Abstract
Cyber security tends to only address the technical aspects of the information systems. The lack of considerations for environmental long-range implications of failed cyber security planning and measures, especially in the protection of critical infrastructure and industrial control systems, have created ecological risks that are to a high degree unaddressed. This study compares dam safety arrangements in the United States and Sweden. Dam safety in the United States is highly regulated in many states, but inconsistent over the nation. In Sweden dam safety is managed by self-regulation. The study investigates the weaknesses and strengths in these regulatory and institutional arrangements from a cyber security perspective. If ecological and environmental concerns were a part of the risk evaluation and risk mitigation processes for cyber security, the hazard could be limited. Successful environmentally-linked cyber defense mitigates the risk for significant damage to domestic freshwater, aquatic and adjacent terrestrial ecosystems, and protects ecosystem function.
Disclaimer:
Rosemary Burk: The findings and conclusions in this article are those of the author(s) and do not necessarily represent the views of the U.S. Fish and Wildlife Service.
Jan Kallberg: The views expressed herein are those of the author and do not reflect the official policy or position of the Army Cyber Institute, the United States Military Academy, the Department of the Army, or the Department of Defense.
References
Central Intelligence Agency (CIA) (2015) The World Fact Book. Available at: https://www.cia.gov/library/publications/the-world-factbook/geos/sw.html (accessed January 16).Suche in Google Scholar
Federal Emergency Management Agency (FEMA) (1998) Federal Guidelines for Dam Safety: Hazard Potential Classification System for Dams. Available at: http://www.fema.gov/media-library-data/20130726-1516-20490-7951/fema-333.pdf.Suche in Google Scholar
Federal Emergency Management Agency (FEMA) (2007) Emergency Action Planning for State Regulated High-Hazard Potential Dams: Findings, Recommendation, and Strategies. FEMA 608. Retrieved from http://www.fema.gov/media-library-data/20130726-1624-20490-6709/fema608.pdf.Suche in Google Scholar
Federal Emergency Management Agency (FEMA) (2013) Federal Guidelines for Dam Safety. FEMA 64. Available at: http://www.fema.gov/media-library-data/5b20db599c212f77fd5e85d256f471a3/EAP002BFederal002BGuidelines_FEMA002BP-64.pdf.Suche in Google Scholar
Gellman, B. (2002) Cyberattacks by Al Qaeda Feared. The Washington Post. June 27. Available at: http://www.washingtonpost.com/wp-dyn/content/article/2006/06/12/AR2006061200711.html.Suche in Google Scholar
Harnden, T. (2002) Al-Qa’eda plans Cyber attacks on dams. The Telegraph. June 28. Available at: http://www.telegraph.co.uk/news/worldnews/asia/afghanistan/1398683/Al-Qaeda-plans-cyber-attacks-on-dams.html.Suche in Google Scholar
International Conference on Critical Information Infrastructures Security (2011) September 2011 National Inventory of Dams. Available at: http://cordis.europa.eu/event/rcn/33342_en.html.Suche in Google Scholar
Kallberg, J. and R. Burk (2014) “Failed Cyberdefense: The Environmental Consequences of Hostile Acts,” Military Review, 92:22–25.Suche in Google Scholar
Kallberg, J., B. Thuraisingham and E. Lakomaa (2013) “Societal Cyberwar Theory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information Security.” In: Proceedings of the 2013 Intelligence and Security Informatics Conference (EISIC), European, Piscataway: IEEE Press, pp. 212–215.10.1109/EISIC.2013.47Suche in Google Scholar
National Inventory of Dams (NID) (2015) National Inventory of Dams website maintained by U.S. Army Corps of Engineers. Available at: http://geo.usace.army.mil/pgis/f003Fp003D397:5:0::NO (accessed January 10).Suche in Google Scholar
Random.org (2014) Available at: http://www.random.org (accessed December 4).Suche in Google Scholar
