Escalating Threats to Critical Infrastructure

UNDER THE RADAR:
LEGAL RESPONSIBILITIES ARISING FROM
CYBER THREATS AND SEVERE IMPACTS TO THE GRID
by
Roland L. Trope
Trope and Schramm LLP
Stephen J. Humes
Holland & Knight
For
Edison Electrical Institute Spring Legal Conference
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
DISCLAIMER:
VIEWS EXPRESSED ARE SOLELY THOSE OF THE AUTHORS,
AND HAVE NOT BEEN REVIEWED OR APPROVED BY,
AND SHOULD NOT BE ATTRIBUTED TO –
THE U.S. MILITARY ACADEMY,
THE DEPARTMENT OF THE ARMY
THE DEPARTMENT OF DEFENSE, OR
THE U.S. GOVERNMENT.
OVERVIEW
Emerging Responsibilities
• Causes:

Escalating threats to critical infrastructure

Regulatory standards and enforcement

Executive Order (EO) 13636

NERC Task Force guidance (May 2012)
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
3
Questions for
Boards, C-Officers, and Counsel
1.
Are we prepared to receive
DHS cyber intel reports?
2.
Do we need to revise our
response plans for a
coordinated cyber attack?
3.
Do our disaster recovery
plans cover a “Severe
Cyber Impact”?
4.
Are there new legal issues
we need to address?
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
4
ESCALATING THREATS
TO
CRITICAL INFRASTRUCTURE
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
5
TIMELINE – Escalating Threats to Critical Infrastructure
EVENTS IN U.S.
China’s “Comment Group” penetrates
Diablo Canyon nuclear plant
2009
2010
2011
2012
2013
2014
Stuxnet damages Iranian
uranium enrichment centrifuges
EVENTS OVERSEAS
6
Recent Attack Record
Diablo Canyon
• Plant operated by Pacific Gas
& Electric Co.
• Reportedly breached
computer of senior nuclear
planner
• No solid indication of data
stolen
• Attempting “to identify …
security of U.S. nuclear
power generation facilities.”
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
7
TIMELINE – Escalating Threats to Critical Infrastructure
EVENTS IN U.S.
Iranian cyberattacks
on Citigroup, Wells Fargo,
Bank of America, and U.S. Bank
2012
APR
AUG
SEPT
DEC
Iranian cyberattacks
on Aramco, wipe out
hard drives on 55,000 PCs –
¾’s of Aramco’s corporate PCs
EVENTS OVERSEAS
8
9
DHS OIG Report 2013
Security of Industrial Control Systems (ICS)
“A recent survey in the energy sector revealed that a
majority of the companies in the sector had
experienced cyber attacks, and about 55 percent of
these attacks targeted ICS.”
“A successful cyber attack on ICS may result in
physical damage, loss of life, and cascading effects
that could disrupt services.”
10
11
THREAT ASSESSMENT
2013
• Increasing risk to U.S. critical infrastructure
• During next 2 years – remote chance an attack
would result in
“long-term, wide-scale disruption of services, such
as a regional power outage”
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
12
THREAT ASSESSMENT
2013
• But
“isolated state or nonstate actors … could access
some poorly protected US networks that control
core functions, such as power generation …”
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
13
REGULATORY STANDARDS
AND
ENFORCEMENT
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
14
TIMELINE – Regulatory Standards and Enforcement
FERC EVENTS
FERC rejects business judgment rule
as part of CIP standards
FERC Order 706
approves first CIP
Standards
EPAct ‘05 enacted; §1211, became §
215 of FPA; FERC to oversee mandatory
reliability standards bulk power grid
2005
2006
FERC approves
NERC CIP Standards,
Version 3 Version 4
2007
2008
2009
2010
2011
2012
NERC certified as electric
reliability organization
NERC EVENTS
15
CIP Standards Enforcement
• FY2012, FERC staff participated in regional
audits of owners, users, and operators of the
bulk power system per Order No. 706;
• Audited compliance with CIP Reliability
Standards
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
16
CIP Standards Enforcement
•152 violations of CIP Reliability Standards (CIP002 through CIP-009).
•NERC cited 279 other violations of CIP Reliability
Standards – led to $6,490,499 in proposed
penalties;
•Largest single penalty assessed was $400,000.
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
17
TIMELINE – Events Leading Up to EO 13636
EVENTS IN EXECUTIVE
President issues
BRANCH
Executive Order 13636
White House circulates
revised draft EO
White House circulates
draft Executive Order
SEC Staff issues
Cybersecurity
Disclosure Guidance
2011
2012
SEPT
AUG
NOV
2013 FEB
APR
Senate votes down
proposed cybersecurity bill
Senate votes down
proposed cybersecurity bill
EVENTS IN LEGISLATIVE BRANCH
18
EXECUTIVE ORDER 13636
FEB 12, 2013
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
19
EXECUTIVE ORDER 13636
Risk Assessment
“Repeated cyber intrusions into critical
infrastructure demonstrate the need for
improved cybersecurity.”
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
20
EXECUTIVE ORDER 13636
Standards
• Purpose:

