[Editor's Note: This is the first part of a two-part profile on Joe Weiss and cybersecurity. The first part tackles why the grid is vulnerable and how Iran isĀ capable of taking out the grid; the second part will outlineĀ what a worst-case scenario could look like and what utilitiesĀ should be doing to prevent it from happening.]
Joe Weiss has been working on control systems for the electric and otherĀ industriesĀ his entire career.
āBut until cybersecurity came along,ā he says, "the utility industry did not ignoreĀ impacts on reliability and safety like they are doing now.ā
Weiss has been a subject matter expert to several government organizations, has testified before Congress and provided control system cybersecurity recommendations to the Obama Administration. For over 14 years, Weiss was the technical manager of the Electric Power Research Instituteās Enterprise Infrastructure Security program and, today, Weiss is a Managing Partner at Applied Control Solutions, a consulting firm that specializes in securing industrial control systems. He also publishes a blog, Unfettered, where he writes about cybersecurity issues and emerging threats.Ā
āI just simply canāt explain why these really smart people are doing what theyāre doing,ā Weiss says about the utility industry. āThe more appropriate phraseānot doing what they should be doing.ā
The industryĀ has not secured its critical infrastructure, Weiss argues.Ā āWeāve been led down the path to believe that oneāāthese systems are secure. And twoāāother countries don't have the capability to effectively attack the U.S. electric grid,ā he intones. āThe answer is both of those assumptions are wrong.ā
Ā
WHY THE GRID IS NOT PROTECTED
āThe design of the grid never addressedĀ cybersecurity,ā Weiss says. āItās really that simple. They accounted for reliability, safety, flexibility, interoperability and physical securityābut not cybersecurity.ā
He explains that the U.S. power grid was originally built on an n-1 concept. The concept is as follows: the grid could lose its worst-case scenario amount of equipment plus one more and the grid would still function. āBut that approach never accounted for malicious events,ā Weiss says. āThatās why itās vulnerable to cyber threats.ā
The NERCĀ Critical Infrastructure Protection Standards (CIPS) were intended to add security to the grid, but Weiss claims they are fraught with loopholes. The primary problem is that the NERC CIPS were developed by the industry itself, and the industry decided that the CIPS donāt apply to all equipment, protocols and communication media. āThe idea that the utilities themselves get to decide whatās critical [makes no sense],ā he says.
Weiss lists a few of the loopholes in the NERC CIPS. Non-routable communications such as point-to-point serial and telecom communications are excluded even though they are a major part of communications in substations and power plants. Power plants under 1,500 MW are excluded even though that eliminates 70%-80% of the generation in North America. The entire distribution network is excluded, as well asĀ small transmission assets.
The problem, Weiss argues, is the electric grid depends on all of these entities. āItās not so much losing one, but losing many,ā he concludes.Ā āThink about 9/11. Where did the hijackers get on [the planes]?Ā They didnāt get in at Logan or at Newark or at Kennedy. They got on at the small airports and then walked into the large airports as trusted. This whole concept that if youāre not big enough, you donāt have to look, is nuts. It makes no sense and creates a back door into the big utilities.ā
Ā āUnless a piece of paper can prevent someone from hacking, the grid is pretty much open. I would use the word wide open, but pretty much open.ā
In fact, he quickly adds,Ā āthe NERC CIPS are a roadmap for attacking the electric grid because they publicly state what is included and, by inference, what is not included. It basically tells the hacker where you can go because it shows them where thereās no requirement to do secure the grid, as well as the schedule for securing those assets that are considered critical.ā
Ā
WHY IRANāAND OTHERSāCOULD TAKE OUT THE GRID Ā
One year ago, Weiss says he was asked by Control Magazine to review an article. They had received an unsolicited request to publish a paper called āWhatās the Best Defense Against Stuxnet?ā The paper examined the technical issues of Stuxnet and analyzed how well the major anti-virus vendorsā products stood up against it. The paper reached the conclusion that none of the anti-virus vendors would either be able to detect or prevent Stuxnet.
āHereās the punchline,ā Weiss says. āThe article was written by an engineer in critical infrastructure protection from one of the largest engineering companies in Iran.ā
āThe worst thing aboutĀ Stuxnet,ā he notes somberly, āis that it made Iran look like a bunch of third-world morons who were incapable of protecting their systems. Unfortunately, thatās just not true.ā
Many experts write off Iran as not being capable of attacking the grid,Ā Weiss says, butĀ Iran is a very technologically developed country. IranĀ has access to all of the European anti-virus vendors and, even though U.S. anti-virus products technically arenāt sold to Iran, he says, the Iranian engineer noted in the Stuxnet articleĀ they can be easily accessed through the web.
When asked if Iran could take out the electric grid today, Weiss responds unequivocally, āYesāand not just Iran."
āIt doesnāt have to be a nation-state like Iran,ā he says. āYouāve got malicious code designed to attack these critical pieces of equipment that is available on the Internet. Itās really that simple. I canāt tell you why people do what they do or donāt do. All I can tell you is what can be done.ā
Ā
Would you like to see more utility and energy news like this in your inbox on a daily basis? Subscribe to our Utility Dive email newsletter! You may also want to read Utility Dive's look at why customer buy-in is essential to smart grid adoption.