber poor.
Take water systems, for example. Volt Typhoon has been found successfully compromising US water facilities and other lifeline service functions, and it's sitting there in wait, prepositioning. [Editor's note: Volt Typhoon is a People's Republic of China state-sponsored cyber group]
China specifically has intentions toward Taiwan as early as 2027. They basically would like the US to stay out of their intentions toward Taiwan. And if we don't, they're willing to disrupt and destroy parts of these very exposed, very prone facilities. The overwhelming majority don't have a single cybersecurity person, haven't heard of Volt Typhoon, let alone know if and how they should defend themselves. Nor do they have the budget to do so.
Turning to recent news and the escalation with Iran, is there anything that is more vulnerable at this moment? Are there any unique risks that Iran poses to the US?
Whether it's Russia or Iran or China, all of them have shown they are willing and able to reach out to water facilities, power grids, hospitals, etc. I am most concerned about water. No water means no hospital in about four hours. Any loss of pressure to the hospital's pressure zone means no fire suppression, no surgical scrubbing, no sanitation, no hydration.
What we have is increasing exposure that we volunteered into with smart, connected infrastructure. We want the benefit, but we haven't paid the price tag yet. And that was okay when this was mostly criminal activity. But now that these points of access can be used in weapons of war, you could see pretty severe disruption in civilian infrastructure.
Now, just because you can hit it doesn't mean you will hit it, right? I'm not encouraging panic at the moment over Iran. I think they're quite busy, and if they're going to use those cyber capabilities, it's a safer assumption they would first use them on Israel.
Different predators have different appetites, and prey, and motives.
Sometimes it's called access brokering, where they're looking for a compromise and they lay in wait for years. Like in critical infrastructure, people don't upgrade their equipment, they use very old things. If you believe that you'll have that access for a long time, you can sit on it and wait patiently until the time and the place of your choosing.
Think of this a little bit like Star Wars. The thermal exhaust port on the Death Star is the weak part. If you hit it, you do a lot of damage. We have a lot of thermal exhaust ports all over water and healthcare specifically.
What needs to be done now to mitigate these vulnerabilities?
We're encouraging something called cyber-informed engineering.
What we've found is if a water facility is compromised, abrupt changes in water pressure can lead to a very forceful and damaging surge of water pressure that could burst pipes. If you were to burst the water main for a hospital, there would be no water pressure to the hospital. So if you wanted to say, 'let's make sure the Chinese military can't compromise the water facility,' you'd have to do quite a bit of cybersecurity or disconnect it.
What we're encouraging instead, is something much more familiar, practical. Just like in your house, you have a circuit breaker, so if there's too much voltage you flip a switch instead of burning the house down. We have the equivalent of circuit breakers for water, which are maybe $2,000, maybe under $10,000. They can detect a surge in pressure and shut off the pumps to prevent physical damage. We're looking for analog, physical engineering mitigation.
'Think of this a little bit like Star Wars.'
If you want to reduce the likelihood of compromise, you add cybersecurity. But if you want to reduce the consequences of compromise, you add engineering.
If the worst consequences would be a physically damaging attack, we want to take practical steps that are affordable and familiar. Water plants don't know cyber, but they do know engineering. And if we can meet them on their turf and help explain to them the consequences and then co-create affordable, realistic, temporary mitigations, we can survive long enough to invest properly in cybersecurity later.
Federal agencies under the Trump administration have faced budget and staffing cuts, does that lead to greater vulnerabilities as well? How does that affect the security of our critical infrastructure?
Independent of people's individual politics, there was an executive order from the White House in March that shifts more of the balance of power and responsibility to states to protect themselves, for cybersecurity resilience. And it's very unfortunate timing given the context we're in and that it would take time to do this safely and effectively.
I think, without malice, there has been a confluence of other contributing factors making the situation worse. Some of the budget cuts in CISA, which is the national coordinator across these sectors, is not great. The Multi-State Information Sharing and Analysis Center is a key resource for helping the states serve themselves, and that too lost its funding. And as of yet, the Senate has not confirmed a CISA director.
