Pipelines and cyber security

Aug. 12, 2011

In 1999, the Bellingham, Wash., gasoline pipeline ruptured killing three people. It was a control system cyber incident with many implications for future pipeline cyber impacts:

In 1999, the Bellingham, Wash., gasoline pipeline ruptured killing three people. It was a control system cyber incident with many implications for future pipeline cyber impacts:

  • it was unintentional but could have been caused maliciously
  • the control system were on Ethernet LANs and could have experienced broadcast storms or other cyber impacts (no control system cyber forensics)
  • leak detection system response was not timely
  • previous SCADA problems made the some of the SCADA system response questionable
  • sensor data during the incident were questionable
  • little, if any, control system cyber security training
In 2011, the Exxon-Mobil gasoline pipeline ruptured in Montana.  It took 54 minutes to isolate the line (from Houston). Why so long? Was leak-detection system reliable and timely?In 2010, the San Bruno, Calif., natural gas pipeline ruptured killing eight people. It was a control system cyber incident with many implications for future natural gas pipeline cyber impacts. In addition to those implications from Bellingham, the following is added:
  • weld failures weakened the line so the control system was no longer controlling the line it was designed to control
  • inappropriate maintenance on control systems can have significant system impacts (replacement of what was thought to be an uninterruptible power supply that was not uninterruptible, causing SCADA system cyber issues)
  • lack of knowledge of where manual shut-off valves were actually located has resulted in potential requirements for remote, automated, shut-off valves (cyber!). Without appropriate training and safeguards, there could be significant impacts
In 2011, the Millenium pipeline in New York reported weld failures. This has several implications:
  • unless appropriate actions are taken, this could be the next San Bruno
  • from a malicious perspective, you just told the bad guys where you are vulnerable.
These issues will be discussed at the September ACS Cyber Security Conference.  Joe Weiss

Sponsored Recommendations

Make Effortless HMI and PLC Modifications from Anywhere

The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...

The Benefits of Using American-Made Automation Products

Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...

50 Years of Automation Innovation and What to Expect Next

Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...

Manufacturing Marvels Highlights Why EZAutomation Is a Force to Be Reckoned With

Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...