Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


05:20 PM
Connect Directly

Lights Out: Not So Fast

Author and famed broadcast journalist Ted Koppel's new bestseller warns of a 'likely' nationwide and devastating blackout of the US grid at the hands of hackers, but some government and utility industry officials disagree.

US Department of Homeland Security and utility industry officials dispute the premise in a new book that a cyberattack is likely to knock out the US power grid.

Broadcast journalist Ted Koppel, whose bestseller “Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath" has triggered hot debate within the ICS/SCADA industry on the potential scope of a cyberattack on the US grid, said in a webcast today that the networked grid could be abused in a global conflict.

The Internet “in addition to its many virtues … is in effect a weapon of mass destruction,” he said. “Unlike any weapons system that’s ever existed before. In the past, weapons of mass destruction were only usable and obtainable by governments,” but the Internet can put such power in the hands of terrorist groups like ISIS, he said.

But taking down the grid is far from a no-brainer, he said. “It’s incredibly complex” to pull off, he said. “Thus far, the capability is only in the hands of a few nation-states, like Russia and China and possibly Iran.”

Koppel was interviewed in a taped portion of a Cisco Systems-sponsored webcast today by Energy Times. Panelists from the US Department of Homeland Security (DHS), the US Department of Energy (DOE), the North American Electric Reliability Corp. (NERC), Lincoln Electric, and Cisco Systems, participated in a live discussion about threats to the US grid.

“The grid is a very resilient piece of infrastructure with significant diversity in equipment and configurations within and across companies in the electricity sector,” said Caitlin Durkovich, assistant secretary for infrastructure protection at DHS’s national protection and program’s directorate. “At the end of the day, a nationwide blackout from a cyber attack is implausible.”

Most sites have manual backup options, she said. “An operator can click a switch and make the fixes necessary to divert the load,” she said.

Gerry Cauley, president and CEO of NERC, concurred. “We remain concerned, but it’s extremely unlikely,” he said. Not only would be it be technically difficult to pull off, but the grid is capable of going into manual mode and off computer- and network-based support, he said.

In the webcast interview, Koppel said his government and industry sources for the book concur that an attack on the power grid is highly probable, and that the nation is not prepared for the aftermath of such a massive incident. Meanwhile, the feds don’t have sufficient oversight, either, he said.

“The [power] industry has been very resistant to what it regards as a return to a federal regulation of their industry,” Koppel said. The feds can’t dictate protections to the grid operators, he said, but only propose them via NERC. “The NERC membership has to vote on whether they are going to accept this regulation, and it takes a two-third’s majority” to do so, he said.

“It’s sort of a bizarre situation,” Koppel said.

“Everything else – communications, transportation, banking:  they are all helpless without electricity,” he said. “The power grid … should be an enormous national concern. The fact that the federal government does not have authority to impose regulations on the power industry is a vulnerability. It’s a problem.”

But NERC’s Cauley says the FERC can direct the NERC to adopt standards for physical or cyber protections. NERC, which is a private nonprofit that provides a regulatory oversight role for the power industry, aims to get consensus for standards it adopts to ensure actual implementation, he said.

FERC can in fact direct NERC to adopt a standard, he said. “We are certified by them on a periodic basis.”

Meanwhile, DHS currently has certified some 1,700 private-sector individuals overall with security clearances to receive kinetic and cyber threat intelligence from the government, according to Durkovich.

“Most of our partners [here] really need is to understand tactics and techniques used by our adversaries. They don’t need to know sources and methods. It’s easier for us to get information out in a timely fashion across the … country if we can do it at the unclassified level,” she said.

Interop 2016 Las VegasLearn more about advanced threats at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas. Register today and receive an early bird discount of $200.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
2/4/2016 | 4:46:01 PM
Re: Good, but
There indeed are real threats to critical infrastructure, including the power grid. But most ICS/SCADA experts say a mass outage like Ted Koppel is predicting is not likely in the US.
User Rank: Apprentice
2/4/2016 | 2:23:58 PM
Regulated? Not regulated?
"The [power] industry has been very resistant to what it regards as a return to a federal regulation of their industry," Koppel said. The feds can't dictate protections to the grid operators, he said, but only propose them via NERC."

Wait, I'm confused.  Koppel says the federal government needs to regulate the industry but can't.  NERC says FERC can and does.

From FERCs web site:

"What FERC Does
The Federal Energy Regulatory Commission, or FERC, is an independent agency that regulates the interstate transmission of electricity, natural gas, and oil."

Whom did Mr Koppel consult before writing this book?  For god's sake this man is an internaltionally celebrated journalist!  Or at least he was.  Makes one wonder about his credibility...
User Rank: Ninja
2/4/2016 | 7:47:24 AM
Good, but
It's good to know such threats aren't as worrisome as they might otherwise be, but it's still good to consider potential problems that could stem from theoretical threats like this. If leading to better education for those working in the industry is the only outcome, that's a solid win for all of us.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-09-24
An XSS issue in Joplin desktop 1.0.190 to 1.0.245 allows arbitrary code execution via a malicious HTML embed tag.
PUBLISHED: 2020-09-24
SQL injection exists in the jdownloads 3.2.63 component for Joomla! com_jdownloads/models/send.php via the f_marked_files_id parameter.
PUBLISHED: 2020-09-24
A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by s...
PUBLISHED: 2020-09-24
A vulnerability in the DHCP message handler of Cisco IOS XE Software for Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, remote attacker to cause the supervisor to crash, which could result in a denial of service (DoS) condition. The vulnerability is due to insufficient error...
PUBLISHED: 2020-09-24
A vulnerability in the Umbrella Connector component of Cisco IOS XE Software for Cisco Catalyst 9200 Series Switches could allow an unauthenticated, remote attacker to trigger a reload, resulting in a denial of service condition on an affected device. The vulnerability is due to insufficient error h...