State of California (2015) California Office of Emergency Services. Dam Safety Action. Available at: http://www.damsafetyaction.org/CA/ (accessed January 16).Suche in Google Scholar
Stouffer, K., J. Falco and K. Scarfone (2011) “Guide to Industrial Control Systems (ICS) security,” NIST Special Publication, 800–882.10.6028/NIST.SP.800-82r2Suche in Google Scholar
Svenska Kraftnät (2009) Peer-review of Swedish High Consequence Dams: Test of a model for “special examination” of dam safety. A compilation of facts and experiences from 5 reviews performed in 2006–2008. Available at: http://www.svk.se/Global/09_About_Us/Pdf/Peer-Review-Swedish-High-Consequence-Dams.pdf.Suche in Google Scholar
Svenska Kraftnät (2010) Review of the Swedish System for Dam Safety: A Report to the Government. Available at: http://www.svk.se/Global/09_About_Us/Pdf/Review-Dam-Safety-12-aug-2011.pdf.Suche in Google Scholar
Svenska Kraftnät (2014) About us. Available at: http://www.svk.se/Start/English/About-us/Our-Activities/ (accessed December 4).Suche in Google Scholar
United States Census Bureau (2014) Population Estimates: State Totals. Available at: http://www.census.gov/popest/data/state/totals/2013/ (accessed December 4).Suche in Google Scholar
Vattenportalen (2007) Vattenkraft och stora dammar [Hydro power and major dams]. Available at: http://www.vattenportalen.se/fov_problem_vattenkraft.htm.Suche in Google Scholar
Webster, T.M. (2005) “The Dam Busters Raid: Success or Sideshow?” Air Power History Summer 34:13–25.Suche in Google Scholar
Zetter, K. (2013) Hacker breached U.S. Army Database Containing Sensitive Information on Dams. Wired.com. Available at: http://www.wired.com/2013/05/hacker-breached-dam-database/.Suche in Google Scholar
©2016 by De Gruyter
Artikel in diesem Heft
- Frontmatter
- Retraction
- Publisher Retraction of: Transforming the UK Home Office into a Department for Homeland Security: Reflecting on an Interview with a Litigant Defending Against Online Retaliatory Feedback in the US
- Research Articles
- Deliberative Risk Ranking to Inform Homeland Security Strategic Planning
- Population as a Proxy for Infrastructure in the Determination of Event Response and Recovery Resource Allocations
- Opportunities and Constraints to Rural HAZMAT Risk Reduction
- Cyber Defense as a part of Hazard Mitigation: Comparing High Hazard Potential Dam Safety Programs in the United States and Sweden
- Assessing Risk Following a Wireless Emergency Alert: Are 90 Characters Enough?
- Changes in Self-Reported Household Preparedness Levels among a Rural Population after Exposure to Emergency Preparedness Campaign Materials
- The Self-Organization of Digital Volunteers across Social Media: The Case of the 2013 European Floods in Germany
- Fire Department Turnout Times: A Contextual Analysis
- ‘Set Adrift’: Fatalism as Organizational Culture at Canadian Seaports
Artikel in diesem Heft
- Frontmatter
- Retraction
- Publisher Retraction of: Transforming the UK Home Office into a Department for Homeland Security: Reflecting on an Interview with a Litigant Defending Against Online Retaliatory Feedback in the US
- Research Articles
- Deliberative Risk Ranking to Inform Homeland Security Strategic Planning
- Population as a Proxy for Infrastructure in the Determination of Event Response and Recovery Resource Allocations
- Opportunities and Constraints to Rural HAZMAT Risk Reduction
- Cyber Defense as a part of Hazard Mitigation: Comparing High Hazard Potential Dam Safety Programs in the United States and Sweden
- Assessing Risk Following a Wireless Emergency Alert: Are 90 Characters Enough?
- Changes in Self-Reported Household Preparedness Levels among a Rural Population after Exposure to Emergency Preparedness Campaign Materials
- The Self-Organization of Digital Volunteers across Social Media: The Case of the 2013 European Floods in Germany
- Fire Department Turnout Times: A Contextual Analysis
- ‘Set Adrift’: Fatalism as Organizational Culture at Canadian Seaports