Pipeline Safety: Safeguarding and Securing Pipelines From Unauthorized Access, 89183-89184 [2016-29500]

Download as PDF Federal Register / Vol. 81, No. 237 / Friday, December 9, 2016 / Notices until the period of availability expires, the funds are fully expended, the funds are rescinded by Congress, or the funds are otherwise reallocated. To meet program oversight responsibilities, FTA must continue to collect information until the period of availability expires, the funds are fully expended, the funds are rescinded by Congress, or the funds are otherwise reallocated. Respondents: States, Metropolitan Planning Organizations, and Local Governmental Authorities. Estimated Annual Burden on Respondents: 15 hours for each of the respondents. Estimated Total Annual Burden: 303 hours. Frequency: Annual. William Hyre, Deputy Associate Administrator for Administration. I. Background Incident Details [FR Doc. 2016–29505 Filed 12–8–16; 8:45 am] BILLING CODE P DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA–2016–0137) Pipeline Safety: Safeguarding and Securing Pipelines From Unauthorized Access Pipeline and Hazardous Materials Safety Administration (PHMSA); DOT. ACTION: Notice; issuance of Advisory Bulletin. AGENCY: PHMSA is issuing this Advisory Bulletin in coordination with the Department of Homeland Security’s (DHS), Transportation Security Administration (TSA), to remind all pipeline owners and operators of the importance of safeguarding and securing their pipeline facilities and monitoring their Supervisory Control and Data Acquisition (SCADA) systems for abnormal operations and/or indications of unauthorized access or interference with safe pipeline operations. Additionally, this Advisory Bulletin is to remind the public of the dangers associated with tampering with pipeline system facilities. This Advisory Bulletin follows recent incidents in the United States that highlight threats to oil and gas infrastructure. On October 11, 2016, several unauthorized persons accessed and interfered with pipeline operations in four states, creating the potential for serious infrastructure damage and significant economic and environmental mstockstill on DSK3G9T082PROD with NOTICES SUMMARY: VerDate Sep<11>2014 18:13 Dec 08, 2016 Jkt 241001 harm, as well as endangering public safety. While the incidents did not result in any damage or injuries, the potential impacts emphasize the need for increased awareness and vigilance. FOR FURTHER INFORMATION CONTACT: Operators of pipelines subject to regulation by DOT, PHMSA, should contact Nathan A. Schoenkin by phone at 202–366–4774 or by email at Nathan.Schoenkin@dot.gov. Information about PHMSA may be found at http://phmsa.dot.gov. Pipeline operators with questions on TSA’s Pipeline Security Guidelines should contact Steven Froehlich by phone at 571–227–1240 or by email at Steven.Froehlich@tsa.dhs.gov. SUPPLEMENTARY INFORMATION: 89183 default/files/ tsapipelinesecurityguidelines-2011.pdf. II. Advisory Bulletin (ADB–2016–06) To: Owners and Operators of Hazardous Liquid, Carbon Dioxide and Gas Pipelines Subject: Safeguarding and Securing Pipelines from Unauthorized Access Advisory: PHMSA is issuing this Advisory Bulletin in coordination with TSA to remind all pipeline owners and operators of the importance of safeguarding and securing their pipeline facilities and monitoring their SCADA systems for abnormal operations and/or indications of unauthorized access or interference with safe pipeline operations. Additionally, this Advisory Bulletin is to remind the public of the dangers associated with tampering with pipeline system facilities. Pipeline Safety and Security If You See Something, Say SomethingTM Tampering with pipeline facilities can have deleterious effects on the safety of the Nation’s pipeline system. Tampering or acts of sabotage can also lead to the loss of life, injury, and significant harm to the economy and environment. At 49 CFR 190.291, any person that willingly and knowingly injures or destroys, or attempts to injure or destroy a pipeline facility is subject to a fine in Title 18 of the United States Code and imprisonment for a term not to exceed 20 years for each offense. Individuals are reminded that ‘‘If you See Something, Say Something’’TM applies to the safety and security of our national pipeline infrastructure. Individuals that see something suspicious should reach out to their local law enforcement. Informed, alert communities play a vital role in keeping our Nation’s energy infrastructure safe. Emphasizing that ‘‘Homeland Security Starts with Hometown Security,’’ DHS encourages businesses to ‘‘Connect, Plan for, Train, and Report’’. Tools and resources to help businesses plan, prepare, and protect themselves from suspicious activities or attacks are located online at https://www.dhs.gov/hometownsecurity. PHMSA and TSA have a mutual interest in ensuring coordinated, consistent, and effective activities that improve interagency cooperation on transportation security and safety matters. PHMSA focuses on the safety of the Nation’s pipelines and administers the pipeline safety regulatory program (49 CFR part 190–199). TSA focuses on the security of the Nation’s pipelines and has authored Pipeline Security Guidelines for operators available online at https://www.tsa.gov/sites/ Relationships With Local Law Enforcement PHMSA reminds pipeline operators that a strong relationship with local law enforcement is extremely beneficial for safe pipeline operations. Two-way communications between operators and law enforcement can help to stop threats before they occur. Relationships should be cultivated well in advance of an incident to facilitate mutually dependable communication during an incident. On Tuesday October 11, 2016, individuals contacted four pipeline operators informing them they would shut down the pipelines used to transport crude oil from Canada to the United States. The operators (Enbridge, Kinder Morgan, Spectra Energy, and TransCanada) took steps to prevent damage to the pipelines and contacted local and federal law enforcement. The individuals cut the chains and padlocks at valve sites near Leonard, Minnesota; Burlington, Washington; Eagle Butte, Montana; and Wahalla, North Dakota. The individuals then closed valves on Enbridge’s Lines 4 and 67, Spectra Energy’s Express Pipeline, and TransCanada’s Keystone Pipeline. The Kinder Morgan Trans Mountain’s Puget Sound Pipeline was not operating at the time. Several individuals were arrested by local law enforcement. Had the pipeline operators not shut down their lines in response to the threats, a pipeline rupture could have occurred. A pipeline rupture due to tampering with valves can have significant consequences such as death, injury, and economic and environmental harm. PO 00000 Frm 00142 Fmt 4703 Sfmt 4703 E:\FR\FM\09DEN1.SGM 09DEN1 89184 Federal Register / Vol. 81, No. 237 / Friday, December 9, 2016 / Notices