Help owners and operators “identify, assess
and manage cyber risks”
• Direction:

NIST to coordinate development of
“Cybersecurity Framework”
• Results:

A set of “voluntary consensus-based standards
and industry best practices”
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
21
EXECUTIVE ORDER 13636
Standards
• Caution:

Participation is “voluntary”

But EO envisions Framework as a metric for
judging a company’s cybersecurity

Sec. 7(b): It “shall include guidance for
measuring the performance of an entity in
implementing” the Framework
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
22
Andy Ozment
White House Senior Director for Cybersecurity
FEB 28, 2013
• Strategy of “Framework”:

“[S]ome regulators need to
improve, and we will ask
them to consider the
Framework and issue new
regulations”
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
23
EXECUTIVE ORDER 13636
Information Sharing
• Kinds of Federal Cyber Intel:
1.
Classified – shared thru participation in
Enhanced Cybersecurity Services
2.
Unclassified – Imminent Target Notices
3.
Confidential – Catastrophic Target Notices
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
24
IMMINENT TARGET NOTICES

“unclassified reports of cyber threats to U.S.
homeland that identifies a specific targeted
entity”

Deliver to targeted entity
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
25
CATASTROPHIC TARGET NOTICES

Identify “where a cybersecurity incident could
reasonably result in catastrophic regional or
national effects”

Confidentially notify owners & operators

Provide them with basis for determination
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
26
Questions for
Boards, C-Officers, and Counsel
1.
Are we prepared to receive
DHS cyber intel reports?
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
27
BEFORE YOU RECEIVE
IMMINENT TARGET NOTICES
• Basic Questions re Receipt, Review, & Action
Who receives it?
 Who reviews it?

Who decides what actions we should take?
 Who will document what we do with it?

© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
28
BEFORE YOU RECEIVE
IMMINENT TARGET NOTICES
• Questions re Content and Timing

What information will Notice provide?

What will it withhold?

How far ahead of attack will it arrive?
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
29
Andy Ozment
White House Senior Director for Cybersecurity
FEB 28, 2013
• “When you get the
information, you will see
that much of it is
fragmentary and vague.”
• “We may say your sector
faces an unknown type of
attack, at an unknown
time, and of unknown
intensity, and we can’t tell
you more than that or
how to use it.”
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
30
BEFORE YOU RECEIVE
IMMINENT TARGET NOTICES
• Basic Questions re Protecting and Sharing Intel

How will we safeguard the intel?

What stakeholders should we notify?






