{"id":11814,"date":"2012-06-06T05:30:50","date_gmt":"2012-06-06T09:30:50","guid":{"rendered":"http:\/\/www.geneveith.com\/?p=11814"},"modified":"2012-06-06T05:30:50","modified_gmt":"2012-06-06T09:30:50","slug":"hacking-into-the-rest-of-our-technology","status":"publish","type":"post","link":"https:\/\/www.patheos.com\/blogs\/geneveith\/2012\/06\/hacking-into-the-rest-of-our-technology\/","title":{"rendered":"Hacking into the rest of our technology"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><head><meta http-equiv=\"content-type\" content=\"text\/html; charset=utf-8\"><meta http-equiv=\"content-type\" content=\"text\/html; charset=utf-8\"><\/head><body><p>One of those darn kids invented a monster.\u00a0 It is called Shodan.\u00a0 And it threatens everything connected to the internet, which is now pretty much everything:<\/p>\n<blockquote><p>It began as a hobby for a \u00adteenage computer programmer named John Matherly, who wondered how much he could learn about devices linked to the Internet.<\/p>\n<p>After tinkering with code for nearly a decade, Matherly eventually developed a way to map and capture the specifications of everything from desktop computers to network printers to Web servers.<\/p>\n<p>He called his fledgling search engine Shodan, and in late 2009 he began asking friends to try it out. He had no inkling it was about to alter the balance of security in cyberspace.<\/p>\n<p>\u201cI just thought it was cool,\u201d said Matherly, now 28.<\/p>\n<p>Matherly and other Shodan users quickly realized they were revealing an astonishing fact: Uncounted numbers of industrial control computers, the systems that automate such things as water plants and power grids, were linked in, and in some cases they were wide open to exploitation by even moderately talented hackers.<\/p>\n<div id=\"premium-content\">\nControl computers were built to run behind the safety of brick walls. But such security is rapidly eroded by links to the Internet. Recently, an unknown hacker broke into a water plant south of Houston using a default password he found in a user manual. A Shodan user found and accessed the cyclotron at the Lawrence Berkeley National Laboratory. Yet another user found thousands of unsecured Cisco routers, the computer systems that direct data on the networks.\n<p>\u201cThere\u2019s no reason these systems should be exposed that way,\u201d Matherly said. \u201cIt just seems ludicrous.\u201d<\/p>\n<p>The rise of Shodan illuminates the rapid convergence of the real world and cyberspace, and the degree to which machines that millions of people depend on every day are becoming vulnerable to intrusion and digital sabotage. It also shows that the online world is more interconnected and complex than anyone fully understands, leaving us more exposed than we previously imagined.<\/p>\n<p>via <a href=\"http:\/\/www.washingtonpost.com\/investigations\/cyber-search-engine-exposes-vulnerabilities\/2012\/06\/03\/gJQAIK9KCV_story.html\" class=\" decorated-link\" target=\"_blank\" rel=\"nofollow\">Cyber search engine exposes vulnerabilities \u2013 The Washington Post<\/a>.<\/p><\/div>\n<\/blockquote><\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>One of those darn kids invented a monster.\u00a0 It is called Shodan.\u00a0 And it threatens everything connected to the internet, which is now pretty much everything: It began as a hobby for a \u00adteenage computer programmer named John Matherly, who wondered how much he could learn about devices linked to the Internet. After tinkering with [&hellip;]<\/p>\n","protected":false},"author":1281,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[621,1101],"class_list":["post-11814","post","type-post","status-publish","format-standard","hentry","category-technology","tag-cyber-security","tag-internet"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hacking into the rest of our technology<\/title>\n<meta name=\"description\" content=\"One of those darn kids invented a monster.\u00a0 It is called Shodan.