Increased Security Patrols Pipeline operators should consider increasing the frequency of security patrols along their right of ways. Operators may want to consider the use of new technologies to aid in pipeline security patrols, such as unmanned aerial systems if authorized in the areas of operation. Frequent patrols may help inform pipeline companies of individuals who regularly congregate near a pipeline, or of potentially unsafe conditions at a valve or pump station. Information regarding suspicious individuals should be promptly forwarded to federal, state, and local law enforcement. mstockstill on DSK3G9T082PROD with NOTICES Protection of Facilities PHMSA’s Office of Pipeline Safety requires pipeline operators to provide protection for valves on hazardous liquid pipelines at 49 CFR 195.420(c). Additionally, at 49 CFR 195.436, hazardous liquid pipeline operators are required to provide protection for each pumping station, breakout tank area, and other exposed facility from vandalism and unauthorized entry. Furthermore, at 49 CFR 192.179(b)(1), natural and other gas pipeline operators must ensure that the valve and operating device to open or close the valve must be protected from tampering and damage. PHMSA recommends that pipeline operators review their valve and facility protection measures and consider taking additional steps to secure them. Operators should evaluate what type of locks and security fences are being used at valve stations and if they are capable of preventing unauthorized personnel from gaining access to pipeline valve facilities. Pipeline operators may choose to make mechanical operation of valves more difficult without proper equipment. The use of deterrent text and signage at pipeline facilities may be beneficial to decrease acts of sabotage against a pipeline facility. The text should include the potential consequences if a valve is closed improperly and a rupture was to occur. Additionally the deterrent text should include reference to the PHMSA regulation found at 49 CFR 190.291 discussing the criminal penalties for tampering with pipeline facilities. Remote facilities should consider equipping the facilities with motion sensing cameras and/or motion detectors to alert control centers of tampering. SCADA System Monitoring Due to the criticality of SCADA systems in the safe operations of a VerDate Sep<11>2014 18:13 Dec 08, 2016 Jkt 241001 pipeline, operators should have strong protocols in place to ensure the systems will not be tampered with. SCADA systems can be tampered with or disabled by a physical or cyber vector. PHMSA is aware of prior intrusion attempts on pipeline infrastructure. An operator should harden physical and software borders around SCADA systems to limit the risk to the safe operation of pipelines. The following methods can be used to harden the software and physical borders around the SCADA system: (1) Segregating the control system network from the corporate network; (2) Limiting remote connection ports to the control system, and if necessary requiring token-based authentication to gain access; (3) Adding physical protection around remote sites with SCADA network access; (4) Enhancing user access control on SCADA system networks and devices and limiting access to critical system to individuals with a safety/ business need; and [5] Employing application whitelisting and strict policies on peripheral devices (to include removable media, printers, scanners, etc.) connected to the SCADA network. Furthermore, DHS’s Industrial Control System Cyber Emergency Response Team (ICS–CERT) developed a guidance document titled: ‘‘Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-inDepth Strategies.’’ The document provides guidance for developing mitigation strategies for specific cyber threats and direction on how to create a Defense-in-Depth security program for control system environments, and is available online at https://ics-cert.uscert.gov/sites/default/files/ recommended_practices/NCCIC_ICSCERT_Defense_in_Depth_2016_ S508C.pdf. Incident and Accident Reporting Operators are reminded that incidents and accidents must be promptly reported to the appropriate federal, state, and local agency. Requirements for immediate notification of certain incident and accident reporting requirements are found at 49 CFR 191.5 and 195.52. Furthermore, since tampering with a pipeline can lead to a release, PHMSA recommends that operators should contact the National Response Center by telephone to 800– 424–8802 (in Washington, DC, 202– 267–2675) following any physical security event that may interfere with the safe operation of a pipeline. Please note only ‘‘unclassified’’ incident details should be reported by phone to the National Response Center. PO 00000 Frm 00143 Fmt 4703 Sfmt 4703 TSA recommends in its Pipeline Security Guidelines that pipeline operators notify the Transportation Security Operations Center via phone at 866–615–5150 or email at TSOC.ST@ dhs.gov as soon as possible to report security concerns or suspicious activity. Furthermore it is recommended that pipeline operators notify DHS’s ICS– CERT if the operator has an Industrial Control System concern with a cyber security nexus. Operators can report to ICS–CERT by emailing ics-cert@ hq.dhs.gov or by calling 877–776–7585. PHMSA has coordinated with several components within DHS and the Department of Energy on this Advisory Bulletin. Issued in Washington, DC, on December 5, 2016, under authority delegated in 49 CFR 1.97. Alan K. Mayberry, Acting Associate Administrator for Pipeline Safety. [FR Doc. 2016–29500 Filed 12–8–16; 8:45 am] BILLING CODE 4910–60–P DEPARTMENT OF VETERANS AFFAIRS MyVA Federal Advisory Committee; Notice of Meeting The Department of Veterans Affairs (VA) gives notice under the Federal Advisory Committee Act, 5 U.S.C. App. 2., that the MyVA Advisory Committee (MVAC) will meet January 10–11, 2017, at the Department of Veterans Affairs, Georgetown University Lohrfink Auditorium—Ground Floor, Georgetown McDonough School of Business, Rafik B. Hariri Building, 37th and O Street NW., Washington, DC 20057. The meeting is open to the public. The purpose of the Committee is to advise the Secretary, through the Executive Director, MyVA Task Force Office, regarding the MyVA initiative and VA’s ability to rebuild trust with Veterans and other stakeholders, improve service delivery with a focus on Veteran outcomes, and set the course for longer-term excellence and reform of VA. On January 10, from 8:00 a.m. to 6:00 p.m., the Committee will convene an open session to discuss the progress on and the integration of the work in the five key MyVA work streams—Veteran Experience (explaining the efforts conducted to improve the Veteran’s experience), Employees Experience, Support Services Excellence (such as information technology, human resources, and finance), Performance Improvement (projects undertaken to E:\FR\FM\09DEN1.SGM 09DEN1