We should be increasing our public private partnerships, our federal and state level partnerships and there seems to be bipartisan agreement on that. And yet, across the board, the EPA, Health and Human Services, Department of Energy and CISA have suffered significant reduction in budget and staff and leadership. There's still time to correct that, but we are burning daylight on what I see as a very small amount of time to form the plan, to communicate the plan, and execute the plan.
Whether we want this or not, more responsibility for cyber resilience and defense and critical functions is falling to the states, to the counties, to the towns, to individuals. Now is the time to get educated and there is a constellation of nonprofit and civil society efforts — one of them is the good work we're doing with this Undisruptable27.org, but we also participate in a larger group called Cyber Civil Defense. And we recently launched a group called the Cyber Resilience Corps, which is a platform for anyone who wants to volunteer to help with cybersecurity for small, medium, rural, or lifeline services. It's also a place for people to find and request these volunteers. We're trying to reduce the friction of asking for help and finding help.
I think this is one of those moments in history where we want and need more from governments, but cavalry isn't coming. It's going to fall to us.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Android Authority
25 minutes ago
- Android Authority
I use a duress PIN to protect my data — here's how it works and why everyone needs one
Calvin Wankhede / Android Authority From two-factor authentication codes to conversations and photos, our phones contain a ton of sensitive data these days. We rely on PINs and biometrics for daily security, but I shudder to think what would happen if that data landed in the wrong hands. And while Android is secure enough against remote attacks and malware these days, what if I'm forced to unlock my phone and hand it over? GrapheneOS, the privacy-focused Android fork, offers a rare solution to this hypothetical: the ability to set a duress PIN or secondary password that wipes your device clean and leaves no trace of your presence. I've had a duress PIN set up on my phone for a while now. While it's not something I hope to ever need, knowing it's there gives me peace of mind. And even though I don't think Google will add a feature as extreme as this one to stock Android, I can definitely see a use-case for a less extreme implementation. Here's why. The duress PIN: What it is and why it matters Calvin Wankhede / Android Authority Most devices will lock you out after too many failed unlock attempts. But that doesn't mean your data is safe — what if you're forced to give up your password or the attacker guesses your PIN? This is where GrapheneOS' duress PIN flips the dynamic: it lets you set an alternate PIN or password that instantly triggers a silent and irreversible factory reset in the background. The duress PIN doesn't give you a second chance and will trigger anywhere you enter it: on the lockscreen, while enabling Developer options, or even while unlocking an app that requests authentication. And unlike a regular factory reset, a duress PIN will erase all encryption keys and your phone's eSIM partition as well. This makes it impossible for an attacker to access my data just by having physical possession of your device and knowledge of the PIN. I think the real strength of GrapheneOS' duress PIN lies in its subtlety. There are no confirmation prompts, no announcements, and no obvious signs that the wipe was intentional on your part. Of course, GrapheneOS is no longer a fringe operating system these days — it has even attracted the ire of law enforcement in some jurisdictions. In other words, a professional attacker might be aware of the existence of a duress PIN. But if you can enter it quickly enough, it achieves its intended effect: no data can be lifted from your phone. Why I use a duress PIN Mishaal Rahman / Android Authority Old vs new lock screen PIN entry screen UI in Android The idea of a duress PIN sounds like something out of a spy movie, but is it really necessary? The feature is admittedly only useful in fringe scenarios where I would know about an imminent risk to my phone's data. Take mugging, for example. If an attacker forced you to unlock your phone before they ran off with it, you could enter your duress PIN instead. Providing a duress PIN could mean the difference between losing a $1,000 device and having your bank accounts drained or your identity stolen. A duress PIN is useful to everyone, not just for those with something to hide. Even if you aren't forced to divulge the PIN yourself, I read an interesting suggestion on the GrapheneOS forum: what if you set an extremely simple or obvious sequence as your duress PIN? An amateur attacker is bound to try PINs like 1234 or 0000 when they get a hold of your device — and that will be enough to wipe the system for good, without any action on your part. You could even tape a note with the duress PIN to the back of your device and encourage them to enter it. Then there's the elephant in the room — using a duress PIN if you expect to get into trouble with law enforcement. This is a murky topic given that erasing your data could be counted as obstruction or even destruction of evidence. So you could get into more trouble than necessary, if you had nothing to hide. I think the latter is a bad faith argument as it ignores the potential and tangible threat of overreach. Still, I don't know if I would use my duress PIN if law enforcement ever asked me to unlock my phone. But for government dissidents and activists, I'm sure the feature can be invaluable if they know someone unfriendly is knocking on their door. What Android could learn from Graphene's duress PIN Andy Walker / Android Authority One of Android's biggest advantages is its robust support for multiple users. I find this feature especially useful on tablets, since they're typically shared devices. Each user in a household can log into their own profile, with their own set of apps and data. But getting to that profile currently requires multiple taps on most Android devices. Even on the Pixel Tablet, you need to select a specific profile before entering the unlock PIN for that user. But what if that wasn't the case? GrapheneOS can recognize when you enter a duress PIN to trigger a wipe, so why stop there? Imagine if Android could log you into a different user profile based on which PIN you've entered. In a situation where you're forced to unlock your phone, you could enter the decoy PIN. This would open a seemingly functional but heavily sandboxed version of your phone, hiding your banking apps, private messages, or work accounts. I think it straddles the line between handing over everything and Graphene's nuclear option of wiping the device entirely. Android might never adopt the duress PIN, but what about a decoy? Of course, you will need more than this level of plausible deniability if you get into any serious trouble. But for airport checkpoints where you might be asked to give up access to your device, a decoy PIN might be enough to avoid scrutiny. Or if you need a stowaway profile for files and data you don't necessarily want in your primary profile, a secondary PIN could bring you there. The GrapheneOS community's stance on decoy PINs is that redirecting to a secondary profile is not as secure as triggering a full device reset, which is the current duress PIN implementation. For a project that takes security seriously, simply logging into a different profile is only a half-measure. Will Google ever adopt a feature like GrapheneOS' duress PIN? It's unlikely, but on the plus side, Android's built-in Lockdown mode is a step in the right direction. In the US, courts have ruled that you can be compelled to provide a fingerprint, but not a password. By disabling biometrics, Android's Lockdown mode provides some protection against legal coercion. If that's not enough for you, GrapheneOS might just be the answer. Follow


CNET
25 minutes ago
- CNET
How to Turn Your Security Camera Into an All-Purpose Home Care Tool
When you're thinking about buying a home security cam, you're probably thinking about stopping bad guys, like burglars and porch pirates. But my security cameras put in constant work as everyday helpers. AI detection, other AI features and smart alerts team up to help out with common problems around my home and save me time. Here are my favorite ways that you can turn your security cameras into ever-present aids, from finding lost toys to handling smart locks and lots more. Make your security cam multipurpose, and you'll multiply the value you get from it many times over. Read more: Spots to Never Install a Security Camera Package instructions Security cams can give delivery people instructions. Hyve With their AI detection features, many home security cameras can recognize packages and alert you if they appear or disappear. That's not only handy for stopping porch pirates. Even if your packages aren't in immediate danger, it's useful to see when a person is arriving with a package so you can give them quick instructions like placing it near the door so it doesn't get rained on, putting it in a delivery box, waiting until you get the garage door opened, and so on. If you don't want to activate the two-way audio, a number of video doorbells and similar devices have customized preset messages that Alexa or other voice assistants can give with the press of a button to save time. Opening your door for family Yale's latest Google Home integrations could enable even more routines. Yale Today's video doorbells and security cameras aren't just smart, they can also connect with other home devices and control them. One of my favorite tricks is using facial recognition for family and other allowed