Infrastructure Attacks Are Cause For Concern
By: Rachel Marsden
PARIS -- At a time when many of us have become fixated on U.S. intelligence
agencies' "big data" programs, authorities are becoming aware of a much more
insidious kind of threat -- one that could successfully exploit the growing
blind spot created by our overreliance on technology.
Jon Wellinghoff, the former chairman of the Federal Energy Regulatory
Commission, told the Wall Street Journal that an April 2013 attack by multiple
gunmen on Pacific Gas and Electric's Metcalf power station in San Jose, Calif.,
that powers Silicon Valley represents "the most significant incident of domestic
terrorism involving the grid that has ever occurred."
When I asked Wellinghoff why the attack took so long to come to light, with
initial reports referring only to "gunfire" that knocked out transformers (and
making no reference to a coordinated attack), he replied: "Utility was trying to
keep it low-key to prevent copycats, perhaps. I don't know."
The FBI, meanwhile, has downplayed the incident, saying that it doesn't think
that a terrorist organization was responsible for the attack. The attackers may
not have membership cards for any of the groups on the State Department's
official list of terrorist organizations, but somehow I doubt that civilians who
lost power or communications would find that any more comforting. If attackers
are operating outside of the laws of warfare and targeting civilian
infrastructure, then they're terrorists, period.
Back in the old days, before authorities started compiling lists of terror
groups and their rosters as if they were baseball teams, there used to be a name
for a group of people who came together to wreak havoc on civilian targets:
guerrillas.
Unlike the Middle Eastern terrorist organizations that we've come to know so
well, true guerrillas aren't obligated to have a clearly defined political
cause. Just being against the government can suffice, with the idea of creating
a power vacuum first before worrying about filling it.
As the Occupy Wall Street protesters proved when they took to the streets in
2011, creating an ideological fog of war serves to establish a big tent to
maximize the size of the disgruntled assembly. It also means that intelligence
officials end up chasing a moving ideological target.
Complicating matters in an age when law enforcement and intelligence are going
increasingly high-tech, plans made the old-fashioned, low-tech way -- on a
placemat at a local pizza joint -- can escape detection. Just try hacking a
table at Pizza Hut.
And while federal agencies and local law enforcement are well-versed in
antiterrorism strategies, it's not unreasonable to wonder how prepared they'd be
to handle guerrillas. Even Napoleon Bonaparte was unable to successfully deal
with guerrilla tactics. The Spanish guerrillas who forced the French army's
retreat five years after its conquest of Spain were arguably Napoleon's Waterloo
long before his actual Waterloo. He called the conflict his "Spanish Ulcer."
The goal of the guerrilla is to frustrate the government and make it appear
inept and out of control, and nothing accomplishes that better than leaving
civilians without power, transportation and communications. Target selection in
urban warfare is far from random.
U.S. Special Operations forces use the CARVER system to maximize target
selection and optimize resource allocation for its missions. CARVER is an
acronym that stands for criticality, accessibility, recuperability,
vulnerability, effect and recognizability -- factors that are each assigned
numerical values ranging from 1 to 10, with a maximum score of 60. Based on the
Pentagon field manual detailing the CARVER system, the San Jose transformer
attack rated a score of 53.
Missions that disrupt communications and Internet access tend to earn high
scores, which could feasibly explain the selection of a target that powers
America's technology hub, Silicon Valley. The attackers also severed underground
fiber optic cables, prompting AT&T to offer a $250,000 reward for any
information leading to an arrest and conviction. And it wouldn't be the first
time that attackers have disrupted communications systems in the same area.
In April 2009, about five miles away from the Metcalf power station, as well as
at a second location nearby, "vandals" were reported to have cut AT&T cables 10
feet underground to knock out Internet and phone service to about 52,000
customers in Silicon Valley.
The critical question is: Are these "confidence targets" and opening gambits to
something bigger? It would be nice if federal authorities offered us more
information rather than just opining that these attacks were not the work of
terrorist organizations. Stop playing semantic games, and instead give us
assurances that you're working on a strategy for preventing such attacks.
COPYRIGHT 2014 RACHEL MARSDEN