Agencies

[Federal Register Volume 81, Number 237 (Friday, December 9, 2016)]
[Notices]
[Pages 89183-89184]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2016-29500]


-----------------------------------------------------------------------

DEPARTMENT OF TRANSPORTATION

Pipeline and Hazardous Materials Safety Administration

[Docket No. PHMSA-2016-0137)


Pipeline Safety: Safeguarding and Securing Pipelines From 
Unauthorized Access

AGENCY: Pipeline and Hazardous Materials Safety Administration (PHMSA); 
DOT.

ACTION: Notice; issuance of Advisory Bulletin.

-----------------------------------------------------------------------

SUMMARY: PHMSA is issuing this Advisory Bulletin in coordination with 
the Department of Homeland Security's (DHS), Transportation Security 
Administration (TSA), to remind all pipeline owners and operators of 
the importance of safeguarding and securing their pipeline facilities 
and monitoring their Supervisory Control and Data Acquisition (SCADA) 
systems for abnormal operations and/or indications of unauthorized 
access or interference with safe pipeline operations. Additionally, 
this Advisory Bulletin is to remind the public of the dangers 
associated with tampering with pipeline system facilities.
    This Advisory Bulletin follows recent incidents in the United 
States that highlight threats to oil and gas infrastructure. On October 
11, 2016, several unauthorized persons accessed and interfered with 
pipeline operations in four states, creating the potential for serious 
infrastructure damage and significant economic and environmental harm, 
as well as endangering public safety. While the incidents did not 
result in any damage or injuries, the potential impacts emphasize the 
need for increased awareness and vigilance.

