Menu Search Account

LegiStorm

Get LegiStorm App Visit Product Demo Website
» Get LegiStorm App
» Get LegiStorm Pro Free Demo

Critical Infrastructure: Control Systems and the Terrorist Threat (CRS Report for Congress)

Premium   Purchase PDF for $24.95 (22 pages)
add to cart or subscribe for unlimited access
Release Date Revised Jan. 20, 2004
Report Number RL31534
Report Type Report
Authors Dana A. Shea, Resources, Science and Industry Division
Source Agency Congressional Research Service
Older Revisions
  • Premium   Revised July 14, 2003 (19 pages, $24.95) add
  • Premium   Revised April 23, 2003 (17 pages, $24.95) add
  • Premium   Revised Feb. 21, 2003 (17 pages, $24.95) add
  • Premium   Oct. 1, 2002 (16 pages, $24.95) add
Summary:

Much of the U.S. critical infrastructure is potentially vulnerable to cyber-attack. Industrial control computer systems involved in this infrastructure are specific points of vulnerability, as cyber-security for these systems has not been previously perceived as a high priority. Industry sectors potentially affected by a cyber-attack on process control systems include the electrical, telephone, water, chemical, and energy sectors. The federal government has issued warnings regarding increases in terrorist interest in the cyber-security of industrial control systems, citing international terrorist organization interest in critical infrastructure and increases in cyber-attacks on critical infrastructure computer systems. The potential consequences of a successful cyber-attack on critical infrastructure industrial control systems range from a temporary loss of service to catastrophic infrastructure failure affecting multiple states for an extended duration. The National Strategy for Securing Cyberspace , released in February 2003, contains a number of suggestions regarding security measures for control systems. A focus on the further integration of public/private partnerships and information sharing is described, along with suggestions that standards for securing control systems be developed and implemented. The Homeland Security Act of 2002 ( P.L. 107-296 ) transferred and integrated several federal entities that play a role in cyber-security of control systems into the Department of Homeland Security. These entities include the Critical Infrastructure Assurance Office, the National Infrastructure Protection Center, the National Infrastructure Simulation and Analysis Center, and parts of the Department of Energy's Office of Energy Assurance. Additionally, the Homeland Security Act of 2002 created a new class of information, critical infrastructure information, which can be withheld from the public by the federal government. Efforts in increasing the cyber-security of control systems occur both at federal government facilities and, in critical infrastructure sectors, through industry groups. The Department of Energy National Laboratories, the Department of Defense, and the National Institute of Standards and Technology all have programs to assess and ameliorate the cyber-vulnerabilities of control systems. Industry-based research into standards, best practices, and control system encryption is ongoing in the natural gas and electricity sector. Possible policy options for congressional consideration include further development of uniform standards for infrastructure cyber-protection; growth in research into security methods for industrial control systems; assessing the effectiveness of the new exemptions to the Freedom of Information Act; and the integration of previous offices in the new Department of Homeland Security. This report will be updated as events warrant.