Grid, smart or not, is extremely complex and interwoven
The smarter the grid becomes, the more risks it will encounter

Hollywood collided with couch-dwelling gamers this Christmas because of the hack on Sony’s computer system, allegedly committed by North Korea. Immediately, security experts began to wonder if a nation state or a terrorist group might try and hit the U.S. electric grid. The answer is likely yes, but it wouldn’t be the first time or the last, and the grid, smart or not, is extremely complex and interwoven. The smarter the grid becomes, the more risks it will encounter.

The U.S. power grid is divided into three sections: The Eastern Interconnection for states east of the Rocky Mountains, The Western Interconnection for states from the Pacific Ocean to the Rocky Mountains, and the smallest—the Texas Interconnected system—covering most of Texas. Electricity coming from coal, nuclear or hydroelectric plants goes to local utilities and they distribute power to homes and businesses, to millions of personal devices, lights, refrigeration, computers, and to other “loads,” that tap it.

According to a 2011 report by the American Society of Civil Engineers (ASCE), the nation’s electric infrastructure is “nothing but a patchwork system” that has evolved wildly since the first substation was erected by Thomas Edison in 1882, on New York City’s Pearl Street.

Contributing to the challenges of securing the grid are the crazily disparate ages and capacities of the grid’s equipment. The ASCE report says that “About 51 percent of the generating capacity of the U.S. is in plants that were at least 30 years old at the end of 2010. Most gas-fired capacity is less than 10 years old, but 73 percent of all coal-fired capacity is 30 years or older.” The report adds that “…70 percent of transmission lines and power transformers are 25 years or older nationally, while 60 percent of circuit breakers are more than 30 years old.”

There are many possible targets, too. Approximately 300 control centres around the country monitor voltage and watch the data from SCADA (supervisory control and data acquisition) systems, which are placed at transformers, generators and other critical areas. Ideally, this allows engineers to monitor the data for signs of trouble and then communicate with each other to deal with whatever is happening to the grid, but SCADA has security issues.

The complex ownership arrangements and operating systems are constantly evolving, as are the technologies used to create power

Demand for power is soaring, greatly taxing the nation’s 5,800 major power plants and 450,000 miles of high-voltage transmission lines.

There are also complicated differences between the electric grid and other infrastructure types, and some contribute to the security challenges. The ASCE report delineates the differences as:

  • Ownership. Only a portion of the grid is owned by federal agencies, municipal governments and/or rural cooperatives. The bulk is owned by for-profit, investor-owned utilities but the rates are usually regulated by state agencies, and there is also federal and state regulatory oversight of generating facilities and transmission systems.
  • A multitude of different technologies are being used, from fossil fuels such as coal, oil, diesel and natural gas, to renewable power, which includes hydro, wind, solar, geothermal or biomass. There are also many technology systems in use in the SCADA systems for transmission and distribution.
  • Deregulation has resulted in the three elements (generation, transmission, and distribution) being operated by different parties. This severely impacts security, and it facilitates the growth of independent power production and distributed generation, which will take money out of the utilities’ pockets.

In addition, according to a 2013 report by the Edison Institute, utilities worry that as more businesses and households use solar, wind and other sources to generate their own power, they will lose customers and revenues while still having to absorb the costs of running the grid.

All of this adds up to uncertainty, and uncertainty complicates security. The complex ownership arrangements and operating systems are constantly evolving, as are the technologies used to create power. The diversification of fuels provide a bit of protection from unforeseen future issues with any one type of generation, but no one knows about the future prices of fossil fuels, regulations controlling greenhouse gas emissions and the feasibility of the “smart grid.”

So, before even considering a cyber-attack or a downed tree, there are concerns about the grid. The same ASCE report says that at least $11 billion must be spent annually or “the electrical service interruptions between now and 2020 will cost $197 billion.” That’s only five years from now.

Download PDF version Download PDF version

Author profile

Vicki Contavespi Washington Correspondent, SecurityInformed.com

In case you missed it

What's new in technology serving the transportation market?
What's new in technology serving the transportation market?

Transportation enables the movement of goods and people, facilitates trade and commerce, and is crucial for businesses to operate and expand. Security technology plays a major role...

What is the expanding role of audio in today's physical security systems?
What is the expanding role of audio in today's physical security systems?

Audio might detect sounds like breaking glass or footsteps before a person even enters the field-of-view of a video camera. Audio also helps to provide context: Someone running in...

Marin Hospital enhances security with eCLIQ access control
Marin Hospital enhances security with eCLIQ access control

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

Quick poll
Which feature is most important in a video surveillance system?