SlideShare a Scribd company logo
Copyright © 2016 Global 1 Research & Development, Ltd. All Rights Reserved
Global 1 Research & Development, Ltd.
William D. Kiss, CEO
v 1.3
Copyright © 2016 Global 1 Research & Development, Ltd. All Rights Reserved
• Explain the different Attack Vectors relating to the vulnerability of our BES (Basic Electrical Supply)
The North American Electric Grid
• An Attack Vector is a vulnerability that an adversary exploits to cause harm / inflict damage
• DHS (Department of Homeland Security) has defined 16 Critical Economic Sectors.
• Our nation has ONE extreme vulnerability – our TOTAL dependence on electric power.
Without a constant supply of this commodity, ALL sectors of our economy cease to function.
Copyright © 2016 Global 1 Research & Development, Ltd. All Rights Reserved
• We have (basically) 3 grids that are interconnected: North-Eastern / Mid-West, Texas and Western.
(NPCC+RFC+SERC+FRCC+MRO+SPP)= North-Eastern / Mid-West; TRE=Texas; WECC=Western
Should the North-Eastern / Mid-West grid section be “Taken-Out”, the Texas and Western Grid Sections will not be able
to replace the electric capacity which was supplied by this section. (Map Courtesy NERC)
• There are three (3) scenarios that can “Take-Out” the North-Eastern / Mid-West Electric Grid:
2 which are human-caused and 1 that is a natural phenomenon.
Copyright © 2016 Global 1 Research & Development, Ltd. All Rights Reserved
A- Human Caused (ONE):
Kinetic Events (traditional attack warfare) has two possible scenarios:
a. A large scale coordinated attack with AK-47s employed to destroy the extremely large transformers
contained within major electrical distribution sub-stations. These extremely large transformers are vital
to the voltage reduction that occurs as a result of the use of high-transmission voltages. They cannot be
easily replaced. (WSJ February 6, 2014 Attack On PG&E Metcalf, CA Substation [April 16, 2013])
• Fencing Materials are available to retard the velocity and shred AK-47 projectiles. These need
to be erected around all relevant substations. Available at www.BetaFenceUSA.com
b. The detonation of a thermonuclear device (TND) at altitude, resulting in the generation of an EMP
(Electro-Magnetic Pulse) that would “fry” the grid and all electrical / electronic devices in operation at
the time of detonation.
• This is the primary reason the U.S. Government doesn’t want the PRNK (North Korea) and Iran
to have ICBM capabilities.
B- Human Caused (TWO):
A Cyber Warfare Attack (Grid-Focused)
The below three system classes are complex computer control systems in use today in many industries
globally, such as manufacturing, energy, water, power generation, etc. Sadly, most of these systems use
un-encrypted internet connections for control communications, leaving them highly vulnerable to
attack.
a. ICS – Industrial Control Systems
b. PLC – Programmable Logic Controllers
c. SCADA – Supervisory Control And Data Acquisition
TOTAL SHINE Study Vulnerable Ports reported by SHODAN in U.S. (616,994) as of 1 Oct. 2014
This attack is complicated to execute but is achievable by our adversaries.
NSA Director Admiral Mike Rodgers testified that China and Russia have implanted malware in our grid
control systems for years (11/2014 Congressional Testimony).
C- Natural Phenomenon:
Carrington Effect Level – A Significant CME (Coronal Matter Ejection) (Hyper Sunspot Activity)
In brief, this event generates an ionized particle cloud that moves thru space at a speed of approx. 750
miles/second (Original speed of CME was 1,800-2,200 miles/second) and may intersect with Earth’s
orbit around the sun. The result of this is an EMP with worse effects than a TND detonation at altitude…
Example of a CME
CME and Resulting Potential CLE
Electrified Ionosphere (Earth)
(Illustrations Courtesy NASA)
Copyright © 2016 Global 1 Research & Development, Ltd. All Rights Reserved
The U.S. Government has NASA’s STEREO Probe Satellites in close sun orbit to give us early warning of a
Carrington Effect Level CME. This combined with newly created GIC (Geomagnetic Induced Current)
Monitors should give us adequate time to respond and prevent major damage to the Extra Large
Transformers in our Grid. Let’s hope everyone is up to the task.
More information is available on solutions to these problems.
For More Information Contact: Global 1 Research & Development, Ltd. www.BillKiss.com
Creators of: Cyber Security A to Z™ and Data Breach Boot Camp Seminars™.

