PowerWorld Simulator and CIP-014-01 Tracy Rolstad System Planning Apologies for the Massive Amount of Background Slides…but they matter!

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
CFO Presentation Background This is a presentation to a banker who the company wants a loan from and is a targeted financial statement analysis. This is.
Introduction to Excel Formulas, Functions and References.
Protecting the Public, Astronauts and Pilots, the NASA Workforce, and High-Value Equipment and Property Mission Success Starts With Safety “September 11th.
CHAPTER 6 BUDGETING How Will You Use Your Money?
One the things we found most troubling about the City’s Draft Environmental Impact Report (DEIR) was that there was no information included about your.
UNIT PHYSICAL SECURITY PLAN
DEFENSIVE POSITIONS.
August 14, 2003 Blackout Final Report
Welcome to RAI, the future of collaborative Project Risk Management Overview of Project Risk and Issue Management RAI for the Project Manager RAI for the.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
1. 11/26/2012: NERC Board of Trustees adopted CIP v5 CIP thru CIP CIP and CIP Version 5 Filing FERC requested filing by 3/31/2013.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
"Secure Wall" High Security Fence System * Patent Pending * Created and Fabricated by: South Lyon Fence Co., Inc.
Coal Mine Connections Lessons from Experience. Why are we talking about Coal mine connections Because we had a situation where the customer wanted a service.
Introduction to Network Defense
ECE 2300 Circuit Analysis Dr. Dave Shattuck Associate Professor, ECE Dept. Lecture Set #25 Complex Power W326-D3.
thinking hats Six of Prepared by Eman A. Al Abdullah ©
AMARI AIR BASE AT/FP EVAL 9 JUNE (No photos taken due to tight security)
Secured Hosting Services Frank Adams / Tom Carter.
Section 4 I can explain the presidential advisors I can describe the executive agencies.
Homeland Security Conference Symposium on Homeland Security & Defense Christopher Newport University May 18,
SafeZone® patent pending 1 Detect. Inform. Prevent. NERC Physical Security Standards and Guidelines SafeZone® Detect. Inform. Prevent.
1 Bryan E. Houtchens Team Too THERMAL TERMITE ERADICATION ®
1 Power Quality Mary Santori, P.E. Senior Engineer September 12, 2013.
Rocky Mountain Power Sub Transmission Five Year Study Findings and Kick Off Attachment K Meeting September 10, 2015.
Reducing the Threat of Fuel Release from the Red Hill Fuel Storage Facility A Unique Engineering Challenge.
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
Fatigue Management Rule Russell Smith Nuclear Energy Institute (NEI)
Grounding, bonding, and ground fault currents
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
PowerWorld & NERC Physical Security Station List.
Status Report for Critical Infrastructure Protection Advisory Group
程建群 博士 (Dr. Jason Cheng) 年 03 月 Software Engineering Part 05.
Role for Electric Sector in Critical Infrastructure Protection R&D Presented to NERC CIPC Washington D.C. June 9, 2005 Bill Muston Public Release.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Shaping Game Play in Handball
Generation assets important to the reliable operation of the Bulk Electric System What does this mean?
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Project Update August 2008 Richard Rife Deputy Project Manager.
Cassidy Culligan Digital Citizenship Project ED 505.
Lead in Agenda (Tracy Rolstad) CIP-014 Background (Metcalf) Compliance Attack Methods (General) Peak RC.
North American Energy Infrastructure Policy Philip Gonda Steven Mays Robert Floyd Josh Kapp.
Detachment 645, The Ohio State University Integrity - Service - Excellence Military Capabilities.
Lesson 2: Reading a program. Remember: from yesterday We learned about… Precise language is needed to program Actors and Classes Methods – step by step.
MASTER GUNNER COURSE TERMINAL LEARNING OBJECTIVE : TO IDENTIFY AND DEFINE ALL STEPS REQUIRED FOR ENGAGEMENT EXECUTION AS PART OF THE ENGAGEMENT PROCESS.
Physical Security Concerns for LAN Management By: Derek McQuillen.
SY0-401 CompTIA Security+ Certification Pass CompTIA Security+ Certification Exam By The Help Of Exams4Sure Get Complete File From
Emergency Actions Emergency Actions are composed of two actions. 1) Tornado & Severe Weather 2) Emergency Evacuation.
The Current State of Cyber Security and How to Defend Your Data.
PERFORM THE TASKS AND FULFILL THE RESPONSIBILITIES OF RANGE PERSONNEL PO/EO: REF.: B-GL /TS-000, TRAINING SAFETY.
Imagine, Create, and Secure a Stronger Peace… National Defense University Col Kris Bauman, USAF, PhD Senior Military Fellow, Institute for National Strategic.
Fort Worth Electrician ‎ THE TECHNICIANS AT CADDELL ELECTRIC PROVIDE THE BEST AND MOST COMPREHENSIVE COMMERCIAL ELECTRICAL SERVICES IN THE DFW METROPLEX.
The Physical Security in UTM NAWAF OMAR MAN Prof Hafiza Abas.
Modeling DER in Transmission Planning CAISO Experience
The Executive Branch.
Merchandising Activities
Natural Gas Infrastructure Assessment
ECEN 460 Power System Operation and Control
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Agenda Overview Tactical Employment ATK 25mm Barrett HEDP System
Role for Electric Sector in Critical Infrastructure Protection R&D
CMPLDWG Composite Model with Distributed Generation Approval
CMPLDWG Composite Model with Distributed Generation Approval
Eisenhower’s Policies
PowerWorld Simulator and CIP
Lead in Agenda (Tracy Rolstad)
Presentation transcript:

