Only a software vulnerability in a control system could be used to physically destroy power grid equipment.
A CNN segment demonstrated how a turbine was reduced to a smoking, shuddering, metal spewing mess as the result of malicious code execution on the computer controlling the system.
The Idaho National Laboratory prepared the demonstration for the U.S. Department of Homeland Security (DHS). The simulated attack re-visited an old issue, now rectified--in a Supervisory Control and Data Acquisition (SCADA) system.
The vulnerability points out how easily a well-executed digital attack could hit our critical infrastructure.
Since they run on proprietary systems, SCADA systems are less vulnerable than Internet accessible networks but they are not immune to the kinds of cyberattacks that can plague corporate information systems.
The present danger lies in an attacker who gains administrative access.
As utilities transition to connect with the Internet what has not happened is that the systems are secured and upgraded over time. The cost is prohibitive.
The move to Ethernet, TCP/IP and Web technologies will provide hackers and virus writers a number of backdoors and pathways to core control systems at utility companies, according to Eric Byres, CEO of Byres Security Inc., a consultancy that focuses on SCADA security.
The DHS and the North American Electric Reliability Council (NERC) have worked to address cybersecurity issues. NERC adopted eight new cybersecurity standards around asset identification, security management controls, personnel and training, perimeter security, systems security, incident reporting and response planning.
Although there are some helpful developments, I know locally that PECO Energy has enough difficulty supplying power when faced only with storms and trees. I'd hate to think how they could handle a malicious and determined attack.