NERC and State Regulators
Customers and Suppliers
Banks and Insurers
Investors – SEC filing
Who will speak to media and social media?
How will we prevent “leaks” to media and social media?
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
31
Focus Preparedness on
Severe Event Impact
Cyber Attack Task Force
Final Report
Board of Trustees Accepted: May 9, 2012
3353 Peachtree Road NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
32
Cyber Attack Task Force
Final Report
NERC GUIDE ON
WARNINGS
Board of Trustees Accepted: May 9, 2012
3353 Peachtree Road NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
NERC TASK FORCE GUIDANCE FOR RECEIPT OF THREAT WARNINGS
“If there is warning of a possible attack …, operating entities
may want to consider staffing each of the sites where it has
some operating capability.
In the event that anyone or multiple sites are damaged the
remaining facility may be able to take control, if only
partially.”
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
33
Cyber Attack Task Force
Final Report
NERC GUIDE
ON WARNINGS
Board of Trustees Accepted: May 9, 2012
3353 Peachtree Road NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
NERC TASK FORCE GUIDANCE FOR RECEIPT OF THREAT WARNINGS
“In an environment of heightened cyber threat, operating
entities may consider not keeping [primary and backup
control centers] … synchronized and using different sets of
cyber controls and hardware to ensure that both centers do
not have common vulnerabilities to potential cyber threats.”
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
34
WHAT SHOULD WE DO WITH THE INTEL?
• Consider what’s changed
• View it post-attack
• Can’t say “attack wasn’t foreseeable”


You received federal cyber intel
DHS Notice “put you on notice”
• Can’t say “we didn’t anticipate damage to others”


Inaction – inexcusable
Lack of preparedness – indefensible
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
35
WHAT SHOULD WE DO WITH THE INTEL?
• “Hurricane Sandy” test

Can’t be blamed for coordinated
cyber attack

Will be judged chiefly on –
Resilience to disruption
 Preparedness for recovery
 Speed and extent of restored operations

© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
36
Questions for
Boards, C-Officers, and Counsel
2.
Do we need to revise our
response plans for a
coordinated cyber attack?
3.
Do our disaster recovery
plans cover a “Severe
Cyber Impact”?
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
37
Severe Impact
• An emergency situation so
catastrophic that complete
restoration of electric service
is not possible.
• Preparedness aims at graceful
degradation
• The BPS is operated at
reduced state of reliability and
supply for months or possibly
years through New Normal
period.
38
SEVERE INCIDENT RESPONSE
Challenges
• Do your plans cover “worst case” of a Severe Incident?

Analogy: Events of Nature become much worse when the ocean is
involved

Examples: Hurricane Sandy’s “tidal surge”; Tōhoku earthquake’s
“tsunami”

Like the ocean, “Advanced Persistent Attacks” add magnitude,
complexity, and severity

Other critical infrastructure – like cellular service – will probably be
overwhelmed (as in Boston after bombing) – plan to use text messages
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
39
Cyber Attack Task Force
Final Report
SEVERE INCIDENT RESPONSE
Challenges
Board of Trustees Accepted: May 9, 2012
3353 Peachtree Road NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
• Do your plans:

Require scenario-based – and stress-tested – drills
• Model on USN’s “damage control” drills

Test resourcefulness by removing key people and resources

“[p]repare staff on the potential confusion and hesitation which
is inherent in an ongoing security incident”
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
40
Cyber Attack Task Force
Final Report
SEVERE INCIDENT RESPONSE
“Graceful Degradation”
Board of Trustees Accepted: May 9, 2012
3353 Peachtree Road NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
• Do your plans cover Isolation, Islands, and Survivability:

Provide for “trying to maintain reliable operations in a
reduced state for as long as possible”
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
41
SEVERE INCIDENT RESPONSE
“Graceful Degradation”
Cyber Attack Task Force
Final Report
Board of Trustees Accepted: May 9, 2012
3353 Peachtree Road NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
• Do your plans cover Islanding:
Provide strategies for –





