Assessing Security Threats to Canada's Energy Infrastructure
Total Page:16
File Type:pdf, Size:1020Kb
Assessing Security Threats to Canada’s Energy Infrastructure: The Enbridge Northern Gateway Pipeline By Jenny Benoit B.A., University of Guelph, 2011 Research Project Submitted In Partial Fulfillment of the Requirements for the Degree of Master of Arts in the School of Criminology Faculty of Arts and Social Science Jenny Benoit 2014 SIMON FRASER UNIVERSITY Summer 2014 Approval Name: Jenny Benoit Degree: Master of Arts (Criminology) Title of Thesis: Assessing Security Threats to Canada’s Energy Infrastructure: The Enbridge Northern Gateway Pipeline Examining Committee: Chair: William Glackman Associate Professor J. Bryan Kinney Senior Supervisor Associate Professor Garth Davies Supervisor Associate Professor Andrea Curman External Examiner Research Analyst, Police Services Division, Road Safety Unit BC Government, Ministry of Justice Date Defended/Approved: July 29, 2014 ii Partial Copyright Licence iii Abstract Safe and secure critical infrastructure is essential for the functioning of Canada's society. A robust system of infrastructure allows Canada to be a leader on the world stage but also presents potential security risks. Using open source data, this paper identifies why energy infrastructure is the ideal target for malicious attack and includes a focus on the proposed Enbridge Northern Gateway pipeline. Using the Harmonized Threat and Risk Assessment Methodology, to perform a risk based analysis; the likelihood of an attack on the Northern Gateway was assessed. A risk rating of low to medium was found, with a variety of vulnerabilities and possible threat actors identified. Keywords: Energy infrastructure, risk assessment, Northern Gateway pipeline iv Dedication To R.A. – Thank you. v Acknowledgements I would like to thank Dr. Bryan Kinney and Dr. Garth Davies for the support, assistance and suggestions you provided throughout this process. “I get by with a little help from my friends” (The Beatles). vi Table of Contents Approval .......................................................................................................................... ii Partial Copyright Licence ............................................................................................... iii Abstract .......................................................................................................................... iv Dedication ....................................................................................................................... v Acknowledgements ........................................................................................................ vi Table of Contents .......................................................................................................... vii List of Acronyms ............................................................................................................. ix 1. Introduction .......................................................................................................... 1 1.1. Protecting Critical Infrastructure.............................................................................. 3 1.2. Threats to Critical Infrastructure.............................................................................. 6 2. Energy Infrastructure ........................................................................................... 7 2.1. Government Oversight ........................................................................................... 9 2.2. Protecting Energy Infrastructure ........................................................................... 10 2.3. Energy Infrastructure as a Target ......................................................................... 11 2.4. Identifying Potential Targets ................................................................................. 12 2.4.1. Nuclear Facilities ....................................................................................... 13 2.4.2. Hydroelectric Facilities .............................................................................. 13 2.4.3. Petroleum Infrastructure ............................................................................ 15 2.4.4. Wind and Solar Energy Infrastructure ....................................................... 15 3. Theory ................................................................................................................. 16 3.1. Managing Risk and Playing Odds ......................................................................... 16 4. Security Threat and Risk Assessment .............................................................. 18 4.1. Methodologies ...................................................................................................... 18 4.1.1. Harmonized Threat and Risk Assessment Methodology (HTRA) .............. 18 4.1.2. American Petroleum Institute and National Refiners Association Security Vulnerability Assessment (SVA) .................................................. 20 4.1.3. Security Risk Assessment for Non-Government Organizations (SRA) ........................................................................................................ 21 4.2. Case Study: Threat and Risk Assessment – Enbridge Northern Gateway ............ 21 4.2.1. Scope ....................................................................................................... 21 4.2.2. Aim ........................................................................................................... 21 4.2.3. Vulnerabilities............................................................................................ 21 Physical .................................................................................................... 21 Exporting by using Tankers ....................................................................... 22 Pipeline supervisory control and data acquisition systems (SCADA)......... 23 Personnel ................................................................................................. 23 4.2.4. Threats...................................................................................................... 24 Terrorism .................................................................................................. 24 Sunni Islamic Extremism ..................................................................... 24 Domestic Extremism ................................................................................. 25 First Nations .............................................................................................. 26 vii Maritime Piracy ......................................................................................... 27 Insider Threat ............................................................................................ 27 4.2.5. Potential Consequences ........................................................................... 28 Loss of Assets .......................................................................................... 28 Economic Consequences ......................................................................... 28 Environmental Consequences .................................................................. 29 Political Consequences ............................................................................. 29 4.2.6. Likelihood of an Attack .............................................................................. 30 Sunni Islamic Extremism ........................................................................... 30 Environmental Extremists ......................................................................... 30 First Nations .............................................................................................. 31 Pirates ...................................................................................................... 32 4.2.7. Concluding Remarks ................................................................................. 32 5. Discussion .......................................................................................................... 34 5.1. Cyber Attack ......................................................................................................... 34 5.2. Connection with the United States ........................................................................ 35 5.3. Data on Energy Infrastructure ............................................................................... 36 5.4. Future of Government Oversight .......................................................................... 36 6. Limitations .......................................................................................................... 38 7. Conclusion .......................................................................................................... 39 References ................................................................................................................... 40 Appendices .................................................................................................................. 48 viii List of Acronyms CI Critical infrastructure CSE Communication Security Establishment CSIS Canadian Security Intelligence Service EI Energy infrastructure HTRA Harmonized Threat and Risk Assessment Methodology NGOs Non-government organizations RCMP Royal Canadian Military Police SRA Security Risk Assessment for Non-Government Organizations SVA American Petroleum Institute and National Refiners Association Security Vulnerability Assessment ix 1. Introduction Critical infrastructure (CI) is any service, system or material