\u00a0 And it threatens everything connected to the internet, which is now pretty much\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.patheos.com\/blogs\/geneveith\/2012\/06\/hacking-into-the-rest-of-our-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking into the rest of our technology\" \/>\n<meta property=\"og:description\" content=\"One of those darn kids invented a monster.\u00a0 It is called Shodan.\u00a0 And it threatens everything connected to the internet, which is now pretty much\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.patheos.com\/blogs\/geneveith\/2012\/06\/hacking-into-the-rest-of-our-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"Cranach\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/cranachblog\/\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-06T09:30:50+00:00\" \/>\n<meta name=\"author\" content=\"Gene Veith\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gene Veith\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.patheos.com\/blogs\/geneveith\/2012\/06\/hacking-into-the-rest-of-our-technology\/\",\"url\":\"https:\/\/www.patheos.com\/blogs\/geneveith\/2012\/06\/hacking-into-the-rest-of-our-technology\/\",\"name\":\"Hacking into the rest of our technology\",\"isPartOf\":{\"@id\":\"https:\/\/www.patheos.com\/blogs\/geneveith\/#website\"},\"datePublished\":\"2012-06-06T09:30:50+00:00\",\"dateModified\":\"2012-06-06T09:30:50+00:00\",\"author\":{\"@id\":\"https:\/\/www.patheos.com\/blogs\/geneveith\/#\/schema\/person\/f9ca8670bcc51908a78994c0484dbfa1\"},\"description\":\"One of those darn kids invented a monster.\u00a0 It is called Shodan.\u00a0 And it threatens everything connected to the internet, which is now pretty much\",\"breadcrumb\":{\"@id\":\"https:\/\/www.patheos.com\/blogs\/geneveith\/2012\/06\/hacking-into-the-rest-of-our-technology\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.patheos.com\/blogs\/geneveith\/2012\/06\/hacking-into-the-rest-of-our-technology\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.patheos.com\/blogs\/geneveith\/2012\/06\/hacking-into-the-rest-of-our-technology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.patheos.com\/blogs\/geneveith\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacking into the rest of our technology\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.patheos.com\/blogs\/geneveith\/#website\",\"url\":\"https:\/\/www.patheos.com\/blogs\/geneveith\/\",\"name\":\"Cranach\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.patheos.com\/blogs\/geneveith\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.patheos.com\/blogs\/geneveith\/#\/schema\/person\/f9ca8670bcc51908a78994c0484dbfa1\",\"name\":\"Gene Veith\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.patheos.com\/blogs\/geneveith\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/054d79faea5d476edd8f99e5f14fb17f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/054d79faea5d476edd8f99e5f14fb17f?s=96&d=mm&r=g\",\"caption\":\"Gene Veith\"},\"description\":\"Gene Edward Veith, Jr. is a writer and retired literature professor, serving as Provost Emeritus at Patrick Henry College. He has authored over 25 books on Christianity and culture, literature, classical education, and theology. Dr. Veith previously held academic and editorial roles at Concordia University Wisconsin and WORLD Magazine. A respected voice in Lutheran and classical education circles, he holds a Ph.D. in English and several honorary doctorates. He and his wife, Jackquelyn, live in St. Louis and have three children and twelve grandchildren.\",\"sameAs\":[\"https:\/\/www.facebook.com\/cranachblog\/\",\"https:\/\/en.wikipedia.org\/wiki\/Gene_Edward_Veith\"],\"url\":\"https:\/\/www.patheos.com\/blogs\/geneveith\/author\/geneveith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacking into the rest of our technology","description":"One of those darn kids invented a monster.\u00a0 It is called Shodan.\u00a0 And it threatens everything connected to the internet, which is now pretty much","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.patheos.com\/blogs\/geneveith\/2012\/06\/hacking-into-the-rest-of-our-technology\/","og_locale":"en_US","og_type":"article","og_title":"Hacking into the rest of our technology","og_description":"One of those darn kids invented a monster.\u00a0 It is called Shodan.