Infrastructure Attacks Are Cause For Concern

By: Rachel Marsden

PARIS -- At a time when many of us have become fixated on U.S. intelligence agencies' "big data" programs, authorities are becoming aware of a much more insidious kind of threat -- one that could successfully exploit the growing blind spot created by our overreliance on technology.

Jon Wellinghoff, the former chairman of the Federal Energy Regulatory Commission, told the Wall Street Journal that an April 2013 attack by multiple gunmen on Pacific Gas and Electric's Metcalf power station in San Jose, Calif., that powers Silicon Valley represents "the most significant incident of domestic terrorism involving the grid that has ever occurred."

When I asked Wellinghoff why the attack took so long to come to light, with initial reports referring only to "gunfire" that knocked out transformers (and making no reference to a coordinated attack), he replied: "Utility was trying to keep it low-key to prevent copycats, perhaps. I don't know."

The FBI, meanwhile, has downplayed the incident, saying that it doesn't think that a terrorist organization was responsible for the attack. The attackers may not have membership cards for any of the groups on the State Department's official list of terrorist organizations, but somehow I doubt that civilians who lost power or communications would find that any more comforting. If attackers are operating outside of the laws of warfare and targeting civilian infrastructure, then they're terrorists, period.

Back in the old days, before authorities started compiling lists of terror groups and their rosters as if they were baseball teams, there used to be a name for a group of people who came together to wreak havoc on civilian targets: guerrillas.

Unlike the Middle Eastern terrorist organizations that we've come to know so well, true guerrillas aren't obligated to have a clearly defined political cause. Just being against the government can suffice, with the idea of creating a power vacuum first before worrying about filling it.

As the Occupy Wall Street protesters proved when they took to the streets in 2011, creating an ideological fog of war serves to establish a big tent to maximize the size of the disgruntled assembly. It also means that intelligence officials end up chasing a moving ideological target.

Complicating matters in an age when law enforcement and intelligence are going increasingly high-tech, plans made the old-fashioned, low-tech way -- on a placemat at a local pizza joint -- can escape detection. Just try hacking a table at Pizza Hut.

And while federal agencies and local law enforcement are well-versed in antiterrorism strategies, it's not unreasonable to wonder how prepared they'd be to handle guerrillas. Even Napoleon Bonaparte was unable to successfully deal with guerrilla tactics. The Spanish guerrillas who forced the French army's retreat five years after its conquest of Spain were arguably Napoleon's Waterloo long before his actual Waterloo. He called the conflict his "Spanish Ulcer."

The goal of the guerrilla is to frustrate the government and make it appear inept and out of control, and nothing accomplishes that better than leaving civilians without power, transportation and communications. Target selection in urban warfare is far from random.

U.S. Special Operations forces use the CARVER system to maximize target selection and optimize resource allocation for its missions. CARVER is an acronym that stands for criticality, accessibility, recuperability, vulnerability, effect and recognizability -- factors that are each assigned numerical values ranging from 1 to 10, with a maximum score of 60. Based on the Pentagon field manual detailing the CARVER system, the San Jose transformer attack rated a score of 53.

Missions that disrupt communications and Internet access tend to earn high scores, which could feasibly explain the selection of a target that powers America's technology hub, Silicon Valley. The attackers also severed underground fiber optic cables, prompting AT&T to offer a $250,000 reward for any information leading to an arrest and conviction. And it wouldn't be the first time that attackers have disrupted communications systems in the same area.

In April 2009, about five miles away from the Metcalf power station, as well as at a second location nearby, "vandals" were reported to have cut AT&T cables 10 feet underground to knock out Internet and phone service to about 52,000 customers in Silicon Valley.

The critical question is: Are these "confidence targets" and opening gambits to something bigger? It would be nice if federal authorities offered us more information rather than just opining that these attacks were not the work of terrorist organizations. Stop playing semantic games, and instead give us assurances that you're working on a strategy for preventing such attacks.

COPYRIGHT 2014 RACHEL MARSDEN