Skip to Content
Uncategorized

To Secure the Grid, Use a Darknet and Quantum Encryption

October 31, 2017

At least that’s what some scientists think the government should do. Utility Dive reports that during a Senate committee meeting last week, Richard Raines from Oak Ridge, one of the Department of Energy’s national laboratories, urged lawmakers to direct funding into a Darknet project. The work essentially seeks to take the control systems of America’s power grids off of the public Internet and put them onto an independent network.

That could be a pretty sound idea. Attacks on power grids have been performed in Ukraine, but recent reports have suggested that they are increasingly headed America’s way. Such hacks usually attempt to send commands to grid components like circuit breakers via the regular Internet in order to shut down supplies, and while none have been catastrophic to date, many commentators fear that it’s only a matter of time before a crippling energy strike occurs.

At the same event, Duncan Earl, of the quantum research firm Qubitekk, explained that grid systems could be further secured using quantum encryption. That’s not as far-fetched as it may sound: a quirk of quantum mechanics allows two particles, like photons, to be entangled so that changes to one affect the other, and that can be used to send a crypto key in a way that means hacks are easy to spot. Chinese researchers have already got such a system working for secure communications, and even used it last month to hold the world’s first quantum-secured video conference.

The stumbling block here, of course, may be funding—and it’s tough to know whether investment in such projects will be given the nod under the Trump administration. On the one hand, the president is seeking to cut funding at the Department of Energy for research that could be done by industry; on the other, one of his stated aims is to guard American infrastructure from cyberattack. Where projects like this fall on Trump's radar is, frankly, anyone’s guess.

Deep Dive

Uncategorized

Maximize business value with data-driven strategies

Every organization is now collecting data, but few are truly data driven. Here are five ways data can transform your business.

Modern security demands an empathy-first approach to insiders

While attention is often focused on threats from outside the organization, employees too can pose a risk to security—even inadvertently.

The book ban movement has a chilling new tactic: harassing teachers on social media

Educators who stand up to conservative activists are being harassed and called “groomers” online, turning them into potential targets for real-world violence.

OpenAI is ready to sell DALL-E to its first million customers

But the company has had to rush out fixes to the image-making model’s worst flaws to do so.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.