House Homeland Security Subcommittee on Transportation Security Hearing
Good morning Chairman Katko, Ranking Member Rice, and members of the subcommittee. My name is
Introduction
Nearly three million miles of pipeline transporting natural gas, oil, and other hazardous liquids crisscross
Physical Threats to Pipeline Security
Pipelines are vulnerable to intentional attacks using firearms, explosives, or other physical means. Oil and gas pipelines, globally, have been a favored target of terrorists, militant groups, and organized crime. For example, in 1996,
Pipelines in
Cyber Threats to Pipelines
Although physical attacks on pipelines have been a focus in
In
Potential Consequences of Pipeline Releases
Although there have been no intentional releases from
The Federal Role in Pipeline Security
Federal pipeline security efforts originated in the pipeline safety program. The Natural Gas Pipeline Safety Act of 1968 (P.L. 90-481) and the Hazardous Liquid Pipeline Act of 1979 (P.L. 96-129) are two of the principal early acts establishing the federal role in pipeline safety. Under both statutes, the Transportation Secretary is given primary authority to regulate key aspects of interstate pipeline safety: design, construction, operation and maintenance, and spill response planning. At the end of FY2015, the
Presidential Decision Directive 63, issued by the Clinton administration in 1998, assigned to the DOT lead responsibility for pipeline security as well as safety. n27 Under this authority, after the terrorist attacks of
In
Transferring Pipeline Security to
In
HSPD-7 also required
Although the
Over the last decade,
. Developing a statistical tool used for relative risk ranking and prioritization,
. Completing a security incident and recovery protocol plan mandated under P.L. 110-53,
. Initiating a program to address risks from pipeline transportation of hazardous materials other than oil and natural gas,
. Assessing
. Convening international pipeline security forums for
. Facilitating pipeline security drills and exercises including those under the Intermodal Security Training Exercise Program (I-STEP),
. Developing pipeline security awareness training materials,
. Convening periodic information-sharing conference calls between key pipeline security stakeholders, and
. Participating in Sector Coordinating Councils and Joint Sector Committees. n39
In addition to these activities,
Pipeline Cyber Security Initiatives
Pipeline cyber security is an element of several federal initiatives within
Outside
The Relationship Between DOT and
Since
n
The assessment recommended that the DOT and
While the federal government has been engaged in various efforts to protect the nation's oil and natural gas pipelines from deliberate attacks since
TSA Pipeline Security Resources
Some Members of
At its current staffing level,
Voluntary vs. Mandatory Pipeline Security Standards
Federal pipeline security activities to date have relied upon voluntary industry compliance with DOT's original security guidance, which later became
Although the IG report did not elaborate on this recommendation, covert testing of vulnerabilities would likely include testing of both physical security measures and cybersecurity measures. The latter would be in place to protect pipeline
In contrast to the IG's conclusions and the legislative proposals above, the pipeline industry has consistently expressed concern that security regulations could be "redundant" and "may not be necessary to increase pipeline security." n66 Echoing this sentiment, a DOT official testified in 2007 that enhancing security "does not necessarily mean that we must impose regulatory requirements." n67
Conference,
Although standards may elevate cybersecurity across the energy sector, they do so by requiring the implementation of minimum security measures that set a baseline for cybersecurity across an industry. These minimum security levels may not be sufficient to secure the sector against new and quickly evolving risks. Asset owners compliant with standards may still be vulnerable to cyber intrusion. n70
Thus, in addition to cybersecurity requirements, pipeline companies may also need appropriate management practices, performance metrics, access to intelligence, and other support measures to maximize the effectiveness of their cybersecurity programs.
Although the
The
In addition to examining the regulatory motivations of the NEB and
Uncertainty About Security Risks
A
The pipeline industry's security risk assessments rely upon information about security threats provided by the federal government and by pipeline operators themselves. The quantity, quality and timeliness of this threat information is a key determinant of what pipeline companies need to be protecting against, and what security measures to take. Incomplete or ambiguous threat information--especially from the federal government--may lead to inconsistency in physical and cyber security among pipeline owners, inefficient spending of limited security resources at facilities (e.g., that may not really be under threat), or deployment of security measures against the wrong threat.
