power towers

Senate Passes Bill To Explore ‘Analog’ Solutions to Securing America’s Energy Grid

If the Securing Energy Infrastructure Act is signed into law, it will create a working group tasked with isolating the energy grid from attacks using “manual procedures.”

In response to growing cybersecurity threats, the Senate passed a bill on June 27 that would bolster the security of the U.S. energy grid by removing vulnerabilities that could allow hackers to gain unauthorized access to the digital system.

The Securing Energy Infrastructure Act, introduced by Sen. Angus King (I-Maine) and Sen. Jim Risch (R-Idaho), establishes a two-year pilot program with the National Laboratories tasked with creating a working group of private and public sector experts. The group will seek to identify security issues and research solutions to “isolate the energy grid from attacks,” according to a press release from King’s office.

Most surprisingly, King and Risch’s bill encourages the working group to explore the possibility of adopting new “analog devices” to isolate the most crucial parts of the energy grid from a digital system that could be manipulated by hackers.

“[The group] will examine ways to replace automated systems with low-tech redundancies, like manual procedures controlled by human operators,” the release reads. “This approach seeks to thwart even the most sophisticated cyber-adversaries who, if they are intent on accessing the grid, would have to actually physically touch the equipment, thereby making cyber-attacks much more difficult.”

The legislation was partly inspired by a cyberattack on Ukraine’s power grid in 2015 that led to power outages for over 230,000 residents. Investigators said the attack could have been much worse if the Ukrainan control system had not been “well-segmented from the control center business networks with robust firewalls,” according to WIRED magazine. Because of their grid setup, Ukrainan officials were able to restore power in the affected areas within one to six hours.

King and other members of Congress want to see the U.S. take a similar “retro” approach that would protect parts of the grid from any unauthorized digital access. The bill already has some support in the House of Representatives, where Democrat Dutch Ruppersberger of Maryland and Republican John Carter of Texas have introduced a companion measure.

If the bill is signed into law, the working group will have about two years to research analog security techniques and share their findings to the Secretary of Energy. The secretary will then be required to submit a report to Congress describing the results of the program and the feasibility of implementing the group’s recommendations.

The measure is dividing the opinions of security experts, with some applauding the effort to shift back to manual operations as a legitimate way of securing the grid. Other experts, though, say that the move could be costly and inefficient.

“We don't need to disconnect from the internet,” Ian Thornton-Trump, security head at AMTrust Europe, told Forbes. “We need to figure out how to make sure we can't control systems from the internet–or if we can, we need to be able to do it securely.”

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3