In a meeting of electric-power providers last week, U.
S. law enforcement officials revealed that Islamic State operatives have tried
to hack into parts of the American power grid, so far without success. But the mere fact that they're trying
has some grim implications.
One of the officials, Caitlin Durkovich, is assistant
secretary for infrastructure protection at the U. S. Department of Homeland
Security. She refused to provide
specific details of the attacks, but an FBI official said so far that the
attacks are characterized by "low capability."
For some time now, it's been obvious that cyberwarfare
may play an increasing role in future conflicts. Perhaps the most significant successful attack up to now was
mounted by a team of U. S. and Israeli experts in what came to be known as
Stuxnet. The attack was aimed at
Iran's nuclear-material centrifuges and allegedly disabled many of them in 2010
before operators figured out what was going on.
That attack was aimed at one specific facility, and the
attackers had access to abundant information on the particular equipment
involved. Doing something similar
to a significant part of the U. S. power grid would be a harder proposition for
several reasons.
A Stuxnet-style attack on one generator, or even an entire
plant, might temporarily damage
that plant and take it out of commission.
But the power grid is designed to deal with just such occurrences
without major disruptions. At any
given time, a certain number of generators are offline for repairs or
maintenance, and every so often a problem will cause one or more generators to
trip out unexpectedly. Unless the
loss of capacity is very large or happens at a critical high-demand time (say
on the hottest day of summer), the system absorbs the loss and reroutes power
from other sources to make up the difference, often with no noticeable
interruption to customers.
So in order to produce a large-scale blackout that would
do some good from a terrorism point of view, a different approach would be
needed.
The most vulnerable parts of the power grid from a
hacking point of view are the network control systems themselves—the SCADA
(supervisory control and data acquisition) devices and communications systems
that tell system operators (both human and electronic) what the status of the
grid is, and open and close the big high-voltage switches that route the
energy. A simultaneous order to a
lot of circuit breakers to open up all across a large grid would throw the
whole system into chaos, tripping other automatic breakers everywhere and
necessitating a total shutdown and resynchronization, which could take hours or
days—even longer if widespread mechanical damage occurred, which is
possible.
But doing that sort of attack would be very hard. I am no power-grid expert, but I do
know that long before the Internet came along, power utilities constructed
their own special-purpose communication networks that carried the
switch-command instructions, often by means of microwave relays or dedicated
cables. Originally, these
specialized networks were entirely independent of the Internet because there was
no such thing yet, and so were perfectly secure from Internet-based
hacking. Utilities tend not to
throw anything away that still works, so my suspicion is that a good bit of
network-control data still gets carried on these physically isolated
communications links. For a set of
hackers halfway around the world to get into those specialized communications
systems would require either amazing hacking abilities, or inside information,
or most likely both.
This is not to say that it's impossible. But the job is orders of magnitude
harder than disabling one uniform set of machines in one location. As reports on the power-grid hacking
attempts pointed out, the U. S. grid is a hodge-podge of widely different
equipment, systems, protocols, hardware, and software. A hack that might take out a power
plant in Hackensack would probably be useless on a plant in Houston. So to mount a coordinated attack that
would create a politically significant amount of trouble would be a monumental
undertaking—so hard that evil guys with limited resources may decide that some
other type of troublemaking would be a better use of their time.
Does that mean we can just sit back and enjoy the fact
that the Islamic State hackers don't know what they're doing? Not necessarily. Hackers come in all flavors, and as the
Internet has played an increasing role in the day-to-day operation of electric
utilities, those same firms have had to deal with the accompanying hazards of
malevolent cyberattacks from who knows where. So the fact that Islamic State hackers are going after the
power grid is not exactly a surprise.
While the recent revelations have led to some calls for
increased government oversight of cybersecurity for the power grid, the
industry so far seems to have done a fairly good job at policing itself. A report in USA Today back in March of
2015 said that the North American Electrical Reliability Corporation (NERC),
which is the non-profit industry-sponsored security-standard enforcer, has
slacked off on the number of penalties and fines it has assessed on its members
in recent years. But the president
of NERC says this doesn't necessarily mean that his organization is getting
lazy—it could just as well be that utilities are following the rules better.
Rules or no rules, the danger that foreign and domestic
terrorist organizations could cause massive power blackouts in the U. S. is
real. And constant vigilance on
the part of the utility operators is needed to prevent these attacks from
getting anywhere. Fortunately, the
present structure of the grid makes it a particularly difficult target. But that doesn't mean it couldn't ever
happen.
Sources: I referred to reports of the
disclosures about cyberattacks on utility infrastructures carried by CNN on
Oct. 15, 2015 at http://money.cnn.com/2015/10/15/technology/isis-energy-grid/,
and by the Washington Examiner at http://www.washingtonexaminer.com/article/2552766. USA
Today carried an in-depth study of the issue by Steve Reilly on Mar. 24,
2015 at http://www.usatoday.com/story/news/2015/03/24/power-grid-physical-and-cyber-attacks-concern-security-experts/24892471/. I blogged on Stuxnet on July 24, 2011 and July 2, 2012.
Distributed energy generation and distribution is the best answer to threat of grid attacks.
ReplyDelete