Concerns about the quality and specificity of federal threat information have long been an issue across all critical infrastructure sectors. n76 Threat information continues to be an uncertainty in the case of pipeline network security. There may be agreement among government and industry stakeholders that oil and natural gas pipelines in
Conclusion
The nation's pipeline network is attractive to malicious actors and vulnerable to both physical and cyberattacks. Based on recent history, a strong federal pipeline security program is clearly necessary; there has been a series of unrelated terrorist plots and attempted attacks on
Both government and industry have taken numerous steps to improve pipeline security since 2001. On their face, these measures have been expansive and seem to address the full range of activities and priorities
The
n1 President's
n2
n3
n4
n5
n6
n7
n8
n9
n10
n11
n12
n13
n14 "Spear-phishing" involves sending official-looking e-mails to specific individuals to insert harmful software programs (malware) into protected computer systems; to gain unauthorized access to proprietary business information; or to access confidential data such as passwords, social security numbers, and private account numbers.
n15
n16
n17
n18
n19
n20
n21
n22
n23 See, for example:
n24
n25 49 U.S.C. 60107.
n26
n27 Presidential Decision Directive 63, Protecting the Nation's Critical Infrastructures,
n29 See:
n30
n31
n32
n33
n34 HSPD-7 supersedes PDD-63 (par. 37).
n35 Executive Order 13416, "Strengthening Surface Transportation Security,"
n36
n37
n38
n39
n40
n41
n42 For example,
n43
n44
n45
n46
n47
n48
n49 For example, see Hon.
n50
n51 Barrett, T.J., Administrator,
n52
n53
n54 Ibid. pp. 5-6.
n55
n56 Sen.
n57 Congressman
n58
n59
n60
n61
n62
n63 GAO, Pipeline Security and Safety: Improved Workforce Planning and Communication Needed, GAO-02-785,
n64
n65 The
n66
n67
n68
n69
n70
n71 National Energy Board of
n72
n73
n74
n75 81 Fed. Reg. 37,
n76 See, for example,
Read this original document at: http://docs.house.gov/meetings/HM/HM07/20160419/104773/HHRG-114-HM07-Bio-ParfomakP-20160419.pdf



House Energy and Commerce Subcommittee on Health Hearing
UnitedHealthcare to pull out of state’s ACA market
Advisor News
- How to listen to what your client isn’t saying
- Strong underwriting: what it means for insurers and advisors
- Retirement is increasingly defined by a secure income stream
- Addressing the ‘menopause tax:’ A guide for advisors with female clients
- Alternative investments in 401(k)s: What advisors must know
More Advisor NewsAnnuity News
- MassMutual turns 175, Marking Generations of Delivering on its Commitments
- ALIRT Insurance Research: U.S. Life Insurance Industry In Transition
- My Annuity Store Launches a Free AI Annuity Research Assistant Trained on 146 Carrier Brochures and Live Annuity Rates
- Ameritas settles with Navy vet in lawsuit over disputed annuity sale
- NAIC annuity guidance updates divide insurance and advisory groups
More Annuity NewsHealth/Employee Benefits News
- Idaho farmers can band together to buy cheaper health insurance through Farm Bureau deal
- HHS NOTICE OF BENEFIT AND PAYMENT PARAMETERS FOR 2027 FINAL RULE
- Reports Outline Clinical Trial Research Study Results from Imperial College London (Multimorbidity, health service use, and health insurance by socioeconomic groups in 31 countries: A multi-cohort study): Clinical Trial Research
- Findings from Brown University School of Public Health Broaden Understanding of Managed Care (Federal Enforcement Actions Against Medicare Advantage Plans): Managed Care
- Researchers at Brown University Warren Alpert Medical School Target Managed Care (The Aging World of Spinal Deformity Surgery: Epidemiological Trends Over A 12-Year Period): Managed Care
More Health/Employee Benefits NewsLife Insurance News
- AM Best Affirms Credit Ratings of Berkshire Hathaway Life Insurance Company of Nebraska and First Berkshire Hathaway Life Insurance Company
- Generational expectations: A challenge for the industry
- Greg Lindberg asks NC judge for no jail time in bribery, fraud cases
- National Life Group Names Brenda Betts to Its Board of Directors
- Ask Tim a Question? Business, Finances, Money, or Taxes
More Life Insurance News