Lawmakers Urge U.S. Agency to Bolster Pipeline Cybersecurity
WASHINGTON (Reuters) - Two Democratic lawmakers urged the Department of Homeland Security on Wednesday to better protect U.S. oil and gas pipelines from cyber-attacks, after a report they requested detailed a lack of federal oversight of the critical conduits.
The report released on Wednesday said Homeland Security's Transportation Security Administration, or TSA, does not have a process to update its pipeline security guidelines to reflect revisions to standards considered by experts and regulators to be the industry bible on cybersecurity.
The standards on avoiding hacker attacks are the Cybersecurity Framework from the National Institute of Standards and Technology.
The report by the General Accountability Office, or GAO, the investigative arm of Congress, was requested by Senator Maria Cantwell and Representative Frank Pallone.
"Protecting our pipelines, and the people who live and work near them, must be a top priority for our government and I hope this report will prompt the Trump administration to start treating this challenge with the urgency it deserves," Cantwell said in a release.
A DHS official said TSA is "extremely proud" of its work on pipeline cybersecurity, which has included the publication of security guidelines, information sharing, and analysis of pipeline security reviews.
The GAO issued 10 recommendations for the TSA including implementing a process for reviewing, and if necessary revising, security guidelines at regular intervals. DHS agreed with all the recommendations in the report.
Energy infrastructure has long been a target of hackers. Last week, hackers using a variant of the notorious Shamoon virus crippled more than 300 computers owned by Italian oil services company Saipem and brought down servers in the Middle East and India. The company did not know who conducted the strike, but an official at cybersecurity company CrowdStrike said he believed Iran was responsible.
The report on Wednesday found TSA relied on self-evaluations by the pipeline industry to determine whether operators have critical facilities in their systems that could be the target of hackers. That is a classification the agency uses to determine calculations about the vulnerability of pipelines to cyberattacks.
As a result, operators for one third of the top U.S. 100 pipeline systems, based on volume, told the TSA they did not have critical facilities, and the TSA did not verify the self-evaluations, it said.
The report also said TSA had not tracked the status of security review recommendations to pipeline operators for the past five years.
The vulnerability of gas pipelines to cyberattacks has been one argument that U.S. Energy Secretary Rick Perry, a Republican, has used to justify asking the Federal Energy Regulatory Commission to bail out aging nuclear and coal power plants, which do not depend on pipelines.
Cyber experts said Perry's plan would not shield the grid from hackers because they have a wide array of options for hitting electricity infrastructure. FERC, an independent agency of the Department of Energy, rejected the Perry directive, but the issue could come up again.
Related News
Related News
- Trump Aims to Revive 1,200-Mile Keystone XL Pipeline Despite Major Challenges
- Valero Considers All Options, Including Sale, for California Refineries Amid Regulatory Pressure
- ConocoPhillips Eyes Sale of $1 Billion Permian Assets Amid Marathon Acquisition
- ONEOK Agrees to Sell Interstate Gas Pipelines to DT Midstream for $1.2 Billion
- Energy Transfer Reaches FID on $2.7 Billion, 2.2 Bcf/d Permian Pipeline
- U.S. LNG Export Growth Faces Uncertainty as Trump’s Tariff Proposal Looms, Analysts Say
- Tullow Oil on Track to Deliver $600 Million Free Cash Flow Over Next 2 Years
- Energy Transfer Reaches FID on $2.7 Billion, 2.2 Bcf/d Permian Pipeline
- GOP Lawmakers Slam New York for Blocking $500 Million Pipeline Project
- Texas Oil Company Challenges $250 Million Insurance Collateral Demand for Pipeline, Offshore Operations
Comments