  {"id":24079,"date":"2017-11-15T17:15:24","date_gmt":"2017-11-15T22:15:24","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/ghosts-in-the-power-machines\/"},"modified":"2017-11-15T17:15:24","modified_gmt":"2017-11-15T22:15:24","slug":"ghosts-in-the-power-machine","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ghosts-in-the-power-machine\/","title":{"rendered":"Ghosts in the power machine"},"content":{"rendered":"<h3><strong>Growing digital, growing vulnerable <\/strong><\/h3>\n<p>Turning the lights on means much more than flipping a switch these days. With the growing digitization of power infrastructure, supplying electricity entails an entire ecosystem of sensors, controls, and data management systems that are increasingly inseparable from the traditional supply chain, spanning from power generation, to transmission and distribution, to the end-customer.<\/p>\n<p>In part, a continuing decline in returns have prompted this move to digital. Established players in the electricity sector have seen their earnings suffer from increasing deregulation and new entrants <strong>(see Figure 1)<\/strong>. Coal-powered generators are facing cost pressure from cheaper gas and renewable sources, while those renewables are in turn coping with wind and sun sources whose output is harder to predict than traditional \u201cbase load\u201d generation. No surprise then that companies are attracted to the digital approach, when \u201cgoing digital\u201d has the potential to improve utility earnings by 7% in generation alone, and 20-30% across the value chain. <strong>[1]<\/strong> Digitization has enabled power companies to amass an incredible wealth of data, improve productivity and efficiency, and engineer more efficient and responsive technologies.<\/p>\n<p>However, vulnerabilities have emerged as fast as digitization has spread across the electricity supply chain. The capabilities to collect data and act on it remotely yield new opportunities for malevolent actors to disrupt operations. In 2015, a malware called Black Energy interrupted Ukraine\u2019s power grid by infiltrating a utility company\u2019s systems and cutting off efforts to repair them. <strong>[2]<\/strong> Future attacks could put more at risk by compromising more critical communication links or targeting physical facilities directly, rather than their surrounding systems. <strong>[3]<\/strong> The advent of digital supply chains therefore raises growing concerns of security and stability that operators must contend with more frequently.<\/p>\n<p><strong>Figure 1: Allowed returns (ROE) for regulated electric<br \/>\nand gas utilities in the US, 1998-2013<\/strong><\/p>\n<p><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/ROE-US-utilities-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-24219 alignnone\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/ROE-US-utilities-1.png\" alt=\"\" width=\"484\" height=\"296\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/ROE-US-utilities-1.png 484w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/ROE-US-utilities-1-300x183.png 300w\" sizes=\"auto, (max-width: 484px) 100vw, 484px\" \/><br \/>\n<\/a><em>Source: SNL Energy, EY<\/em>\u00a0<strong>[4]<\/strong><\/p>\n<h3><strong>Ghosts in the generation machines<\/strong><\/h3>\n<p>Enter equipment manufacturers, who emerge as part of the frontline in defending from digital intrusions. One notable example, General Electric is building on technologies already embedded in its power generation turbines to add defensive capabilities to their customers\u2019 supply chains. GE used its existing Digital Twin platform to produce a defensive one called Digital Ghost. <strong>[5]<\/strong> A digital twin is a virtual model of a physical equipment that collects data and predicts outcomes, improving the machine\u2019s life and performance. <strong>[6]<\/strong> Similarly, GE\u2019s Digital Ghost simulates the physical machine and uses accumulated performance data to detect anomalies and correct them without human intervention.<\/p>\n<p>The Digital Ghost approach follows three phases \u2013 problem detection, location, and neutralization. <strong>[7]<\/strong> For example, a turbine producing anomalous power fluctuations triggers the resident \u201cghost\u201d system, which compares the output to benchmarks for that specific turbine. The system then isolates the problem and takes the corrective measures (e.g., shut-down, flag for human follow-up) to resolve the threat. The speed at which the turbines operate advantages a digital approach; gas turbines adjust every 40 milliseconds, exceeding the pace of human operator intervention.