\u00a0 And it threatens everything connected to the internet, which is now pretty much","og_url":"https:\/\/www.patheos.com\/blogs\/geneveith\/2012\/06\/hacking-into-the-rest-of-our-technology\/","og_site_name":"Cranach","article_author":"https:\/\/www.facebook.com\/cranachblog\/","article_published_time":"2012-06-06T09:30:50+00:00","author":"Gene Veith","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Gene Veith","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.patheos.com\/blogs\/geneveith\/2012\/06\/hacking-into-the-rest-of-our-technology\/","url":"https:\/\/www.patheos.com\/blogs\/geneveith\/2012\/06\/hacking-into-the-rest-of-our-technology\/","name":"Hacking into the rest of our technology","isPartOf":{"@id":"https:\/\/www.patheos.com\/blogs\/geneveith\/#website"},"datePublished":"2012-06-06T09:30:50+00:00","dateModified":"2012-06-06T09:30:50+00:00","author":{"@id":"https:\/\/www.patheos.com\/blogs\/geneveith\/#\/schema\/person\/f9ca8670bcc51908a78994c0484dbfa1"},"description":"One of those darn kids invented a monster.\u00a0 It is called Shodan.\u00a0 And it threatens everything connected to the internet, which is now pretty much","breadcrumb":{"@id":"https:\/\/www.patheos.com\/blogs\/geneveith\/2012\/06\/hacking-into-the-rest-of-our-technology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.patheos.com\/blogs\/geneveith\/2012\/06\/hacking-into-the-rest-of-our-technology\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.patheos.com\/blogs\/geneveith\/2012\/06\/hacking-into-the-rest-of-our-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.patheos.com\/blogs\/geneveith\/"},{"@type":"ListItem","position":2,"name":"Hacking into the rest of our technology"}]},{"@type":"WebSite","@id":"https:\/\/www.patheos.com\/blogs\/geneveith\/#website","url":"https:\/\/www.patheos.com\/blogs\/geneveith\/","name":"Cranach","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.patheos.com\/blogs\/geneveith\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.patheos.com\/blogs\/geneveith\/#\/schema\/person\/f9ca8670bcc51908a78994c0484dbfa1","name":"Gene Veith","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.patheos.com\/blogs\/geneveith\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/054d79faea5d476edd8f99e5f14fb17f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/054d79faea5d476edd8f99e5f14fb17f?s=96&d=mm&r=g","caption":"Gene Veith"},"description":"Gene Edward Veith, Jr. is a writer and retired literature professor, serving as Provost Emeritus at Patrick Henry College. He has authored over 25 books on Christianity and culture, literature, classical education, and theology. Dr. Veith previously held academic and editorial roles at Concordia University Wisconsin and WORLD Magazine. A respected voice in Lutheran and classical education circles, he holds a Ph.D. in English and several honorary doctorates. He and his wife, Jackquelyn, live in St. Louis and have three children and twelve grandchildren.","sameAs":["https:\/\/www.facebook.com\/cranachblog\/","https:\/\/en.wikipedia.org\/wiki\/Gene_Edward_Veith"],"url":"https:\/\/www.patheos.com\/blogs\/geneveith\/author\/geneveith\/"}]}},"_links":{"self":[{"href":"https:\/\/www.patheos.com\/blogs\/geneveith\/wp-json\/wp\/v2\/posts\/11814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.patheos.com\/blogs\/geneveith\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.patheos.com\/blogs\/geneveith\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.patheos.com\/blogs\/geneveith\/wp-json\/wp\/v2\/users\/1281"}],"replies":[{"embeddable":true,"href":"https:\/\/www.patheos.com\/blogs\/geneveith\/wp-json\/wp\/v2\/comments?post=11814"}],"version-history":[{"count":0,"href":"https:\/\/www.patheos.com\/blogs\/geneveith\/wp-json\/wp\/v2\/posts\/11814\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.patheos.com\/blogs\/geneveith\/wp-json\/wp\/v2\/media?parent=11814"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.patheos.com\/blogs\/geneveith\/wp-json\/wp\/v2\/categories?post=11814"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.patheos.com\/blogs\/geneveith\/wp-json\/wp\/v2\/tags?post=11814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}