FOR FURTHER INFORMATION CONTACT: Operators of pipelines subject to 
regulation by DOT, PHMSA, should contact Nathan A. Schoenkin by phone 
at 202-366-4774 or by email at Nathan.Schoenkin@dot.gov. Information 
about PHMSA may be found at http://phmsa.dot.gov. Pipeline operators 
with questions on TSA's Pipeline Security Guidelines should contact 
Steven Froehlich by phone at 571-227-1240 or by email at 
Steven.Froehlich@tsa.dhs.gov.

SUPPLEMENTARY INFORMATION: 

I. Background

Incident Details

    On Tuesday October 11, 2016, individuals contacted four pipeline 
operators informing them they would shut down the pipelines used to 
transport crude oil from Canada to the United States. The operators 
(Enbridge, Kinder Morgan, Spectra Energy, and TransCanada) took steps 
to prevent damage to the pipelines and contacted local and federal law 
enforcement. The individuals cut the chains and padlocks at valve sites 
near Leonard, Minnesota; Burlington, Washington; Eagle Butte, Montana; 
and Wahalla, North Dakota. The individuals then closed valves on 
Enbridge's Lines 4 and 67, Spectra Energy's Express Pipeline, and 
TransCanada's Keystone Pipeline. The Kinder Morgan Trans Mountain's 
Puget Sound Pipeline was not operating at the time. Several individuals 
were arrested by local law enforcement.
    Had the pipeline operators not shut down their lines in response to 
the threats, a pipeline rupture could have occurred. A pipeline rupture 
due to tampering with valves can have significant consequences such as 
death, injury, and economic and environmental harm.

Pipeline Safety and Security

    PHMSA and TSA have a mutual interest in ensuring coordinated, 
consistent, and effective activities that improve interagency 
cooperation on transportation security and safety matters. PHMSA 
focuses on the safety of the Nation's pipelines and administers the 
pipeline safety regulatory program (49 CFR part 190-199). TSA focuses 
on the security of the Nation's pipelines and has authored Pipeline 
Security Guidelines for operators available online at https://www.tsa.gov/sites/default/files/tsapipelinesecurityguidelines-2011.pdf.

II. Advisory Bulletin (ADB-2016-06)

    To: Owners and Operators of Hazardous Liquid, Carbon Dioxide and 
Gas Pipelines
    Subject: Safeguarding and Securing Pipelines from Unauthorized 
Access
    Advisory: PHMSA is issuing this Advisory Bulletin in coordination 
with TSA to remind all pipeline owners and operators of the importance 
of safeguarding and securing their pipeline facilities and monitoring 
their SCADA systems for abnormal operations and/or indications of 
unauthorized access or interference with safe pipeline operations. 
Additionally, this Advisory Bulletin is to remind the public of the 
dangers associated with tampering with pipeline system facilities.

If You See Something, Say SomethingTM

    Tampering with pipeline facilities can have deleterious effects on 
the safety of the Nation's pipeline system. Tampering or acts of 
sabotage can also lead to the loss of life, injury, and significant 
harm to the economy and environment. At 49 CFR 190.291, any person that 
willingly and knowingly injures or destroys, or attempts to injure or 
destroy a pipeline facility is subject to a fine in Title 18 of the 
United States Code and imprisonment for a term not to exceed 20 years 
for each offense. Individuals are reminded that ``If you See Something, 
Say Something''TM applies to the safety and security of our 
national pipeline infrastructure. Individuals that see something 
suspicious should reach out to their local law enforcement. Informed, 
alert communities play a vital role in keeping our Nation's energy 
infrastructure safe. Emphasizing that ``Homeland Security Starts with 
Hometown Security,'' DHS encourages businesses to ``Connect, Plan for, 
Train, and Report''. Tools and resources to help businesses plan, 
prepare, and protect themselves from suspicious activities or attacks 
are located online at https://www.dhs.gov/hometown-security.

Relationships With Local Law Enforcement

    PHMSA reminds pipeline operators that a strong relationship with 
local law enforcement is extremely beneficial for safe pipeline 
operations. Two-way communications between operators and law 
enforcement can help to stop threats before they occur. Relationships 
should be cultivated well in advance of an incident to facilitate 
mutually dependable communication during an incident.

[[Page 89184]]

Increased Security Patrols

    Pipeline operators should consider increasing the frequency of 
security patrols along their right of ways. Operators may want to 
consider the use of new technologies to aid in pipeline security 
patrols, such as unmanned aerial systems if authorized in the areas of 
operation. Frequent patrols may help inform pipeline companies of 
individuals who regularly congregate near a pipeline, or of potentially 
unsafe conditions at a valve or pump station. Information regarding 
suspicious individuals should be promptly forwarded to federal, state, 
and local law enforcement.

