The risk environment affecting critical infrastructure is complex and uncertain; threats, vulnerabilities, and consequences have all evolved over the last 10 years. For example, as technology advances the types of attacks are evolving. Today's landscape of increased cyber and drone risks stems from growing integration of information and communications technologies with critical infrastructure operations and an adversary focus on exploiting potential cyber vulnerabilities.
Current drone law landscape
The Federal Aviation Administration (FAA) and Department of Energy (DOE) have agreed to restrict drone flights up to 400 feet within the lateral boundaries of seven Department of Energy (DOE) facilities. The FAA has placed similar airspace restrictions over military bases and assets. They have also prohibited drones usage over 10 Department of Interior facilities, which include several large dams and iconic landmarks.
Many states have set out to define critical infrastructures in their laws which seek to prohibit drones from flying over or near these facilities. Currently, 10 states specifically restrict drone access near critical facilities and infrastructures
The Department of Homeland Security identifies 16 critical infrastructure sectors:
Critical infrastructure risks can be assessed in terms of the following:
During this step, consider these kinds of questions: “why?, what?, when?, where?, how?”
Use these questions to think about event-based scenarios that could happen to your facility. Then establish how these events would impact your organization. Risk identification involves establishing three key concerns: sources of risk, areas of impact, and consequences.
The Department of Homeland Security (DHS) Risk Lexicon, defines a threat as "a natural or man-made occurrence, individual, entity, or action that has or indicates the potential to harm life, information, operations, the environment, and/or property." Drone threats are a risk that critical infrastructures face and left untreated can pose problems to national security.
The risks associated with drones are mainly external. External drone threats to critical infrastructure and facilities could originate from unintentional or targeted sources.
Critical infrastructures have many areas of impact to consider when identifying risks. Areas of impact to consider include: human life, operations, service delivery, financial, legal concerns, and brand/reputation.
Brainstorm with a team, include various levels of employees that work in the different areas of impact. Think about all consequences - ranging from a mild inconvenience to a worst-case scenario.
Security experts have warned that drones could be used by terrorists to surveil or assist in carrying out an attack on critical infrastructure and critical facilities.
The FBI and DHS have warned about attacks on the nation’s critical infrastructures. Late 2017, agencies released a joint statement, warning about recurring cyber attacks to critical infrastructures and their partners. With the United States aging infrastructure, an attack to out power grid or other sensitive facilities could have devastating consequences and the effects could easy domino into all areas of life.
What would happen if a drone attacked a critical infrastructure?
International or homegrown terrorists could adapt and refine the tactics they use in conflict zone like portable unmanned aerial systems or drones with explosives to attack key facilities, the ability to attach an improvised explosive device (IED) to a drone has already been demonstrated by terrorists.
In November of 2017, Homeland Security released an updated terror bulletin that highlights the threat of weaponized drones, chemical attacks and the continued targeting of commercial planes.
Video can be watched on Youtube: FBI director discusses threats of terrorist drones. To watch the entire committee hearing, click the link: Threats to the Homeland Committee Hearing Video.
What would happen if a drone was used to hack the power grid?
A cyberattack against the United States’ power grid could cost as much as $1 trillion to the U.S. economy, according to a report published in 2015 from the University of Cambridge Centre for Risk Studies and the Lloyd’s of London insurance market.
Experts predict this scenario would result in a rise in mortality rates as health and safety systems fail; a decline in trade as ports shut down; disruption to water supplies as electric pumps fail and chaos to transport networks as infrastructure collapses.
The total impact to the U.S. economy is estimated at $243 billion, but economic losses could top $1 trillion in the most extreme version of the scenario.
Lloyd’s of London: Whitepaper - Implications of attack on us power grid https://www.insurancejournal.com/research/research/business-blackout-lloyds-report-on-implications-of-attack-on-u-s-power-grid/
Risk cannot be eliminated entirely from the environment, but with careful planning, it can be managed and reduced. Your organization may already have protocols for these types of worst-case scenarios, and the same procedures can be applied whether the threat came from an existing perimeter breach or an aerial perimeter breach.
The next step is to identify the level of risk. The level of risk can best be understood as the probability of the event occurring and the product of the consequence of an event: Risk = Probability x Consequence.
Level of Risk = Probability x Consequence
The assessment of probability and consequence is somewhat subjective but subjectivity can be lessened by using data or facts collected from a range of available internal and external information.
When determining the likelihood of an event or risk, it can seem hard to have a precise frequency. For instance, you may want to determine the frequency of drones operating near or above your company. First, you can ask employees of all levels to report drone sighting and keep records of the events. This may not give you an exact number but can indicate if there is a problem, or if it's a growing concern.
Another way to determine the frequency of drone sightings is to monitor drones with drone detection technology. Reputable companies will allow you to try out or rent drone detection equipment for a trial period (30-day or 60-day trial), this will give the most accurate numbers to access the actual probability.
Probability Scale
Level |
Probability |
Description |
4 |
Very likely (frequent) |
Has occurred 2-3 times in the past year |
3 |
Likely (probable) |
Occurred more than 4-5 times over 5 years in this organization or in other similar organizations; is known to have occurred in the past year |
2 |
Unlikely (uncommon) |
Has occurred 2 or 3 times over 10 years in this organization or similar organizations |
1 |
Very unlikely (rare) |
Has never happened in this industry |
Consequences will range from marginal (slight inconveniences) to major (catastrophes). Determine how the events will impact different areas of your organization: daily operations, information and technology, financial, marketing and PR, human/public/national safety.