guests, then automatically unlocking a smart lock for them as they approach. Not too many locks can do this yet but compatibility is on the rise if you don't mind a bit of facial recognition. Yale's latest smart lock can do this with a Nest Doorbell, for example, or integrate with an ADT+ security system to perform a similar task. On a similar note, if you have a security camera at the right angle in front of your home, you can also use it to double-check if the garage door is closed, just in case you forgot. Spotting bugs and pests A security system can even do some pest control work for you. Tharon Green/CNET Home security cameras aren't always watching: When armed, they're motion-activated and they can ignore certain types of motion like swaying branches or small pets. However, you can turn up motion sensitivity if you want to take a really close look at something, which can come in surprisingly handy if you're trying to track down a pest problem. From roaches to rodents, indoor cameras and their night vision capabilities plus motion detection can alert you when they appear and, most important, give you vital clues about where they are coming from and how to stop them. Activating a backyard intercom Outdoor security cams can make surprisingly useful intercoms. Tyler Lacoma/CNET Every home security cam worth its price includes two-way audio that you can activate from an app. That's not only handy in video doorbell scenarios, it also makes a great mini-intercom when someone's too far away to yell at, like sunning on the patio or playing in the backyard. Use the audio to call in kids for dinner, ask your S.O. what they want for takeout, let someone know the oven timer went off … OK, maybe I'm just hungry. But if there's a walkie-talkie reason to talk to someone, your security cam can handle it. Finding lost objects More advanced security AI can help you find lost objects. Google One of the 2025 advances in security cameras is the ability for AI like Google's Gemini to look through saved security video footage in the cloud. Ring's newest generative AI can perform the same sort of tasks, and upcoming upgrades to Alexa Plus and Siri are likely to include similar features. If you're OK with AI looking through your videos and identifying objects, it can be a great solution to track down something missing. In the case of Gemini, you can ask the AI directly, "Where did the kids leave their bikes?" or "Where did the dog leave the ball?" and it will answer with what info it can collect from the latest video footage. Watching over your pets Security cameras with AI detection and audio can also function as pet monitors. Speaking of pets, if you leave a pet at home during the day or on vacation and would like to keep an eye on it, an indoor security camera can easily handle the job. Dedicated pet cams do exist but many general security cams can also recognize pets, send you alerts when one is spotted, allowing you to use the two-way audio to comfort them or, as needed, yell at them to get off the table. Switching to a dedicated pet cam allows for more specific controls, like tossing treats and getting more pet-related notifications. Keeping older residents safe Security cams can be an easy way to get alerts about older loved ones, too. Granny pods and other independent living situations still let you keep an eye on loved ones with the right security camera. For example, a porch security camera with face recognition can let you know when an older relative is leaving at an unusual time, like "Front door cam sees Dolores leaving the house." Or if older relatives like to go out shopping or for a walk, the same cam can send you alerts when it recognizes them returning home so you don't have to worry. Monitoring babies and toddlers You can switch a security cam to baby and toddler duty, too. Hubble Connected / CNET At CNET we've tested a variety of dedicated baby monitors with plenty of useful features. Security cameras offer broad alternatives that you can repurpose for security or easily switch rooms later as needed. The security cam can still send motion alerts, let you check in on a baby at any time or provide notifications if it sees a toddler leaving its room -- no matter where the parents may be. Birdwatching Security cameras are great for birdwatching in the right spot. Avatarmin via Getty If you're a fan of keeping an eye on what birds visit your feeders, posting a nearby security camera is a fun addition. You can peek through the live view whenever you want and save pics or videos when you spot an unusual or brightly colored visitor. Equip your birdwatching security camera with a solar panel and you'll rarely have to worry about recharging, either. Oh, and you'll get updates about strangers on your property, too. Now that your mind is on home safety, why not visit my guide on the best DIY home security systems, the top tricks to prevent trespassing and the best mounting choices for security cameras.


