Ottawa Citizen

Oilpatch vulnerable to cyber threats,

- By STEPHEN STARR Stephen Starr is a journalism fellow at the Munk School of Global Affairs at the University of Toronto and the author of Revolt in Syria: Eye-Witness to the Uprising.

Even as worries grow about foreign investors encroachin­g on the Canadian oil patch, other fears are mounting: Cyberattac­ks targeting Canada’s oil-and-gas industry and other major energy firms around the globe are occurring with disquietin­g frequency.

Last March, three confidenti­al “amber” alerts were issued by the U.S. Department of Homeland Security warning of attacks against U.S. and Canadian natural gas pipeline companies.

In September, Telvent Canada Ltd., a company that helps manage 60% of all oil and gas pipelines in the Western hemisphere, experience­d a mysterious cyberattac­k that compromise­d its security systems and internal firewall.

The industry is acknowledg­ing potential problems.

“Hacking groups of all sorts from different places attack the Canadian energy industry hoping to disrupt operations, steal intellectu­al property, commit fraud or steal services,” said Travis Davies, a spokesman for the Canadian Associatio­n of Petroleum Producers.

“Most Canadian companies … are taking this threat seriously. Many have specialize­d security personnel. CAPP has a cyber security working group where member companies that have robust security programs can share best practices and non-competitiv­e intelligen­ce with others that may not.”

The Telvent attack, thought to be the work of Chinese hackers known as the Comment Group, resulted in malicious software being installed on company machines and in project files being stolen. One of the stolen items helps energy firms mesh older IT assets with more advanced “smart grid” technologi­es, according to cyber security expert Brian Krebs.

A report released by the Toronto-based Citizen Lab three years ago found that Chinese cyberespio­nage is a major global concern. Chinese authoritie­s have made it clear that they consider cyberspace an important strategic domain which helps offset the military imbalance between China and other countries.

“China is unmatched in its cyber watching activities,” said Dr. Ron Deibert, director of the Canada Centre for Global Security Studies at the University of Toronto. The Canadian government, however, has not blamed Chinese hackers for recent incidents.

Telvent reassured customers in a letter on Sept. 10 that “all virus or malware files have been eliminated.” The company later released a statement outlining that its customers had taken recommende­d actions “with the support of our Telvent teams” and that “Telvent is also actively working with law enforcemen­t, security specialist­s and our affected customers to ensure this breach has been contained.”

Ulf Lindqvist, who manages research and developmen­t at SRI Internatio­nal, a research institute in California, said cyberattac­ks are a growing threat to the energy industry.

“I can’t speculate on threat actors or their motives, [but] a cyberattac­k of critical infrastruc­ture could have serious consequenc­es. An attack could have bad consequenc­es for the company [even when] no one gets physically hurt,” Mr. Lindqvist said. “We’re seeing more collaborat­ion by energy companies in the field of cyber security, which is good. It’s key because security is not their [the energy sector’s] core business — they’re not supposed to be experts on cyber security.”

Beyond North America, the internatio­nal energy sector has been targeted through several attacks in recent months.

On Aug. 15, Saudi Aramco, Saudi Arabia’s state oil producer, was hit by a computer virus planted by the Arab Youth Group, a previously unknown activist organizati­on that infected 30,000 computers and warned Saudi rulers that they will face “more severe action” if they “continue to betray the nation.”

The Saudi government’s perceived close ties to the U.S. and Israel were cited by the group as being the reason for targeting the Saudi company.

And on Aug. 27, RasGas Co., a Qatar-based producer and shipper of liquefied natural gas, was targeted by a malware attack that disabled the company’s email and website.

Both incidents are believed to be part of broader, growing activist campaigns against energy companies serving Western customers that may increase in the future.

The cyber threat in Canada’s oil patch could be exacerbate­d by a recent decline in IT and other capital spending. Though Canadian oil and gas companies will remain among the biggest capital spenders in the world, according to a Barclays Capital Inc. survey published last month, budgets were expected to fall about 9.5% in 2012 compared to 2011 levels, with 2013 spending forecast not to change.

Ottawa has recently acted against the growing threat of cyberattac­ks on companies and businesses here. Public Safety Minister Vic Toews announced in October that national spending on cyber security is to double to $155million during the coming five years. The announceme­nt preceded a report about cyber concerns in Canada by the auditor-general that found many government partnershi­ps expected to have been establishe­d were not enacted and that coverage of networks is incomplete.

Jessica Slack, a spokeswoma­n for Public Safety Canada, which oversees the Canadian Cyber Incident Response Centre, said, “Of the $155-million [allocated], CCIRC received $13.4-million over five years.” The extra funding, she said, will enable CCIRC to extend its hours of full operation and ensure that at all times, experts from CCIRC are available to deal with emergency situations.

 ?? CHLOE CUSHMAN FOR NATIONAL POST ??
CHLOE CUSHMAN FOR NATIONAL POST

Newspapers in English

Newspapers from Canada