More Related Content

What's hot

Simply Electricity
Simply ElectricitySimply Electricity
Simply Electricity
Ibrahim Kazanci
 
4th grade ch. 13 sec. 4 how is electricity transformed
4th grade   ch. 13 sec. 4 how is electricity transformed4th grade   ch. 13 sec. 4 how is electricity transformed
4th grade ch. 13 sec. 4 how is electricity transformed
hinsz
 
Earthing, grounding and isolation
Earthing, grounding and isolation Earthing, grounding and isolation
Earthing, grounding and isolation
Dhananjaysinh Jhala
 
Effective Methods For Power Systems Grounding
Effective Methods For Power Systems GroundingEffective Methods For Power Systems Grounding
Effective Methods For Power Systems Grounding
Adeen Syed
 
Effect of grounding
Effect of groundingEffect of grounding
Effect of grounding
Mohammad Zaid
 
Wireless power transmission
Wireless power transmissionWireless power transmission
Wireless power transmission
sachin karkera
 
Solve problems in electromagnet circuits 2
Solve problems in electromagnet circuits 2Solve problems in electromagnet circuits 2
Solve problems in electromagnet circuits 2
popet
 
Electrical grounding and earthing systems
Electrical grounding and earthing systemsElectrical grounding and earthing systems
Electrical grounding and earthing systems
Biswajit Pratihari
 
Grounding in power system
Grounding in power systemGrounding in power system
Grounding in power system
vardhan k
 
Lightening
LighteningLightening
Lightening
Md Asif Hasan
 
Electric shock and earthing
Electric shock and earthingElectric shock and earthing
Electric shock and earthing
Ramesh Adhikari
 
تأريض2
تأريض2تأريض2
Nuclear power
Nuclear powerNuclear power
Nuclear power
sam Ledwidge
 
Grounding, neutral & earthing
Grounding, neutral & earthingGrounding, neutral & earthing
Grounding, neutral & earthing
Muhammad Mohsin Raza
 
Ppt super
Ppt superPpt super
Ppt super
mallikarjunavmy
 
Future Usage of Superconductivity
Future Usage of SuperconductivityFuture Usage of Superconductivity
Future Usage of Superconductivity
Jeffrey Funk
 
E Bomb
E BombE Bomb
E Bomb
Dipak Horo
 
Grounding systems
Grounding systemsGrounding systems
Grounding systems
siddheshsawant31
 
Surge current protection using superconductor ppt
Surge current protection using superconductor pptSurge current protection using superconductor ppt
Surge current protection using superconductor ppt
Chirag2016
 

What's hot (20)

Simply Electricity
Simply ElectricitySimply Electricity
Simply Electricity
 
4th grade ch. 13 sec. 4 how is electricity transformed
4th grade   ch. 13 sec. 4 how is electricity transformed4th grade   ch. 13 sec. 4 how is electricity transformed
4th grade ch. 13 sec. 4 how is electricity transformed
 
Earthing, grounding and isolation
Earthing, grounding and isolation Earthing, grounding and isolation
Earthing, grounding and isolation
 
Effective Methods For Power Systems Grounding
Effective Methods For Power Systems GroundingEffective Methods For Power Systems Grounding
Effective Methods For Power Systems Grounding
 
Effect of grounding
Effect of groundingEffect of grounding
Effect of grounding
 
Wireless power transmission
Wireless power transmissionWireless power transmission
Wireless power transmission
 
Solve problems in electromagnet circuits 2
Solve problems in electromagnet circuits 2Solve problems in electromagnet circuits 2
Solve problems in electromagnet circuits 2
 
Electrical grounding and earthing systems
Electrical grounding and earthing systemsElectrical grounding and earthing systems
Electrical grounding and earthing systems
 
E bomb seminar report
E bomb seminar reportE bomb seminar report
E bomb seminar report
 
Grounding in power system
Grounding in power systemGrounding in power system
Grounding in power system
 
Lightening
LighteningLightening
Lightening
 
Electric shock and earthing
Electric shock and earthingElectric shock and earthing
Electric shock and earthing
 
