[Infowarrior] - Feds’ Smart Grid Race Leaves Cybersecurity in the Dust

Richard Forno rforno at infowarrior.org
Wed Oct 28 23:45:50 UTC 2009


Threat Level Privacy, Crime and Security Online
Feds’ Smart Grid Race Leaves Cybersecurity in the Dust
	• By Kim Zetter
	• October 28, 2009  |

http://www.wired.com/threatlevel/2009/10/smartgrid


Amid the government-funded rush to upgrade America’s aging electric  
system to a smart grid comes a strange confluence of press releases  
this week by the White House and the University of Illinois.

Tuesday morning, President Obama, speaking at Florida Power and Light  
(FPL) facilities, announced $3.4 billion in grants to utility  
companies, municipal districts and manufacturers to spur a nationwide  
transition to smart-grid technologies and fund other energy-saving  
initiatives as part of the economic stimulus package.

FPL will receive $200 million to install 2.6 million smart meters and  
other technologies that promise to reduce energy costs for customers.  
CenterPoint Energy in Houston, Texas, gets $200 million to install 2.2  
million smart meters (.pdf) and more than 550 sensors and automated  
switches. Baltimore Gas and Electric in Maryland is another $200- 
million recipient.

Strange, then, that another press release distributed Monday by the  
Information Trust Institute at the University of Illinois announces a  
grant of $18.8 million to four academic institutions to fund a five- 
year research project into securing the power grid. The project is  
supposed to make certain that the smart meters and other devices  
implemented by power companies can resist hackers and other attackers.

The latter grant, from the U.S. Departments of Energy and Homeland  
Security, provides funding to the Institute, along with Dartmouth  
College, the University of California at Davis in California and  
Washington State University for a research program called Trustworthy  
Cyber Infrastructure for the Power Grid.

“It reflects a strong consensus that cybersecurity and resilience will  
be critical to the realization of a modernized, reliable, and  
efficient power grid, so that it will be able to guarantee delivery of  
electricity to consumers and maintain critical operations, even when  
malicious cyber attacks occur,” reads the press release.

The only problem is, by the time the research project is completed,  
most of the nation will have already adopted untested and unsecured  
technologies.


Richard Clarke

How do we know they’re insecure?

Earlier this year IOActive, a computer security firm in Washington  
state, was contracted to examine the security of smart meters deployed  
by an unnamed utility company in the northwest. Mike Davis, an  
IOActive security consultant, and his fellow researchers developed a  
malicious worm that, in a simulated attack, was able to spread from  
meter to meter to take out power in more than 15,000 homes in 24  
hours. Davis says IOActive submitted his findings to the Department of  
Homeland Security. DHS, in response to a Threat Level FOIA request,  
said it can’t find the report in its files.

“Given the degree of seriousness that the Obama administration is  
applying to cybersecurity and the smart grid, we can look forward to  
the kind of things happening here that happened to Brazil, where  
hackers successfully brought down the power,” says Richard Clarke (at  
right), chairman of the Good Harbor security consulting firm and  
former special adviser to President George W. Bush on cybersecurity.

Clarke is referring to veiled reports made last year by the CIA’s  
chief cybersecurity officer, Tom Donahue, that extortionists had taken  
down the power grid in multiple regions outside the United States. The  
location of those outages has never been publicly identified.


“Smart grid” refers to the transition from the current, outdated power- 
grid infrastructure to a more technologically advanced structure that  
allows expanded real-time monitoring and energy delivery that’s more  
efficient and cost effective for utilities and consumers. The  
technology promises to solve a number of problems, but it also (as the  
Illinois press release states) could “introduce new problems, such as  
increasing the vulnerability to cyber attack as power grid resources  
become increasingly linked to the internet.”

“The concern is that the existing technologies can’t offer [security]  
guarantees, and that we could even open the door to new risks if we  
carelessly put together new systems that don’t have resilience and  
security guarantees built in from the ground up,” explained Ilesanmi  
Adesida, dean of the College of Engineering at Illinois, in the  
Information Trust Institute’s press release.

So why would the federal government accelerate the adoption of  
insecure technologies at the same time it touts cybersecurity as one  
of the nation’s biggest national security concerns?

According to the Department of Energy, the government has the smart- 
grid security issues under control.

Spokeswoman Jen Stutsman said all the entities awarded smart-grid  
funds under Obama’s $3.4 billion stimulus grant were required to  
submit a cybersecurity plan with their proposal.

“Each application was examined by at least two interoperability and  
cybersecurity experts, and it was a central component to the selection  
criteria for each of the awards,” Stutsman said.

Stutsman wouldn’t identify the experts who reviewed the cybersecurity  
plans or provide details about the plans applicants submitted.

According to the grant-proposal requirements, each applicant was  
required to submit a summary of known cybersecurity risks (.pdf) and  
explain how the applicant would mitigate them. They also had to  
identify the cybersecurity criteria they used for selecting vendors  
and technologies and the cybersecurity standards or best practices  
they planned to follow. And they had to explain how they would adapt  
to new standards that might emerge — such as those being developed by  
the National Institute of Standards and Technology.

Stutsman, addressing why the government would urge the move to smart  
meters before researchers had fully examined them, said that DoE “has  
spent years researching cybersecurity issues” and is “constantly and  
on a continuing basis … putting in place policies and programs that  
will help us gather more information.”

While the department is modernizing the electrical grid and using  
knowledge it already has, she said it will continue to apply new  
information as it becomes known. The government, she said, will  
continue to monitor utilities and others “to ensure that we are taking  
every step we can to secure the country’s electric grid.”

Himanshu Khurana, principal scientist for the Information Trust  
Institute’s power-grid research project, noted that many of the grants  
to utility companies and municipalities are for a three-year period.

“So there is still time between something being announced and  
everything being deployed for making sure that the technologies” are  
evaluated, he said.

Separate to his Institute’s research grant, Khurana belongs to a team  
that has been contracted by one of the utility companies that received  
a federal grant. His team’s job will be to help evaluate the utility  
company’s network and the technologies it plans to deploy and perhaps  
develop needed software.

“So people have reached out to cybersecurity experts and formed  
appropriate teams,” he said. “Now, it’s hard to provide assurance  
right now that everything is going to go safe. But the plan is  
feasible and there has been a lot of weight given to cybersecurity in  
the administration’s grants.”

Clarke is not so confident.

“We have no way of having any confidence that there’s any  
cybersecurity plans since we don’t know anything about the  
qualifications of the experts who examined them or the criteria  
they’re using to judge them,” he said. “In the absence of someone like  
the NSA or the cybercenter at DHS [to certify every smart-grid  
proposal], there’s no reason to believe they’re taking security  
seriously.”

More important than asking companies to submit a cybersecurity plan  
for future technologies, he says, is to require that utility companies  
and energy distributors pass an audit for their current state of  
security.

He says he’s spoken with auditing firms that have examined utility  
companies and energy distributors and found that — in every case —  
they were able to infiltrate the company’s production SCADA system  
(Supervisory Control and Data Acquisition) from the public internet in  
less than an hour.

“No grant should be given to any company that doesn’t pass an audit  
today with its existing system,” he said. “Paper audits are worthless.  
Real-world audits are what count. So if the company today has  
flagrantly bad performance with regard to cybersecurity, then it  
shouldn’t win an award for new technology until it fixes that problem.”

Photo of U.S. grid courtesy U.S. Commerce Dept. Photo of Richard  
Clarke by John Earle; courtesy Good Harbor Consulting.


More information about the Infowarrior mailing list