PowerWorld Simulator and CIP Tracy Rolstad System Planning Apologies for the Massive Amount of Background Slides…but they matter!

Tracy Rolstad (Education) United States Navy (1980 to 2003) –Nuclear Power School Various schools too numerous to list University of Idaho –BSEE, 1992 Engineering Advisory Board Member (Present) Naval War College –Diploma, Naval Command and Staff, 1999 Joint Professional Military Education, phase I

Resume… –Avista Corporation Senior Pwr Sys Consultant, System Planning WECC TSS Chair –Utility System Efficiencies Senior Power Systems Analyst –The Bonneville Power Administration Senior Engineer, System Operations –The Joint Warfare Analysis Center EP Senior Analyst, PACOM Chief of Targets Special Technical Operations Action Officer –Nuclear Navy (Attack Submarines) Engineering Watch Supervisor Reactor Operator

Greatest Engineering Achievements of the 20 th Century

Electricity is THE Critical Infrastructure

Why Even Talk About This?

Recent WSJ Article…the Back Story When seconds matter cops are only minutes away…

At least five 10,000 tanker a gallon. Where did the oil go? $15.4 million

Security Briefing Industry Update – How Did We Get Here? Attack Ideas Available on the Internet 1/15/2013 Attacks on Critical Infrastructure Metcalf 4/16/2013 Arkansas 9/16/2013 “If someone decides to blast a transformer at its base as prepper Bryan Smith did, and the oil drains out, then the transformer either burns out catastrophically, or if the utility is lucky, a software routine notices the problem and shuts the substation (or at least the affected portion) down” ( system/) system/

Security Briefing Industry Update – How Did We Get Here? Press Reports Fan The Flames… and Politics in Action…

What the?

What Policy Makers Hear! This study lacks technical merit! OMG! So NOT true!!! Get the FACTS Out There YOU are the EXPERTS!

