Berlin was faced with a 2nd arson attack on their power grid within a few months, leaving again thousands of households without power, for days. During this incident, several systems were damaged simultaneously deeming any backup systems, ineffective.
An attack like this requires planning, and it starts from reconnaissance.
How did the attackers know to set fire on one specific bridge that contained five high-voltage and ten medium-voltage cables, causing a major power outage in the area?
Can someone find sufficient information on a city's power grid infrastructure available on the internet?
Yes, they can. With more detail than there should be.
This is where platforms like the Open Infrastructure Map ("OpenInfraMap") enter the game.
๐๐ฉ๐๐ง๐๐ง๐๐ซ๐๐๐๐ฉ (๐ก๐ญ๐ญ๐ฉ๐ฌ://๐จ๐ฉ๐๐ง๐ข๐ง๐๐ซ๐๐ฆ๐๐ฉ.๐จ๐ซ๐ /) is an open-source web platform that provides a layered, detailed visualization on global infrastructure data like ๐ฑ๐ฐ๐ธ๐ฆ๐ณ, ๐ต๐ฆ๐ญ๐ฆ๐ค๐ฐ๐ฎ, ๐ฐ๐ช๐ญ ๐ข๐ฏ๐ฅ ๐จ๐ข๐ด ๐ฏ๐ฆ๐ต๐ธ๐ฐ๐ณ๐ฌ๐ด, ๐ธ๐ข๐ต๐ฆ๐ณ ๐ช๐ฏ๐ง๐ณ๐ข๐ด๐ต๐ณ๐ถ๐ค๐ต๐ถ๐ณ๐ฆ ๐ข๐ฏ๐ฅ ๐ฎ๐ข๐ซ๐ฐ๐ณ ๐ณ๐ข๐ช๐ญ ๐ฑ๐ฐ๐ธ๐ฆ๐ณ ๐ด๐บ๐ด๐ต๐ฆ๐ฎ๐ด ๐ช๐ฏ๐ง๐ณ๐ข๐ด๐ต๐ณ๐ถ๐ค๐ต๐ถ๐ณ๐ฆ (the data is crowdsourced from OpenStreetMap).
Don't think that searching this map needs to take time, by using Overpass Turbo (also with the help of with any LLM that it is compatible with) one can significantly trim the search time and concentrate their research through queries.
Looking at the OpenInfraMap data in combination with satellite imagery, it is easy to see why this point of attack was chosen: all the 110 ฮilovolt high-voltage lines that supply southwest Berlin converge into a single cable bridge that is overground, accessible, near a sparsely populated area, with plenty of hiding spaces (trees, etc).
The Google street view imagery provides some extra help in reviewing some of the physical security and the surrounding area in preparation of a better plan.
The OpenInfraMap in combination with Google maps is just one simple example of potential adversarial OSINT. There is more publicly available information and databases that can be researched, found, and used in similar acts of sabotage (or worse, given the geopolitical state we are currently in).
It is scary easy for saboteurs or other attackers to find vulnerabilities on critical infrastructure free & available online, and to focus on the locations/points where an attack could have the maximum impact.
This incident has not been an isolated event.
What can be done? If you work on securing a critical infrastructure entity:
๐น Run your own OSINT analysis to identify vulnerabilities in advance. Know your level of exposure.
Control what you can:
๐น Where possible, ask platforms to add blur or remove certain imagery. Aim for less detail in what can be visible, even through crowdsourced images.
๐น Prioritize based on risk and take practical steps to implement better security measures on those vulnerable, identified spots before an adversary exploits them.
#OSINT #BerlinBlackout