power towers

Senate Passes Bill To Explore ‘Analog’ Solutions to Securing America’s Energy Grid

If the Securing Energy Infrastructure Act is signed into law, it will create a working group tasked with isolating the energy grid from attacks using “manual procedures.”

In response to growing cybersecurity threats, the Senate passed a bill on June 27 that would bolster the security of the U.S. energy grid by removing vulnerabilities that could allow hackers to gain unauthorized access to the digital system.

The Securing Energy Infrastructure Act, introduced by Sen. Angus King (I-Maine) and Sen. Jim Risch (R-Idaho), establishes a two-year pilot program with the National Laboratories tasked with creating a working group of private and public sector experts. The group will seek to identify security issues and research solutions to “isolate the energy grid from attacks,” according to a press release from King’s office.

Most surprisingly, King and Risch’s bill encourages the working group to explore the possibility of adopting new “analog devices” to isolate the most crucial parts of the energy grid from a digital system that could be manipulated by hackers.

“[The group] will examine ways to replace automated systems with low-tech redundancies, like manual procedures controlled by human operators,” the release reads. “This approach seeks to thwart even the most sophisticated cyber-adversaries who, if they are intent on accessing the grid, would have to actually physically touch the equipment, thereby making cyber-attacks much more difficult.”

The legislation was partly inspired by a cyberattack on Ukraine’s power grid in 2015 that led to power outages for over 230,000 residents. Investigators said the attack could have been much worse if the Ukrainan control system had not been “well-segmented from the control center business networks with robust firewalls,” according to WIRED magazine. Because of their grid setup, Ukrainan officials were able to restore power in the affected areas within one to six hours.

King and other members of Congress want to see the U.S. take a similar “retro” approach that would protect parts of the grid from any unauthorized digital access. The bill already has some support in the House of Representatives, where Democrat Dutch Ruppersberger of Maryland and Republican John Carter of Texas have introduced a companion measure.

If the bill is signed into law, the working group will have about two years to research analog security techniques and share their findings to the Secretary of Energy. The secretary will then be required to submit a report to Congress describing the results of the program and the feasibility of implementing the group’s recommendations.

The measure is dividing the opinions of security experts, with some applauding the effort to shift back to manual operations as a legitimate way of securing the grid. Other experts, though, say that the move could be costly and inefficient.

“We don't need to disconnect from the internet,” Ian Thornton-Trump, security head at AMTrust Europe, told Forbes. “We need to figure out how to make sure we can't control systems from the internet–or if we can, we need to be able to do it securely.”

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • 5 Tips to Improve Your Password Security

    Change Your Password Day is right around the corner. Observed every year on February 1, the day aims to raise awareness about cybersecurity and underscores the importance of keeping passwords strong and up to date. Read Now

  • Enhancing Port Security

    DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-leading technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security.To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. Read Now

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.