Consequence Scale
Level |
Consequence |
Areas of Impact |
||
Operations |
Financial |
Human/Safety |
||
4 |
Severe |
Complete shutdown of operation; halt core operations; |
Severe financial loss; Significant budget overrun with no capacity to adjust existing budget/resources |
Death(s)/compromises to national security |
3 |
High |
Shutdown of key operations; service delays |
Major financial loss; Requires significant adjustment to budgets |
Severe injuries, sickness. Compromises public safety |
2 |
Moderate |
Reduced performance may result in minor revenue loss; Organization existence is not threatened |
Significant financial loss; Impact may be reduced by reallocating resources |
Minor injuries, non life-threatening compromise to public |
1 |
Low |
No impact to daily operations, Minimal impact on non-core operations. |
Minor financial loss; Unlikely to impact budget or business activities |
Little actual impact to public or national security; no injuries |
Note: Ratings vary for different types of critical infrastructures. The scales above use 4 different levels; however, the number of levels can be adjusted to meet the organization’s need. Also use descriptors that suit your purpose (e.g. you might measure consequences in terms of human health, dollar value, information loss, time loss).
Once the level of risk is established, analyze the risk and identify solutions. Risk mitigation involves determining what the acceptable and unacceptable risk levels are for your organization. It also involves identifying solutions or ways to treat the risks. Unacceptable risks range in severity; some risks will require immediate solutions while others can be monitored and treated later.
For example, you may decide the probability of a drone used to survey critical infrastructure structure is 'likely' (a score of 3) and the consequences are 'moderate' (a score of 2). Using the tables and formula above, a “drone surveying critical infrastructure perimeter security” has a risk rating of 9 (i.e. 3 x 2 = 6).
Risk Rating Table
Risk rating |
Description |
Action |
12-16 |
Severe |
Needs immediate corrective action |
8-12 |
High |
Needs corrective action within 1 month; monitor risk and re-evaluate at a later date |
4-8 |
Moderate |
Needs corrective action within 3 months; monitor risk and re-evaluate at a later date |
1-4 |
Low |
Does not currently require corrective action; monitor risk |
Risks can be managed by one of four distinct methods: risk acceptance, risk avoidance, risk control (or reduction), and risk transfer (deflection).
Definition |
|
Risk Acceptance |
An explicit or implicit decision not to take an action that would affect a particular risk. |
Risk Avoidance |
A strategy or measure which effectively removes the exposure of an organization to a risk. |
Risk Control (or reduction) |
Deliberate actions taken to reduce a risk’s potential for harm or maintain the risk at an acceptable level. |
Risk Transfer (or deflection) |
Shifting some or all of the risk to another entity, asset, system, network, or geographic areas. |
Source: Homeland Security: Risk Management Fundamentals (page 23)
It is up to owners and stakeholders to determine what risk level is acceptable and unacceptable. Severe risks that cause a high degree of loss and occur frequently should be avoided at all costs. Minor risks with a low degree of loss may be acceptable. Not all the risk strategies can be implemented easily, discuss the best course of actions for your organization with your entire team.
Accept all risk of the event and consequences that come with the event occurring. Regarding drone risk, you accept the risks of a cyber or physical drone attack and the impacts it comes with, which could be financial, adverse impact on reputation,and legal liability.
How might you remove your venue from exposure to a drone hacking your company’s information? It is almost impossible to remove a building or facility with outside exposure from aerial threats completely.
Facility managers can reduce risk through staff training, preventative maintenance, and development of a risk management plan as the standard operating procedure.
Communicate with all levels of employees the risk, from maintenance workers to high-level managers; everyone needs to be aware of the dangers. If a roof air conditioner maintenance worker sees a drone on the roof, they need a procedure on who to tell; they need to be able to talk to those in the chain of command to report the incident.
Facility and operations managers can assess the risk, and if they determine it needs a more advanced solution, a drone detection system can integrate into existing security protocols. As stated before, reputable companies will allow you to set up drone detection systems on a trial basis before investing in an expensive system.
Drone threats and risks impact the whole organization not just one team, all teams can allocate or budget money to mitigate the costs. This will control the risk while reducing the financial burdens.
Sometimes managers will want to transfer the risk to someone else who is willing to assume the risk. Insurance is the most applicable way to transfer risk.
Risk management is an ongoing process. Whether you take action now or choose to monitor the situation for an extended period, decision makers must re-evaluate threats, vulnerabilities, or potential consequences on a continuous basis. With rapidly changing technology and new exploits, critical infrastructures must prepare to reduce security gaps and evolve their physical security standards.
Airsight is a leading drone detection security software company that specializes in delivering sUAV Detection Solutions and pilot location tracking for Critical Infrastructures, Universities, Spectator Sports, Prisons, Events, and more. Our UAV security experts integrate projects of all scopes and sizes nationwide, through a top consultative approach, to deliver the best UAV turnkey detection solution to secure your airspace.
Dallas1202 Richardson Dr # 304 Dallas, Texas 75206