recommended reading

Snipers Coordinated an Attack on the Power Grid, but Why?

PhotoXpress

Last April, unknown attackers shot up 17 transformers at a California substation in what the then-chairman of the Federal Energy Regulatory Commission Jon Wellinghoff called "the most significant incident of domestic terrorism involving the grid that has ever occurred" in this country.

Though news reports about the incident at the Metcalf transmission facility came out in April, The Wall Street Journal just pieced together the larger story of the attack together from regulatory filings and outside reporting.

Various power-grid facilities are vandalized or damaged regularly, but the details of this particular attack are startling. 

Before the attackers opened fire on the transformers, fiber optic lines running nearby were cut.

Whoever executed the maneuver knew where to shoot the transformers. They aimed at the oil-cooling systems, causing them to leak oil and eventually overheat. By the time that happened, the attackers were long gone. 

Wellinghoff toured the site with Navy Seals, according to the Journal, and they were convinced that it was a professional job. Several people in the Journal story join Wellinghoff in talking up the physical (not cyber) threats to the grid's stability.

Despite the great reporting in the WSJ story, the central question remains unresolved: Why did this attack occur? What did they want? 

There are something like 1,500 substations just in the regional utility PG&E's network. Why this one? What makes Metcalf special? It's not especially remote. In fact, there is a housing development less than 500 feet away. (And how did those people not hear 100 rounds being fired?)

The Metcalf facility sends power into San Jose/Silicon Valley. But it sounds as though the grid operators were able to route power around the damage in the grid fairly easily. 

Without being too Pynchonian about the whole thing, I find myself asking: What would an attack like this allow someone to do somewhere else? What else was going on in the wee hours of April 16, 2013?

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    View
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    View
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    View
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    View
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    View
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    View

When you download a report, your information may be shared with the underwriters of that document.