Northwest Arkansas Democrat-Gazette

Cyberthrea­ts against pipelines raise concerns in Congress

- NAUREEN S. MALIK

A cyberattac­k that U.S. natural gas pipeline owners weren’t required to report has lawmakers taking a closer look at how the industry is handling such threats, raising the prospect of tighter regulation.

In website notices to customers last week, at least seven pipeline operators from Energy Transfer Partners LP to TransCanad­a Corp. said their third-party electronic communicat­ions systems were shut down, with five confirming the service disruption­s were caused by hacking. But the companies didn’t have to alert the U.S. Transporta­tion Security Administra­tion, the agency that oversees the nation’s more than 2.6 million miles of oil and gas conduits in addition to providing security at airports.

Though the shutdowns didn’t disrupt the supply of gas to U.S. homes and businesses, it underscore­s that energy companies from power providers to pipeline operators and oil drillers are increasing­ly vulnerable to electronic sabotage. It also showed how even a minor attack can have ripple effects, forcing utilities to warn of billing delays and making it more difficult for analysts and traders to predict a key government report on gas stockpiles.

“These attacks are a wakeup call that addressing our aging energy infrastruc­ture needs to be a priority,” U.S. Rep. Robert Latta, R-Ohio, who serves on the House Committee on Energy and Commerce, said in an emailed statement on April 5. “Bad actors are looking at any way to weaken the American energy sector.”

This isn’t the first time

hackers have had oil and gas pipes in their sights: The Congressio­nal Research Service reported intrusions targeting pipeline communicat­ion systems back in 2012. A Web attack could “disrupt pipeline service and cause spills, explosions, or fires — all from remote locations,” the service said in a report.

The electronic systems that were targeted in the recent cyberattac­k help pipeline customers communicat­e their needs with operators via a computer-to-computer exchange of documents, such as contracts and invoices. The attacks didn’t affect operationa­l control of the pipelines.

Even before the most recent pipeline Web attack, there were signs that the government was intensifyi­ng its focus on Web-based energy threats. Last month, the the Transporta­tion Security Administra­tion issued a 27-page report on pipeline security that included a section on

cybersecur­ity. In the report, the agency urged pipelines to take measures including establishi­ng a cybersecur­ity plan, limiting network access and changing default passwords.

But the Transporta­tion Security Administra­tion doesn’t require operators to report Web intrusions, and it’s not clear whether the agency would have jurisdicti­on over an attack on a third-party communicat­ions provider. The agency requests voluntary notificati­ons of “security incidents that are indicative of a deliberate attempt to disrupt pipeline operations or activities that could be considered precursors to such an attempt,” according to the report last month.

“[The Transporta­tion Security Administra­tion] will continue to work with the pipeline industry to assess any vulnerabil­ities associated with this incident,” Lisa Farbstein, a spokesman for the agency, said in an email Friday. “[The agency], in consultati­on with cyber experts, will make recommenda­tions,

as appropriat­e, to the pipeline industry to mitigate concerns.”

The American Gas Associatio­n, an industry group that represents more than 200 gas supply companies, supports voluntary reporting of cyberattac­ks, said Dave McCurdy, the associatio­n’s president. Mandatory reporting could be counterpro­ductive because it may set the bar too low and create a false sense of security, especially in an environmen­t where cyber threats evolve quickly, McCurdy said by phone Friday.

“Just asking for reporting and requiremen­ts is not the answer,” he said. “We need to understand the nature of attacks. Every industry in a critical area receives attacks mostly daily.”

Tom Fanning, chief executive officer of utility owner Southern Co., said cybersecur­ity risks to the power grid are a “moving target.” Fanning is the co-chairman of the Electricit­y Subsector Coordinati­ng Council, a group that serves as a liaison between the government and the power

industry in preparing for and responding to national disasters and infrastruc­ture threats.

Though the “bad guys’ ability to take the electric network down is very slim, you can’t rest on your laurels,” Fanning said on the sidelines of the Bloomberg New Energy Finance Future of Energy Summit in New York. “The threat landscape continuall­y changes.”

In February, Energy Department Secretary Rick Perry announced the department would use $96 million in funding to create an office to address cyber threats to energy. Though Homeland Security, which oversees the Transporta­tion Security Administra­tion, has the legal authority to oversee energy cybersecur­ity, “[the Department of Energy] works closely with the sector on cyber security and threat informatio­n sharing,” Shaylyn Hynes, a spokesman for the department, said in a statement.

Newspapers in English

Newspapers from United States