power towers

Senate Passes Bill To Explore ‘Analog’ Solutions to Securing America’s Energy Grid

If the Securing Energy Infrastructure Act is signed into law, it will create a working group tasked with isolating the energy grid from attacks using “manual procedures.”

In response to growing cybersecurity threats, the Senate passed a bill on June 27 that would bolster the security of the U.S. energy grid by removing vulnerabilities that could allow hackers to gain unauthorized access to the digital system.

The Securing Energy Infrastructure Act, introduced by Sen. Angus King (I-Maine) and Sen. Jim Risch (R-Idaho), establishes a two-year pilot program with the National Laboratories tasked with creating a working group of private and public sector experts. The group will seek to identify security issues and research solutions to “isolate the energy grid from attacks,” according to a press release from King’s office.

Most surprisingly, King and Risch’s bill encourages the working group to explore the possibility of adopting new “analog devices” to isolate the most crucial parts of the energy grid from a digital system that could be manipulated by hackers.

“[The group] will examine ways to replace automated systems with low-tech redundancies, like manual procedures controlled by human operators,” the release reads. “This approach seeks to thwart even the most sophisticated cyber-adversaries who, if they are intent on accessing the grid, would have to actually physically touch the equipment, thereby making cyber-attacks much more difficult.”

The legislation was partly inspired by a cyberattack on Ukraine’s power grid in 2015 that led to power outages for over 230,000 residents. Investigators said the attack could have been much worse if the Ukrainan control system had not been “well-segmented from the control center business networks with robust firewalls,” according to WIRED magazine. Because of their grid setup, Ukrainan officials were able to restore power in the affected areas within one to six hours.

King and other members of Congress want to see the U.S. take a similar “retro” approach that would protect parts of the grid from any unauthorized digital access. The bill already has some support in the House of Representatives, where Democrat Dutch Ruppersberger of Maryland and Republican John Carter of Texas have introduced a companion measure.

If the bill is signed into law, the working group will have about two years to research analog security techniques and share their findings to the Secretary of Energy. The secretary will then be required to submit a report to Congress describing the results of the program and the feasibility of implementing the group’s recommendations.

The measure is dividing the opinions of security experts, with some applauding the effort to shift back to manual operations as a legitimate way of securing the grid. Other experts, though, say that the move could be costly and inefficient.

“We don't need to disconnect from the internet,” Ian Thornton-Trump, security head at AMTrust Europe, told Forbes. “We need to figure out how to make sure we can't control systems from the internet–or if we can, we need to be able to do it securely.”

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3