If a utility wants to spend money to protect itself, they put themselves at a cost disadvantage, which often keeps them from making changes
The number-one cause of most power outages in the U.S. is bad weather

What does the industry consider to be its most severe threats the U.S. electric grid? There is no shortage of nightmare scenarios.

According to the Department of Energy, the number-one cause of most power outages in the U.S. is bad weather, which costs the economy between $18 billion and $33 billion every year in lost output and wages, spoiled inventory, delayed production and damage to grid infrastructure.

When considering what’s at stake, it’s important to keep in mind that a large power transformer (LPT) is an enormous, custom-built piece of equipment tailored to customers’ specifications. They usually aren’t interchangeable with each other, and they aren’t produced for spare-part inventories, so if one blows a lot of companies and homes could be without power for more than six months. They’re not cheap, either. According to EEP (Electrical Engineering Portal), $10 million is a fairly average cost, but that doesn’t include transporting the gargantuan piece of equipment or installing it, which usually adds an additional 35 percent to the bill.

As Dave Hunt, an independent homeland security consultant and a founding member of the National InfraGard Electromagnetic Pulse special interest group, puts it, “Hurricanes, flooding, tornadoes—you know you’ll get these, so do we prepare for a rare event or do we put it [money] into more sandbags?” It’s a troubling question considering all the possible threats facing the grid. Ironically, if a utility wants to spend money to protect itself, they put themselves at a cost disadvantage, which often keeps them from making changes.

An extraordinarily large solar flare could cause an Electromagnetic pulse event (EMP)
NASA estimates that a solar storm event today would make the earth go dark in about three minutes

Solar storms. In 1859, British solar astronomer Richard Carrington witnessed a white-light solar flare—a magnetic explosion on the sun—which was so strong it was visible from earth. If we were to experience something like that now, it would have dire consequences. Not only would it disrupt the magnetic field, but it would charge the ground with electricity and that voltage could get in to a transformer and destroy it. Moreover, in today’s electronic and GPS-guided world nothing would work. NASA estimates that a comparable event today would make the earth go dark in about three minutes.

An extraordinarily large solar flare could also cause an Electromagnetic pulse event (EMP), which would plunge the world into chaos almost immediately. Cell phones and computers would stop working; electricity would be gone over a very large area, and it could take up to a year to fix; people on life-saving medical equipment would die. Whatever food is in the stores would be gone or rotten in a matter of days. Recent testimony by Peter Vincent Pry, a member of the Congressional EMP Commission and executive director of the Task Force on National and Homeland Security, indicates that an EMP event such as occurred in 1859 could wipe out half of America's population in a year.

This kind of event, says Hunt, could also occur if a nation state exploded a nuclear device above the U.S. “If Iran were to ignite a nuclear bomb about 200 miles over the middle of the country, a super high pulse lasting a billionth of a second would fry any unprotected electronics. Planes would be dropping out of the sky.” Moreover, our backup generators wouldn’t work once the gas ran out.

An extraordinarily large solar flare could cause an Electromagnetic pulse event (EMP), which would plunge the world into chaos almost immediately. Cell phones and computers would stop working; electricity would be gone over a very large area, and it could take up to a year to fix; people on life-saving medical equipment would die

Physical attack. Last April, someone or some people (no one has been caught) slipped into an underground vault and cut a couple of communications cables. Within a half hour, snipers were surgically shooting at a PG&E electrical substation in Metcalf, Calif., and taking out 17 giant transformers that power Silicon Valley. Surveillance tapes reveal that a minute before the police showed up, the perpetrators disappeared.

It took utility workers nearly a month to make repairs and bring the substation back to life. This event says Hunt, “was a very sophisticated attack,” and it is viewed by many as a trial run and a possible terrorist act that, if it were widely replicated across the country, could take down the U.S. electric grid and black out much of the country. PG&E’s response was to build a wall around the substation.

Stupidity. Last July 3, DHS replied to a Freedom of Information Act (FOIA) request on a malware attack on Google called “Operation Aurora.”  Unfortunately, DHS made an enormous mistake and released more than 800 pages of documents related not to Operation Aurora but to the Aurora Project, which is a 2007 research project run by Idaho National Laboratory that demonstrates how easy it is to hack elements in power and water systems.

The Aurora Project exposed a vulnerability common to many electrical generators, water pumps and other pieces of infrastructure, wherein an attacker remotely opens and closes key circuit breakers, throwing the machine’s rotating parts out of synchronization causing parts of the system to break down.

Hunts says, “If the nation loses power we won’t have the ability to pull ourselves up by the bootstraps. You can’t respond your way out of it. You can’t stockpile enough food to feed tens of millions of people a month. Any place that is running will be overwhelmed. Even if 40 percent of the country is hit, can the other 60 percent manufacture enough to save us? Sure, generators could power the stuff, but the problem with them long-term is that the fuel supply would run out.”

Generators aren’t the half of it.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Vicki Contavespi Washington Correspondent, SecurityInformed.com

In case you missed it

What New Technologies And Trends Will Shape Video Analytics?
What New Technologies And Trends Will Shape Video Analytics?

The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Will Airport Security’s Pandemic Measures Lead To Permanent Changes?
Will Airport Security’s Pandemic Measures Lead To Permanent Changes?

Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method.  AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI.   CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021.  Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.