Forbes
26 minutes ago
- Forbes
Business Tech News: OpenAI Releases It's Latest And Greatest Version Of ChatGPT
Here are five things in tech that happened this week and how they affect your business. Did you miss them? This Week in Business Tech News Business Technology News #1– ChatGPT-5 is here. GPT-5, launched this week, is OpenAI's flagship model now powering ChatGPT, the API, and Microsoft Copilot. It represents a unified system that dynamically adapts its reasoning power to tasks like coding ('vibe coding'), math, and software development, eliminating the need for users to manually switch between model variants. GPT-5 delivers faster, more accurate, and more reliable responses with fewer hallucinations and elevated factuality. It supports multimodal interaction—text, image, and voice—and brings personalization enhancements like customizable 'personalities,' color themes, and integrations with Gmail and Google Calendar. While it is not AGI, GPT-5 offers notable steps toward artificial general assistance by providing more natural, context-aware, and personalized interactions. (Source: OpenAI) Why this is important for your business: It's been a two year wait, but early reviews say it's worth it. No business owner should be without a good chatbot companion, be it ChatGPT, Claude, Copilot, Grok, Gemini or others. GPT-5's biggest benefits – at least for me – is its accuracy. I already use a few chatbots to review contracts, summarize long documents, parse through interview transcripts and help me create policies and other business documents. I'll be leaning more on GPT-5 over the coming months and expect its performance to be that much better. Business Technology News #2 – Epicor expands cognitive ERP capabilities to optimizes supply chain and tax management. Epicor has announced strategic partnerships with SourceDay and Sovos to enhance its Epicor Kinetic ERP platform for manufacturers, which, according to the company will contribute towards advancing its vision of Cognitive ERP – an AI-driven approach that transforms ERP systems from passive record-keeping tools into proactive, intelligent systems of action that enable real-time data analysis. SourceDay integration automates and digitizes the entire purchase order lifecycle and improves supplier collaboration and data accuracy. Sovos enhances tax compliance capabilities while supporting automated tax reporting and regulatory adherence. (Source: Epicor) Why this is important for your business: Epicor, like many great ERP system providers are not only enhancing their AI offerings but partnering companies to fully leverage AI's benefits. Too many small and mid-sized businesses ignore these benefits are claim that they don't have enough time to implement them and I couldn't disagree more. Learning how to use these features and then investing the time and resources into getting them operational will have significant long term effects on both productivity and profitability. Regardless of whether you use Epicor, it's critical to dig into the features and functionality your business system provider is rolling out (or planning) and leaning into them. Business Technology News #3 – Zuckerberg: superintelligence is now in sight. Meta CEO Mark Zuckerberg published a post that shared Meta's vision to 'bring personal superintelligence to everyone.' Personal superintelligence – a deeply personalized AI assistant designed to help individuals achieve their goals, foster creativity, and enhance social connection – is a shift away from productivity-focused AI such as ChatGPT. Meta aims to deliver superintelligence through smart glasses and AR/VR headsets, which will become the 'primary computing devices' of the future. (Source: Meta) Why this is important for your business: 'Superintelligence has the potential to begin a new era of personal empowerment where people will have greater agency to improve the world in the directions they choose,' Zuckerberg said. Here's my concern: no one really knows what this means. I'm not sure Mark Zuckerberg even knows the full implications of superintelligence. I'm not going to predict what superintelligence means for business yet. Because, like everyone else, I don't fully know the implications either! Business Technology News #4 – FBI warns of a particular scam involving QR codes. The FBI has issued a public alert about a new scam where criminals send unexpected packages containing malicious QR codes designed to steal personal data or install malware. Packages are sent to recipients who didn't place the order. Inside or on the package is a QR code that appears to offer tracking info or delivery verification. Scanning the code may either redirect the recipient to phishing websites or prompt them to enter personal/financial information. Malware can also be immediately downloaded to the device used to scan the QR code. (Source: Digital Trends) Why this is important for your business: According to Trevor Mogg of Digital Trends this is a dangerous twist on the older 'brushing scam', where vendors sent unsolicited items to boost fake reviews. Now, the goal is data theft and fraud. The FBI is advising people not to scan QR codes from unknown packages or sources; inspect packages carefully; preview QR links with suspicious URLs; and secure devices with antivirus software. Business Technology News #5 – Walmart doubles down on GenAI as retail giant builds breakthrough tech to shape future of retail. Walmart is accelerating its investment in Generative AI (GenAI) and agentic AI technologies to revolutionize how retail software is built and deployed – aiming for greater autonomy, speed, and innovation across its operations. The company is transitioning from basic automation to fully autonomous workflows. GenAI is being used to reimagine the software development lifecycle, boosting developer productivity and innovation. Walmart sees GenAI as foundational to next-gen retail tech and is actively scouting visionary startups that can contribute to this transformation. (Source: Retail Technology Innovation Hub) Why this is important for your business: If you're in retail, it's important to keep up to date on what the big box retailers are doing with AI. Ultimately their actions will filter down to smaller chains and stores. As important as GenAI is right now I'm expecting that retailers will be leaning heavily into robotics, point-of-sale and payment technologies leveraging AI in the years to come. Each week I round up five business technology news stories and explain why they're important for your business. If you have any interesting stories, please post to my X account @genemarks