Reduced monitoring
Reduced situational awareness
Loss of Internet
Re-charging of cell phones, tablets and other devices
Options to communicate with customers – Twitter, Facebook
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
42
SEVERE INCIDENT RESPONSE
Use of Twitter
(Assumes Internet is Operational)
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
43
SEVERE INCIDENT RESPONSE
Use of Twitter
(Assumes Internet is Operational)
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
44
Cyber Attack Task Force
Final Report
SEVERE INCIDENT RESPONSE
Investigation and Forensics
Board of Trustees Accepted: May 9, 2012
3353 Peachtree Road NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
•
Key element – preserve forensic data
•
Keep detailed records – more information generally
better than less
•
Verify that all system clocks are synchronized
•
Seek Board approval for internal investigation by outside
counsel – obtains maximum coverage of privilege
45
Recovery during
“New Normal”
Cyber Attack Task Force
Final Report
Board of Trustees Accepted: May 9, 2012
3353 Peachtree Road NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
• Do your plans:
Define “critical” and “priority” loads for system restoration
and managing load shedding
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
46
Cyber Attack Task Force
Final Report
Recovery during
“New Normal”
Board of Trustees Accepted: May 9, 2012
3353 Peachtree Road NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
• Do your plans cover:
Loss of primary and backup control centers?
Operating at a remote and physically secure alternate site?
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
47
Questions for
Boards, C-Officers, and Counsel
4.
Are there new legal issues
we need to address?
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
48
SEVEN PRIORITY CONCERNS
APR 2013 – APR 2014
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
49
SEVEN PRIORITY CONCERNS
1. Responsibilities for response and recovery will
increase.

When DHS starts issuing


IMMINENT TARGET NOTICES
CATASTROPHIC TARGET NOTICES

When DHS reviews Cybersecurity Framework

When threat assessments and incidents intensify
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
50
SEVEN PRIORITY CONCERNS
2. Information sharing agreements will need to be
drafted and/or updated

For threat warnings

For Severe Impacts

For third-party access to company sensitive data

To address necessary disclosures despite NDA’s
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
51
SEVEN PRIORITY CONCERNS
3. Incident response plans will need new
sections

For ensuring orderly “graceful degradations” of operations

For seeking Federal assistance against cyberattack

To report NERC CIP-Standards violations – seek waivers?

For insurance notifications and coverage
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
52
SEVEN PRIORITY CONCERNS
4.
Recovery plans will need new sections

For months/years of New Normal “degraded operations”

Disclosures to:




SEC
State regulators
Customers and suppliers
Update mutual assistance agreements
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
53
SEVEN PRIORITY CONCERNS
5. To what extent will you adopt NIST’S Cybersecurity
Framework standards?

Will the “Framework” include some standards that exceed
NERC CIP Standards?

“Best practices” always surpass minimum standards

Reputational damage if avoid or delay adoption
e.g., what if postpone until after a Severe Impact?
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
54
SEVEN PRIORITY CONCERNS
6.
How will you position your company to defend
against alleged violations of:

Multiple applicable versions of NERC CIP standards

NERC compliance and enforcement audits

Lawsuits – stakeholders alleging damages under New
Normal


E.g., Customers not receiving restored power on priority basis
Rate recovery of cybersecurity investment and recovery
costs
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
55
SEVEN PRIORITY CONCERNS
7. Company legal strategies will need to be updated to
reflect changing attitudes by courts and regulators
Patco Construction Co. v. People’s United Bank (1st
Cir, 2012)

Over 7 days, Bank authorized fraudulent transfers of
$588,851, ignored red flags of timing, value, and location

Bank’s security held not “commercially reasonable”

If you’re in best position to provide security, must do so
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
56
SEVEN PRIORITY CONCERNS
FTC v. HTC America (settlement), FEB 2013

HTC America failed to employ reasonable and
appropriate security practices in design of
software for mobile devices

Failed to test software to identify vulnerabilities

Security assessments every other yr. for 20 yrs.

Software vendors may become liable for
vulnerabilities
© Copyright 2013 Roland L. Trope and Stephen J. Humes. All Rights Reserved.
57
QUESTIONS
58
REPORTING REQUIREMENTS
• EOP-004: Event Reporting standard – within
24 hrs.
• CIP-001-2a: Sabotage Report – to
Interconnection parties, and FBI or RCMP
• CIP-008: Cyber Security – all reportable
Cyber Security Incidents reported to ES-ISAC
59