Physical Threat (>risk than Cyber Threat) Direct Fire –Small Arms (Rifles…Pistols need not apply) 5.56 mm or 7.62 mm –0.47” (12 mm) armor plate at 100 meters (5.56 mm) –0.59” (15 mm) armor plate at 300 meters (7.62 mm) Typical small arms will easily penetrate a transformer case Some protection can be provided against direct fire on a case by case basis –Cost/risk/consequences Indirect fire or crew served (no real defense) –Serious Firepower (Crew Served Weapons) Mortars, rockets, explosives,.50 cal or greater –This is what the US Military is for (defense)

Direct Fire Small Arms Penetration (Rifle) 3 mm = 0.118” 0.709” 0.472” RHA: Rolled Homogenous Armor APHC: Armor Piercing Hard Core

Rifle Rounds M2 ball AP (.30-06) at 100 yards penetrates –7 inches of concrete –14 inches of rubble –19 inches of sand –48 inches of timbers Cover vs. Concealment –Tanks, bunkers, and battleships offer cover –Bullets shoot THROUGH sandbags and trees! Being shot is BAD! Stopping bullets is expensive and hard work Stopping frag is the typical military objective –Much more frag flying around than bullets

Standards for Ballistic Protection UL Standard 752 National Institute of Justice State Department SD-STD ASTM-F-1233 DIN EN 1063 BS 5051 DIN

Defending Against Indirect Fire (DPRK) 39°40'24.46"N125°42'57.77"E

Point Targeting (Amateur) CARVER –Criticality –Accessibility –Recuperability –Vulnerability –Effect –Recognizability RAM-T –Risk Assessment Methodology-Transmission

Objective Based Targeting (Professional) Where the big kids play (Modeling & Simulation) –WHAT is the desired objective or endstate What the targeteer wants to accomplish –Think like a bad guy with perfect Intel and buckets of cash The flip side (defense) –What does your company/agency FEAR »Lost Revenue, Lost Capital, Lost Prestige, Lost Pride »Death »Political Costs The objective of targeting is to affect, change, modify, or impede enemy activity through destruction, damage, deception, or neutralization

Thoughts on Metcalf Attack Amateurs! It could have been much worse… –They used > 120 of 7.62 x 39 mm rounds Soviet round, must have been on a budget! –Must have sounded like a war…left their brass behind! No subsonic ammunition. No suppressed firearms. –Shot radiators NOT bushings –No use of combined effects munitions Strictly small arms apparently No incendiaries used Metcalf was NOT important…at that time Truly diabolical methods were NOT used

CIP Fastest moving Standard to date Our Regulator WILL regulate. Recognize that the EPA of 2005 gives this stuff the weight of LAW! –Standards are the MINIMUM level of performance What ever happened to Good Utility Practice? Read all about it here: – CIP-014-1_Physical_Sec_draft_2014_0409.pdfhttp:// CIP-014-1_Physical_Sec_draft_2014_0409.pdf

Physical Security Standard (CIP ) Identify Stations on the “List” –All 500 kV stations –200 kV to 499 kV with 3 or more lines and where the summed aggregate of the lines exceed 3000 (see table for weights): Voltage Value of a LineWeight Value per Line less than 200 kV (not applicable) (not applicable) 200 kV to 299 kV kV to 499 kV kV and above0 Voltage Value of a LineWeight Value per Line less than 200 kV (not applicable)(not applicable) 200 kV to 299 kV kV to 499 kV kV and above0

By the Way…the CIP Method is Awful Case Info –Bus/Sub MW Throughflow security-assessmenthttp:// security-assessment –Neighbors Ctg Analysis –Line, Bus, and Station Outages And whatever combinations Transient Stability –See above, with and without faults

You can TRY to get off the list… Honestly…good luck with that! Need to show that loss of the station does NOT:

Making it happen with PWS (Go Jamie!) Build Substations –You SHOULD have these already We shall auto-insert them as an exercise 500 kV stations are IN Apply the “List” filter –Ignore generator lead-in lines This would require manual work Build the substation contingency files Work up a physical security plan