تأريض2
تأريض2تأريض2
تأريض2
 
Nuclear power
Nuclear powerNuclear power
Nuclear power
 
Grounding, neutral & earthing
Grounding, neutral & earthingGrounding, neutral & earthing
Grounding, neutral & earthing
 
Ppt super
Ppt superPpt super
Ppt super
 
Future Usage of Superconductivity
Future Usage of SuperconductivityFuture Usage of Superconductivity
Future Usage of Superconductivity
 
E Bomb
E BombE Bomb
E Bomb
 
Grounding systems
Grounding systemsGrounding systems
Grounding systems
 
Surge current protection using superconductor ppt
Surge current protection using superconductor pptSurge current protection using superconductor ppt
Surge current protection using superconductor ppt
 

Viewers also liked

Aikakausmediat somessa / lokakuu 2016
Aikakausmediat somessa / lokakuu 2016Aikakausmediat somessa / lokakuu 2016
Aikakausmediat somessa / lokakuu 2016
Aikakausmedia
 
Growline: Principales preocupaciones de los padres de hoy
Growline: Principales preocupaciones de los padres de hoyGrowline: Principales preocupaciones de los padres de hoy
Growline: Principales preocupaciones de los padres de hoy
ESET Latinoamérica
 
Lux final
Lux finalLux final
Lux final
Maha Akin
 
Modern Mobile Web Apps
Modern Mobile Web AppsModern Mobile Web Apps
Modern Mobile Web Apps
dynamis
 
Docker Multihost Networking
Docker Multihost Networking Docker Multihost Networking
Docker Multihost Networking
Nicola Kabar
 
CETH for XDP [Linux Meetup Santa Clara | July 2016]
CETH for XDP [Linux Meetup Santa Clara | July 2016] CETH for XDP [Linux Meetup Santa Clara | July 2016]
CETH for XDP [Linux Meetup Santa Clara | July 2016]
IO Visor Project
 
Docker Online Meetup: Infrakit update and Q&A
Docker Online Meetup: Infrakit update and Q&ADocker Online Meetup: Infrakit update and Q&A
Docker Online Meetup: Infrakit update and Q&A
Docker, Inc.
 
Docker and Microsoft - Windows Server 2016 Technical Deep Dive
Docker and Microsoft - Windows Server 2016 Technical Deep DiveDocker and Microsoft - Windows Server 2016 Technical Deep Dive
Docker and Microsoft - Windows Server 2016 Technical Deep Dive
Docker, Inc.
 

Viewers also liked (8)

Aikakausmediat somessa / lokakuu 2016
Aikakausmediat somessa / lokakuu 2016Aikakausmediat somessa / lokakuu 2016
Aikakausmediat somessa / lokakuu 2016
 
Growline: Principales preocupaciones de los padres de hoy
Growline: Principales preocupaciones de los padres de hoyGrowline: Principales preocupaciones de los padres de hoy
Growline: Principales preocupaciones de los padres de hoy
 
Lux final
Lux finalLux final
Lux final
 
Modern Mobile Web Apps
Modern Mobile Web AppsModern Mobile Web Apps
Modern Mobile Web Apps
 
Docker Multihost Networking
Docker Multihost Networking Docker Multihost Networking
Docker Multihost Networking
 
CETH for XDP [Linux Meetup Santa Clara | July 2016]
CETH for XDP [Linux Meetup Santa Clara | July 2016] CETH for XDP [Linux Meetup Santa Clara | July 2016]
CETH for XDP [Linux Meetup Santa Clara | July 2016]
 
Docker Online Meetup: Infrakit update and Q&A
Docker Online Meetup: Infrakit update and Q&ADocker Online Meetup: Infrakit update and Q&A
Docker Online Meetup: Infrakit update and Q&A
 
Docker and Microsoft - Windows Server 2016 Technical Deep Dive
Docker and Microsoft - Windows Server 2016 Technical Deep DiveDocker and Microsoft - Windows Server 2016 Technical Deep Dive
Docker and Microsoft - Windows Server 2016 Technical Deep Dive
 

Similar to North America's Electrical Grid @ Risk v1.3

US Grid Security - Climate Institute
US Grid Security - Climate InstituteUS Grid Security - Climate Institute
US Grid Security - Climate Institute
Manu Preckler
 
Kappenman Linked In
Kappenman Linked InKappenman Linked In
Kappenman Linked In
John Kappenman
 