Protection of Facilities

    PHMSA's Office of Pipeline Safety requires pipeline operators to 
provide protection for valves on hazardous liquid pipelines at 49 CFR 
195.420(c). Additionally, at 49 CFR 195.436, hazardous liquid pipeline 
operators are required to provide protection for each pumping station, 
breakout tank area, and other exposed facility from vandalism and 
unauthorized entry. Furthermore, at 49 CFR 192.179(b)(1), natural and 
other gas pipeline operators must ensure that the valve and operating 
device to open or close the valve must be protected from tampering and 
damage. PHMSA recommends that pipeline operators review their valve and 
facility protection measures and consider taking additional steps to 
secure them.
    Operators should evaluate what type of locks and security fences 
are being used at valve stations and if they are capable of preventing 
unauthorized personnel from gaining access to pipeline valve 
facilities. Pipeline operators may choose to make mechanical operation 
of valves more difficult without proper equipment.
    The use of deterrent text and signage at pipeline facilities may be 
beneficial to decrease acts of sabotage against a pipeline facility. 
The text should include the potential consequences if a valve is closed 
improperly and a rupture was to occur. Additionally the deterrent text 
should include reference to the PHMSA regulation found at 49 CFR 
190.291 discussing the criminal penalties for tampering with pipeline 
facilities. Remote facilities should consider equipping the facilities 
with motion sensing cameras and/or motion detectors to alert control 
centers of tampering.

SCADA System Monitoring

    Due to the criticality of SCADA systems in the safe operations of a 
pipeline, operators should have strong protocols in place to ensure the 
systems will not be tampered with. SCADA systems can be tampered with 
or disabled by a physical or cyber vector. PHMSA is aware of prior 
intrusion attempts on pipeline infrastructure. An operator should 
harden physical and software borders around SCADA systems to limit the 
risk to the safe operation of pipelines. The following methods can be 
used to harden the software and physical borders around the SCADA 
system: (1) Segregating the control system network from the corporate 
network; (2) Limiting remote connection ports to the control system, 
and if necessary requiring token-based authentication to gain access; 
(3) Adding physical protection around remote sites with SCADA network 
access; (4) Enhancing user access control on SCADA system networks and 
devices and limiting access to critical system to individuals with a 
safety/business need; and [5] Employing application whitelisting and 
strict policies on peripheral devices (to include removable media, 
printers, scanners, etc.) connected to the SCADA network.
    Furthermore, DHS's Industrial Control System Cyber Emergency 
Response Team (ICS-CERT) developed a guidance document titled: 
``Recommended Practice: Improving Industrial Control System 
Cybersecurity with Defense-in-Depth Strategies.'' The document provides 
guidance for developing mitigation strategies for specific cyber 
threats and direction on how to create a Defense-in-Depth security 
program for control system environments, and is available online at 
https://ics-cert.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf.

Incident and Accident Reporting

    Operators are reminded that incidents and accidents must be 
promptly reported to the appropriate federal, state, and local agency. 
Requirements for immediate notification of certain incident and 
accident reporting requirements are found at 49 CFR 191.5 and 195.52. 
Furthermore, since tampering with a pipeline can lead to a release, 
PHMSA recommends that operators should contact the National Response 
Center by telephone to 800-424-8802 (in Washington, DC, 202-267-2675) 
following any physical security event that may interfere with the safe 
operation of a pipeline. Please note only ``unclassified'' incident 
details should be reported by phone to the National Response Center.
    TSA recommends in its Pipeline Security Guidelines that pipeline 
operators notify the Transportation Security Operations Center via 
phone at 866-615-5150 or email at TSOC.ST@dhs.gov as soon as possible 
to report security concerns or suspicious activity. Furthermore it is 
recommended that pipeline operators notify DHS's ICS-CERT if the 
operator has an Industrial Control System concern with a cyber security 
nexus. Operators can report to ICS-CERT by emailing ics-cert@hq.dhs.gov 
or by calling 877-776-7585.
    PHMSA has coordinated with several components within DHS and the 
Department of Energy on this Advisory Bulletin.

    Issued in Washington, DC, on December 5, 2016, under authority 
delegated in 49 CFR 1.97.
Alan K. Mayberry,
Acting Associate Administrator for Pipeline Safety.
[FR Doc. 2016-29500 Filed 12-8-16; 8:45 am]
 BILLING CODE 4910-60-P