Auto-Inserting Substations

9351 Substations in WECC?

Build the List…Thanks Jamie! // Step 1 Custom Expression DATA (CUSTOMEXPRESSION, [ObjectType,ObjectType:1,CustomExpressionString,VariableName,VarBlankIsZero]) { "Branch:1" "Weight" "iif(x1 > 499.9, 0, iif(x1>299.9, 1300, iif(x1>199.9, 700, 0)))" "LineMaxNomVolt" "YES" } // Step 2 Calculated Field DATA (BGCALCULATEDFIELD, [WhoAmI,ObjectType,VariableName,BGCalcFieldOperation,BGCalcFieldUseAbsolute, BGCalcFieldBlankEntries,ObjectType:1,FilterName,FilterLogic,FilterPre]) { "Sum of Inter-Substation Weights" "Branch" "CustomExpression" "Sum" "NO " "As Zeros" "Branch" "YES" "AND" "NO " SubNum <> "SubNum:1" 0 Field }

Aside on IIF IIF function –In-line IF or Immediate IF –IIf(expr, truepart, falsepart) Expression Required (Boolean). –The expression you want to evaluate. True Part Required (Object). –Returned if Expression evaluates to True. False Part Required (Object). Returned if Expression evaluates to False –IIF must evaluate the entire statement when preparing the argument From PWS Help  i.e. CALL JAMIE! IIFIf conditionIif(1+1==2,4,5) = 4

First Pass Results

Note the Generator Lead-Ins

3 rd Party might remove you from the list?

Build Substation Contingencies, Part A

Build Substation Contingencies, Part B

We need a sample bus ctg for Excel

Off to work in Excel from PowerWorld

Making Substation CTGs happen in Excel =CONCATENATE("SUB: ", C3) Pasting Down a Column: Highlight the cell with the formula. CTRL-C. Click once in the topmost cell of the column. CTRL-SHIFT-DOWN ARROW CTRL-V =CONCATENATE("BUS ",A3, " OPEN ")

Paste In the Substation Contingencies

Good Luck!

Should What ImprovementsShould We Make? This question leads to several others… What can we do to improve substation security? How far do we go? What are we “required” to do? Who are we really protecting our subs from? Why do they want to get in? Do they want to get in? Are we a target? What subs are most important? And what impact do they have? Let’s start with what we can do now… to at least impede any physical entrance into our substations.

Short-Term Physical Substation Security EEI and SAIC Recommendations Improve/upgrade existing fencing – opaque Install barriers along fence lines to impede access Remove outside the fence obstacles (brush, trailers, equipment, etc.) Install signs warning of 24-hour surveillance Adjust lighting levels for both deterrence and detection capability. Place barriers around critical equipment Install better controls limiting key access

Good Fencing Construction Practice Deary Substation Opaque is Good? Or Not?

Short-Term Physical Substation Security Beacon Storage Yard

Short-Term Physical Substation Security Glenrose Substation

Short-Term Physical Substation Security Francis & Cedar Substation Pre-Cast Concrete Double-T Wall

Short-Term Physical Substation Security Lyons & Standard Substation

Options Moving Forward – Site Specific Alternative Perimeter Barriers Wrought Iron Fencing (Simulated) Pre-cast Concrete Wall Concrete Masonry (CMU) Block Wall Combination of the Above

Options Moving Forward – Site Specific

Pre-Cast Concrete

Options Moving Forward – Site Specific CMU Block Wall Meadow Substation – Longmont, CO 12-ft high wall – by Allan Block

Options Moving Forward – Site Specific Combination

Assessment Be a Hard Target –Evaluate risk/consequences/costs Look tough…Make “them” go to the next guy Try NOT to be important!!!! –To WECC that is…see simulations –Security is a process –Visibility is security at the beginning Comms to stations=better system=better security Physical Protection in initial design is better than retro fitting –Build for compliance with the NERC standards? –RESILENCY

Recognize Your Limits (Green & Yellow) Willing to kill…I suggest you don’t worry about the red

Questions?