Solar Superstorms: Planning for an Internet Apocalypse
Solar Superstorms: Planning for an Internet ApocalypseSolar Superstorms: Planning for an Internet Apocalypse
Solar Superstorms: Planning for an Internet Apocalypse
Guy Boulianne
 
Blackout white paper_by_ieee_pes_ad_comm_final_082504
Blackout white paper_by_ieee_pes_ad_comm_final_082504Blackout white paper_by_ieee_pes_ad_comm_final_082504
Blackout white paper_by_ieee_pes_ad_comm_final_082504
Shraddha Dwivedi
 
Seminar on Lightning of building
Seminar on Lightning of buildingSeminar on Lightning of building
Seminar on Lightning of building
UNIVERSAL ENGINEERING COLLEGE
 
Emp Defense Council.2011.01.03
Emp Defense Council.2011.01.03Emp Defense Council.2011.01.03
Emp Defense Council.2011.01.03
David Palella
 
The Effects of Space Weather - March 2019
The Effects of Space Weather - March 2019The Effects of Space Weather - March 2019
The Effects of Space Weather - March 2019
ChadCogan
 
SolarMax - A space weather survival guide
SolarMax - A space weather survival guideSolarMax - A space weather survival guide
SolarMax - A space weather survival guide
Remco Timmermans
 
Sample 2_Heidi_Thiessen_scholarship
Sample 2_Heidi_Thiessen_scholarshipSample 2_Heidi_Thiessen_scholarship
Sample 2_Heidi_Thiessen_scholarship
Joel S Thomson
 
Cascade Protection with Transient Voltage copy
Cascade Protection with Transient Voltage copyCascade Protection with Transient Voltage copy
Cascade Protection with Transient Voltage copy
Jesus A Borjas P.E., California
 
Lightning concepts iii
Lightning concepts iiiLightning concepts iii
Lightning concepts iii
ILDTECH
 
Wireless Power Transmission via solar Satellite
Wireless Power Transmission via solar SatelliteWireless Power Transmission via solar Satellite
Wireless Power Transmission via solar Satellite
Pranav kumar Jaiswal
 
Starfish prime and EMP Attack collateral damages
Starfish prime and EMP Attack collateral damagesStarfish prime and EMP Attack collateral damages
Starfish prime and EMP Attack collateral damages
LaLibre
 
Space Based Solar Power
Space Based Solar PowerSpace Based Solar Power
Space Based Solar Power
Charles Radley
 
Power System Essay
Power System EssayPower System Essay
Power System Essay
Divya Watson
 
2GB19ME404[1].ppt
2GB19ME404[1].ppt2GB19ME404[1].ppt
2GB19ME404[1].ppt
BasavaPrabhu14
 
Water Treatment Plant Protection
Water Treatment Plant ProtectionWater Treatment Plant Protection
Water Treatment Plant Protection
Mike Nager
 
Emp Bomb
Emp BombEmp Bomb
Emp Bomb
Rehan Fazal
 
Substation grounding
Substation groundingSubstation grounding
Substation grounding
Syed Ubaid
 
Electromagnetic Bombs(E-Bombs)
Electromagnetic Bombs(E-Bombs)Electromagnetic Bombs(E-Bombs)
Electromagnetic Bombs(E-Bombs)
MURALIDHAR R
 

Similar to North America's Electrical Grid @ Risk v1.3 (20)

US Grid Security - Climate Institute
US Grid Security - Climate InstituteUS Grid Security - Climate Institute
US Grid Security - Climate Institute
 
Kappenman Linked In
Kappenman Linked InKappenman Linked In
Kappenman Linked In
 
Solar Superstorms: Planning for an Internet Apocalypse
Solar Superstorms: Planning for an Internet ApocalypseSolar Superstorms: Planning for an Internet Apocalypse
Solar Superstorms: Planning for an Internet Apocalypse
 
Blackout white paper_by_ieee_pes_ad_comm_final_082504
Blackout white paper_by_ieee_pes_ad_comm_final_082504Blackout white paper_by_ieee_pes_ad_comm_final_082504
Blackout white paper_by_ieee_pes_ad_comm_final_082504
 
Seminar on Lightning of building
Seminar on Lightning of buildingSeminar on Lightning of building
Seminar on Lightning of building
 
