Securing the grid is crucial, but Chicken Little claims don’t help

The electric power grid is among the most important of the nation’s critical infrastructure, and billions of dollars are being invested to create an interoperable Smart Grid with two-way communications and power flow that could increase both its resilience and its vulnerability.

Securing this evolving infrastructure is important, and to do it  we need to think realistically about its vulnerabilities and not rely on hyperbole about threats.

Anyone who suffered recently in triple-digit temperatures without electricity knows just how important power is and how vulnerable the system can be. But despite these weaknesses, the grid is also surprisingly resilient. As government struggles to define its role in protecting the nation’s critical infrastructure, it is increasingly important to understand just what are the grid's real strengths and weaknesses.

Related coverage:

NIST fills some gaps in smart-grid standards

In a commentary written in April, Sens. Joe Lieberman (I-Conn.), Susan Collins (R-Maine), Jay Rockefeller (D-W.Va.) and Dianne Feinstein (D-Calif.) sounded a traditional warning.

“In the digital era, a few computer keystrokes from anywhere in the world could devastate the operations of our critical infrastructure — electric grids, water delivery systems and transportation, finance and communications networks,” they wrote. “An attack like that could cause widespread chaos, even death, and could be a preface to a wider assault on our national security.”

Systems already are being infiltrated in preparation for attacks, they wrote, and “national defense leaders . . . agree that the cyber networks of the nation’s critical infrastructure are sitting ducks for the pernicious acts of criminals, hostile foreign powers, hackers and terrorists.”

Well, not exactly. Although the threats and the need to protect against them are real, it would take more than a few keystrokes from a hacker’s laptop to do serious damage. According to the U.S. Cyber Consequences Unit, an independent research institute that studies the realities of threats, the problems that are most likely to cause widespread outages are often the ones that can be most quickly fixed. Serious damage to the core infrastructure is much more difficult to pull off.

“The sorts of cyber attacks that are easy to do would simply trigger breakers, causing only brief outages,” said Scott Borg, director of the Cyber Consequences Unit. “These would be less destructive than many storm outages.”

Borg said utilities respond well to power outages caused by weather. They have plenty of experience, they cooperate with each other, and the components being repaired and replaced are relatively easy to work with.

Attacks against physical components at the core of the grid — the generators, large transformers and cross-country transmission lines — would be much more destructive but also more difficult to carry out.

“Highly sophisticated cyberattacks, prepared by considerable numbers of highly skilled experts, could cause damage that would make the worst storm damage seem trivial,” Borg said. “This is because such attacks could physically destroy large quantities of large, hard-to-replace equipment. The consequences of this could be almost unbelievably bad.”

Those are the threats officials need to worry about and defend against at the national level. Because of their complexity (think Stuxnet: A multi-national, multi-year, multi-million dollar effort to take out key pieces of hardware in a single plant), traditional human intelligence operations will be just as important in detecting and blocking these efforts as advanced cyber monitoring.

At the same time, industry will have to be responsible for monitoring its own networks to identify and respond to threats big and small. The balance of responsibilities and authorities should be worked out with a serious eye on the real threat landscape, not hyperbole.


  • Records management: Look beyond the NARA mandates

    Pandemic tests electronic records management

    Between the rush enable more virtual collaboration, stalled digitization of archived records and managing records that reside in datasets, records management executives are sorting through new challenges.

  • boy learning at home (Travelpixs/

    Tucson’s community wireless bridges the digital divide

    The city built cell sites at government-owned facilities such as fire departments and libraries that were already connected to Tucson’s existing fiber backbone.

Stay Connected