Okay mi gente, vamos a hablar claro about something that keeps a lot of us in OT security up at night: the American electric grid is under real pressure, from many directions at the same time.
A recent House Energy Subcommittee hearing laid it all out. Cyber attacks, physical sabotage, aging tech, new AI driven demand, small utilities that are under resourced, and a regulatory patchwork that sometimes leaves big gaps. It was not a feel good session. But there was also some hope, some good ideas, and a rare thing in Washington: real bipartisan agreement that this is a national security problem, not a partisan toy.
Let’s walk through what is going on, what Congress is thinking about, and what it means for anyone who cares about keeping the lights on and the OT systems safe.
The grid is now a battlefield, not just a utility
First thing: the threat picture is not abstract. It is here, ahora mismo.
Lawmakers and witnesses described a convergence of cyber and physical threats that all land on the same target: the power system that runs everything else.
On the cyber side, nation state actors are front and center. China was called out as the most aggressive and persistent threat, with state backed groups like Volt Typhoon already placing malware inside U.S. power networks. Not to play today, but to sit quietly and wait for a crisis, when they can throw the switch and disrupt critical services.
Russia, Iran, North Korea, they are all still in the game. Add to that ransomware gangs, criminal crews, hacktivists, and now AI tools making intrusion and social engineering easier to scale. One utility leader told Congress that the threat is advanced and constant. From the OT side, this matches what many of us see: more probing of remote access, more attempts to pivot from IT into control systems, more attention on operational data.
At the same time, physical attacks are trending up in a very ugly way. Simple guns, bolt cutters, a car used as a battering ram. In 2022, federal data counted 163 direct physical attacks or intrusions on the grid, a jump of about 77 percent in one year. We all saw the substation shootings in North Carolina and Washington State. In North Carolina, shots at a couple of substations left around 45 thousand people without power, and even affected nearby military facilities.
These are low tech attacks with high impact, because big transformers and critical parts are slow to replace. So even a “local” incident can mean long outages, serious economic loss, and real danger for vulnerable people.
Put it together and you get a harsh truth: you do not need a Hollywood style cyber operation to hurt the grid. You can hit it in the bits or in the bolts. Either way, people suffer.
A fragmented grid means uneven defenses
Now, here is where it gets tricky, amigos.
The U.S. grid is not one system with one boss. It is thousands of utilities. Big investor owned companies, city utilities, rural cooperatives, public power districts, all with different budgets, talent pools, and regulators.
Large utilities may have full-time cyber teams, SOCs, red team exercises, and strong OT programs. A small co-op serving farms and small towns might have one person trying to be CIO, OT engineer, and security lead at the same time. Same threat, very different capacity.
Federal mandatory standards, like the NERC Critical Infrastructure Protection (CIP) rules, focus on the bulk power system, high voltage assets. Many distribution substations and lower voltage facilities are outside that mandatory framework. That is exactly where some of the recent physical attacks landed.
Attackers are not dumb. If the front door has a big lock, they look for a side door that is weaker. Unprotected or lightly protected distribution assets, poorly segmented OT networks in small utilities, legacy gear with “internet connectivity awkwardly bolted on,” all of that becomes attractive.
To make it more complex, the electric system depends heavily on other sectors. Gas pipelines deliver fuel to many power plants. But pipelines are overseen by a different federal agency with historically weaker cyber rules. So even if the electric side is strong, a weak gas asset can still bring down power.
And while all this is happening, the grid is being modernized at high speed. More renewables, more inverter-based resources, more battery storage, more smart meters and connected devices, AI driven forecasting and control. If security is not built in, every new digital interface is another door for attackers.
So the picture is this: an aging infrastructure, with new connectivity layered on top, shared across many owners and regulators, facing aggressive cyber and physical threats. Not fácil.
What Congress is looking at: laws, programs, and gaps
The hearing did not just describe the problems. Lawmakers walked through what has been done and what might come next. Let me break it down in plain terms.
1. Emergency powers and federal support
In past years, Congress already expanded the Department of Energy’s authority to issue emergency orders to protect the grid during cyber or physical crises. They also built programs for technical assistance and information sharing with utilities.
Now, there is talk about updating and reauthorizing these powers so they match the current threat level. In practice, this could mean faster federal action when something ugly is detected, and continued funding for programs that help utilities, especially the smaller ones.
2. Information sharing: ETAC and E-ISAC
Everyone at the hearing agreed that threat intel sharing is crucial. The Electricity Information Sharing and Analysis Center (E-ISAC) already plays a central role in pushing alerts and analysis to utilities.
But industry witnesses asked for more. They want Congress to formally authorize and fund DOE’s Energy Threat Analysis Center, ETAC. This is a newer public private hub that blends federal intelligence with data from utilities to spot complex cyber threats to energy systems.
ETAC has moved from pilot to steady operations, but it does not yet have clear legal backing. Bipartisan bills in the Senate would change that and lock ETAC inside DOE with stable support. Lawmakers in the hearing sounded open to this. For us in OT security, that would mean richer, more timely intel if it is done right and pushed down even to the smallest co-ops.
3. Help for small and rural utilities
One of the brightest spots in the hearing was attention to the Rural and Municipal Utility Cybersecurity program, RMUC. This is a 5 year, 250 million dollar grant program created to lift up the cyber posture of rural co-ops and municipal utilities.
Witnesses called it a “generational opportunity” for communities that usually sit at the end of the funding line. Some grants have already gone out, covering projects at more than 400 co-ops, but a lot of money has not yet been disbursed. On top of that, the whole program expires in fiscal year 2026 unless Congress extends it.
Utility leaders basically told Congress: please reauthorize this, get the money moving, and keep rural America in the national security conversation, not outside of it. Members from both parties seemed to like that message. The idea that “the grid is only as strong as its weakest link” is finally sinking in.
4. Who regulates what, and physical security
Today, FERC sets and enforces standards for the bulk system through NERC. States have more say on distribution. Industry witnesses defended the existing standards model, which mixes government authority with technical input from utilities. They are worried that a pure top down federal approach could be rigid and miss operational realities.
At the same time, everyone knows there are holes. Many distribution substations, often the target of gunfire and vandalism, are not directly covered by federal standards. After the North Carolina attacks, FERC asked NERC to review its physical security rules, and some states began to ramp up penalties for attacks on grid assets. South Carolina, for example, is considering doubling prison terms for serious damage to utility equipment.
In Washington, there is talk of treating some attacks on the grid more like domestic terrorism, with stronger sentences. There is also interest in policies that push or fund more cameras, better fencing, and stronger barriers at critical sites. As one former DHS official pointed out, punishment helps, but funding the physical upgrades helps more.
5. Standards and R&D for the “new grid”
Lawmakers also asked about emerging risks from AI, growth in data center load, EV charging, and the spread of smart, inverter based devices.
Experts are pushing to update DOE and NIST cybersecurity frameworks so they reflect a constantly connected, digitally native grid. Ideas on the table include:
- more federal research into secure control architectures
- stronger security by design expectations for vendors of critical grid components
- certification programs for key devices, like a “Cyber Sense” seal that tells utilities which products meet certain protections
- better integration of top technical talent into regulatory bodies, so rules keep up with the tech curve
These ideas are not yet laws, but the hearing clearly set the stage for future bills.
Final palabra
The House panel did not magically fix grid security in one hearing. Claro que no. But it did something important. It put cyber and physical threats to the grid in the center of the national security conversation, with both parties largely on the same page.
So stay sharp, mi gente. Use the programs that exist, push for the ones that are coming, keep your basics tight, and build security into every modernization step. The grid is the backbone. We cannot afford to let it be the weak link.

Leave a comment