Emp Defense Council.2011.01.03
Emp Defense Council.2011.01.03Emp Defense Council.2011.01.03
Emp Defense Council.2011.01.03
 
The Effects of Space Weather - March 2019
The Effects of Space Weather - March 2019The Effects of Space Weather - March 2019
The Effects of Space Weather - March 2019
 
SolarMax - A space weather survival guide
SolarMax - A space weather survival guideSolarMax - A space weather survival guide
SolarMax - A space weather survival guide
 
Sample 2_Heidi_Thiessen_scholarship
Sample 2_Heidi_Thiessen_scholarshipSample 2_Heidi_Thiessen_scholarship
Sample 2_Heidi_Thiessen_scholarship
 
Cascade Protection with Transient Voltage copy
Cascade Protection with Transient Voltage copyCascade Protection with Transient Voltage copy
Cascade Protection with Transient Voltage copy
 
Lightning concepts iii
Lightning concepts iiiLightning concepts iii
Lightning concepts iii
 
Wireless Power Transmission via solar Satellite
Wireless Power Transmission via solar SatelliteWireless Power Transmission via solar Satellite
Wireless Power Transmission via solar Satellite
 
Starfish prime and EMP Attack collateral damages
Starfish prime and EMP Attack collateral damagesStarfish prime and EMP Attack collateral damages
Starfish prime and EMP Attack collateral damages
 
Space Based Solar Power
Space Based Solar PowerSpace Based Solar Power
Space Based Solar Power
 
Power System Essay
Power System EssayPower System Essay
Power System Essay
 
2GB19ME404[1].ppt
2GB19ME404[1].ppt2GB19ME404[1].ppt
2GB19ME404[1].ppt
 
Water Treatment Plant Protection
Water Treatment Plant ProtectionWater Treatment Plant Protection
Water Treatment Plant Protection
 
Emp Bomb
Emp BombEmp Bomb
Emp Bomb
 
Substation grounding
Substation groundingSubstation grounding
Substation grounding
 
Electromagnetic Bombs(E-Bombs)
Electromagnetic Bombs(E-Bombs)Electromagnetic Bombs(E-Bombs)
Electromagnetic Bombs(E-Bombs)
 

More from William Kiss

The Silver Bullet of Cyber Security v1.1
The Silver Bullet of Cyber Security v1.1The Silver Bullet of Cyber Security v1.1
The Silver Bullet of Cyber Security v1.1
William Kiss
 
Common Areas of Data Breach
Common Areas of Data BreachCommon Areas of Data Breach
Common Areas of Data Breach
William Kiss
 
Ali
AliAli
Your Cyber Security Picture - A Starting Point
Your Cyber Security Picture - A Starting PointYour Cyber Security Picture - A Starting Point
Your Cyber Security Picture - A Starting Point
William Kiss
 
One Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your SystemsOne Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your Systems
William Kiss
 
Cyber Security Weakest Links
Cyber Security Weakest LinksCyber Security Weakest Links
Cyber Security Weakest Links
William Kiss
 
Cyber Attack Phase Progression
Cyber Attack Phase ProgressionCyber Attack Phase Progression
Cyber Attack Phase Progression
William Kiss
 

More from William Kiss (8)

The Silver Bullet of Cyber Security v1.1
The Silver Bullet of Cyber Security v1.1The Silver Bullet of Cyber Security v1.1
The Silver Bullet of Cyber Security v1.1
 
Common Areas of Data Breach
Common Areas of Data BreachCommon Areas of Data Breach
Common Areas of Data Breach
 
Ali
AliAli
Ali
 
Your Cyber Security Picture - A Starting Point
Your Cyber Security Picture - A Starting PointYour Cyber Security Picture - A Starting Point
Your Cyber Security Picture - A Starting Point
 
One Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your SystemsOne Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your Systems
 
Cyber Security Weakest Links
Cyber Security Weakest LinksCyber Security Weakest Links
Cyber Security Weakest Links
 
4 A's BillKiss
4 A's BillKiss4 A's BillKiss
4 A's BillKiss
 
Cyber Attack Phase Progression
Cyber Attack Phase ProgressionCyber Attack Phase Progression
Cyber Attack Phase Progression
 

Recently uploaded

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 

Recently uploaded (20)

