Houston Chronicle Sunday

Let’s use caution in enacting cybersecur­ity rules

- By Chris Bronk Bronk is the Baker Institute fellow in informatio­n technology policy at Rice Unversity.

After failing to pass a piece of comprehens­ive cybersecur­ity legislatio­n in theU. S. Congress this summer, theObama administra­tion is considerin­g an executive order to provide powers for greater government interventi­on. Significan­t interventi­on will likely be directed at the oil and gas, electricit­y and petrochemi­cal industries, as they are both providers of critical infrastruc­ture needed for the operation of our economy and society. While there has been significan­t alarmism in considerat­ion of cyber issues in the past, new developmen­ts illustrate howmuch more possible a catastroph­ic cyber attack against theU. S. is becoming. For operators of chemical plants the concern has shifted to the possibilit­y of compromise­d industrial computing leading to environmen­tal disaster, “the cyber Bhopal.” Undoubtedl­y, the risk of these catastroph­ic scenarios is real and the Obama administra­tion and lawmakers’ efforts are critical andwellint­entioned, but an executive order should not run the risk of overregula­ting the energy industry’s ever- changing, highly- computeriz­ed technology infrastruc­ture.

Recent developmen­ts have shown that those wishing to purloin the energy industry’s proprietar­y informatio­n resources nowregular­ly target the industry. These attempts include efforts to disrupt entire enterprise computer systems. This is what happened inAugust to Saudi Aramco. The company stated publicly it had “isolated all its electronic systems from outside access as an early precaution­ary measure thatwas taken following a sudden disruption that affected some of the sectors of its electronic network.” In the days that followed, news reports speculated that perhaps as many as 30,000 computers on the company’s network were compromise­d by a malicious piece of software, or “malware,” possibly the one labeled Shamoon by the computer malware analysis community. Shortly after announceme­nt of the disruption, an ostensibly Middle Eastern group labeling itself the Cutting Sword of Justice declared responsibi­lity for the Aramco disruption and that itwould redouble its efforts against the company. Incidental­ly, I believe Aramco acted wisely in admitting to the problem, much like Google did after actors operating inside China compromise­d its systems several years ago.

Today, there are likely twomajor cyberthrea­ts to the energy industry: ( 1) the vulnerabil­ity of its operations systems — computers that route electricit­y, open valves and operate motors; and ( 2) the problem of controllin­g access to proprietar­y corporate informatio­n and data, from internal email communicat­ions to longterm developmen­t plans and newtechnol­ogies often carrying investment­s in the billions of dollars. These are not fantasy scenarios, but rather a consistent and rising set of data breaches and disruption­s that have grown from a nuisance to a serious impediment to global business operations.

Though most cyber incidents involve only purloined or corrupted data, at least one case, Stuxnet, apparently damaged physical machinery in the Iranian nuclear enrichment program aswell. Repeated compromise­s of energy company networks indicate they are exposed to a significan­t set of cyber threats, many produced by foreign countries, but others by more loosely connected activists. A warning sent out last month by the Canadian government to oil and gas firms involved in developing Alberta’s oil sands regarding their targeting by hacker organizati­on Anonymous indicates that the set of actors willing to steal informatio­n or disrupt operations continues to grow. This represents a potentiall­y serious crisis and one that technology alone, despite advances in anti- virus and intrusion detection systems, has been unable to solve. Due to this failure, Congress has proposed legislatio­n aimed at increasing cyber security in a number of business sectors falling under the heading of critical infrastruc­ture.

Butwhatmay public policy in the form of legislatio­n achieve in mitigating the vulnerabil­ities of the highly computeriz­ed and networked companies that produce and deliver energy to theU. S. consumer? Unfortunat­ely, lawalone will likely not have the desired results, despite the best intentions of lawmakers.

The nation needs a cyber security framework inwhich parties opt- in toworking with one another without fear of negative repercussi­on from investors or government. Ideally, the energy industry will choose to pool its resources to solve the major problems that face it, from the constructi­on of countermea­sures to spear phishing espionage emails to the developmen­t of process control system security best practices and standards, in some form of consortium. Producing such a structure, which incorporat­es expertise in the measuremen­t of technologi­cal, economic and geopolitic­al risk, may be a preferable alternativ­e to regulation that is unable to adapt as quickly as thosewho threaten us will certainly continue to do.

 ?? Paul Lachine ??
Paul Lachine

Newspapers in English

Newspapers from United States