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 

North America's Electrical Grid @ Risk v1.3

  • 1. Copyright © 2016 Global 1 Research & Development, Ltd. All Rights Reserved Global 1 Research & Development, Ltd. William D. Kiss, CEO v 1.3
  • 2. Copyright © 2016 Global 1 Research & Development, Ltd. All Rights Reserved • Explain the different Attack Vectors relating to the vulnerability of our BES (Basic Electrical Supply) The North American Electric Grid • An Attack Vector is a vulnerability that an adversary exploits to cause harm / inflict damage • DHS (Department of Homeland Security) has defined 16 Critical Economic Sectors. • Our nation has ONE extreme vulnerability – our TOTAL dependence on electric power. Without a constant supply of this commodity, ALL sectors of our economy cease to function.
  • 3. Copyright © 2016 Global 1 Research & Development, Ltd. All Rights Reserved • We have (basically) 3 grids that are interconnected: North-Eastern / Mid-West, Texas and Western. (NPCC+RFC+SERC+FRCC+MRO+SPP)= North-Eastern / Mid-West; TRE=Texas; WECC=Western Should the North-Eastern / Mid-West grid section be “Taken-Out”, the Texas and Western Grid Sections will not be able to replace the electric capacity which was supplied by this section. (Map Courtesy NERC) • There are three (3) scenarios that can “Take-Out” the North-Eastern / Mid-West Electric Grid: 2 which are human-caused and 1 that is a natural phenomenon.
  • 4. Copyright © 2016 Global 1 Research & Development, Ltd. All Rights Reserved A- Human Caused (ONE): Kinetic Events (traditional attack warfare) has two possible scenarios: a. A large scale coordinated attack with AK-47s employed to destroy the extremely large transformers contained within major electrical distribution sub-stations. These extremely large transformers are vital to the voltage reduction that occurs as a result of the use of high-transmission voltages. They cannot be easily replaced. (WSJ February 6, 2014 Attack On PG&E Metcalf, CA Substation [April 16, 2013]) • Fencing Materials are available to retard the velocity and shred AK-47 projectiles. These need to be erected around all relevant substations. Available at www.BetaFenceUSA.com b. The detonation of a thermonuclear device (TND) at altitude, resulting in the generation of an EMP (Electro-Magnetic Pulse) that would “fry” the grid and all electrical / electronic devices in operation at the time of detonation. • This is the primary reason the U.S. Government doesn’t want the PRNK (North Korea) and Iran to have ICBM capabilities. B- Human Caused (TWO): A Cyber Warfare Attack (Grid-Focused) The below three system classes are complex computer control systems in use today in many industries globally, such as manufacturing, energy, water, power generation, etc. Sadly, most of these systems use un-encrypted internet connections for control communications, leaving them highly vulnerable to attack. a. ICS – Industrial Control Systems b. PLC – Programmable Logic Controllers c. SCADA – Supervisory Control And Data Acquisition TOTAL SHINE Study Vulnerable Ports reported by SHODAN in U.S. (616,994) as of 1 Oct. 2014 This attack is complicated to execute but is achievable by our adversaries. NSA Director Admiral Mike Rodgers testified that China and Russia have implanted malware in our grid control systems for years (11/2014 Congressional Testimony). C- Natural Phenomenon: Carrington Effect Level – A Significant CME (Coronal Matter Ejection) (Hyper Sunspot Activity) In brief, this event generates an ionized particle cloud that moves thru space at a speed of approx. 750 miles/second (Original speed of CME was 1,800-2,200 miles/second) and may intersect with Earth’s orbit around the sun. The result of this is an EMP with worse effects than a TND detonation at altitude… Example of a CME CME and Resulting Potential CLE Electrified Ionosphere (Earth) (Illustrations Courtesy NASA)
  • 5. Copyright © 2016 Global 1 Research & Development, Ltd. All Rights Reserved The U.S. Government has NASA’s STEREO Probe Satellites in close sun orbit to give us early warning of a Carrington Effect Level CME. This combined with newly created GIC (Geomagnetic Induced Current) Monitors should give us adequate time to respond and prevent major damage to the Extra Large Transformers in our Grid. Let’s hope everyone is up to the task. More information is available on solutions to these problems. For More Information Contact: Global 1 Research & Development, Ltd. www.BillKiss.com Creators of: Cyber Security A to Z™ and Data Breach Boot Camp Seminars™.