<\/p>\n<p>GE will roll out the Digital Ghost feature in phases. <strong>[8] <\/strong>The first in 2018 will enable equipment to identify and locate threats. The second phase in 2019 will finalize the capability to resolve issues. The overall effort focuses on gas and steam turbines, older and more established technologies with a large body of existing performance data and benchmarks.<\/p>\n<h3><strong>Powering expansion, exploring adjacencies<\/strong><\/h3>\n<p>Looking at next moves in the medium term, GE could apply this Digital Ghost to other sub-sectors within electricity (e.g., wind turbines) as well as more extensively along the supply chain, collaborating with manufacturers of grid and other equipment. The same capabilities that currently allow systems to talk across generation, transmission, distribution, and the end-customer\u2019s business or home could also collaborate to identify threats and coordinate responses across the supply chain. For example, an attack on grid management software could trigger that asset\u2019s \u201cghost\u201d to curtail production at the plant level, while signaling downstream storage sources to provide alternative supplies during the interruption.<\/p>\n<p>Moreover, such supply chain security improvements are not limited to the power sector. GE should explore this Digital Ghost approach to other data-rich, automated, and capital-intensive activities. Aviation, oil and gas, and medical systems exemplify some other, similar spaces. <strong>[9]<\/strong> Critical systems in urban infrastructure or industrial processes could benefit from built-in controls that already use the stream of data to triage interventions, acting when human decision-making could lag.<\/p>\n<h3><strong>What\u2019s next?<\/strong><\/h3>\n<p>Much like digital transformations overall, securing such systems is an industry changer. However, GE will face design and implementation choices before it can scale. How much should it invest in interoperability of the Digital Ghost approach with other stakeholders\u2019 asset? How can this be scaled, regardless of the underlying \u201chardware\u201d? So far, the success of Digital Ghost has grown from a customized, system-specific approach. The greater value, however, lies in optimizing the entire supply chain from generation to distribution, but herding a group of ghosts is no easy task.<\/p>\n<p>(798 words)<\/p>\n<p>[1] Adrian Booth, Niko Mohr, and Peter Peters, \u201cThe digital utility: New opportunities and challenges,\u201d McKinsey, May 2016, <a href=\"https:\/\/www.mckinsey.com\/industries\/electric-power-and-natural-gas\/our-insights\/the-digital-utility-new-opportunities-and-challenges\">https:\/\/www.mckinsey.com\/industries\/electric-power-and-natural-gas\/our-insights\/the-digital-utility-new-opportunities-and-challenges<\/a>, accessed November 2017.<\/p>\n<p>[2] Supervisory control and data acquisition. Chris Vallance, \u201cUkraine cyber-attacks \u2018could happen to UK\u2019,\u201d BBC, February 29, 2016. <a href=\"http:\/\/www.bbc.com\/news\/technology-35686493\">http:\/\/www.bbc.com\/news\/technology-35686493<\/a>, accessed November 2017.<\/p>\n<p>[3] Robert M. Lee, Michael J. Assante, Tim Conway, \u201cAnalysis of the Cyber Attack on the Ukrainian Power Grid,\u201d E-ISAC Defense Use Case, 2016, <a href=\"https:\/\/ics.sans.org\/media\/E-ISAC_SANS_Ukraine_DUC_5.pdf\">https:\/\/ics.sans.org\/media\/E-ISAC_SANS_Ukraine_DUC_5.pdf<\/a>, accessed November 2017.<\/p>\n<p>[4] Matt Rennie, \u201cCapital outlook: power and utilities,\u201d 2014. <a href=\"http:\/\/www.ey.com\/Publication\/vwLUAssets\/ey-capital-outlook-power-and-utilities-article\/$FILE\/ey-capital-outlook-power-and-utilities.pdf\">http:\/\/www.ey.com\/Publication\/vwLUAssets\/ey-capital-outlook-power-and-utilities-article\/$FILE\/ey-capital-outlook-power-and-utilities.pdf<\/a>, accessed November 2017.<\/p>\n<p>[5] Diarmaid Williams, \u201cGE attempts to make power plants immune to cyber threat,\u201d Power Engineering International, August 29, 2017. <a href=\"http:\/\/www.powerengineeringint.com\/articles\/2017\/08\/ge-attempts-to-make-power-plants-immune-to-cyber-threat.html\">http:\/\/www.powerengineeringint.com\/articles\/2017\/08\/ge-attempts-to-make-power-plants-immune-to-cyber-threat.html<\/a>, accessed November 2017.<\/p>\n<p>[6] <em>GE Digital Twin,<\/em> From GE website, <a href=\"https:\/\/www.ge.com\/digital\/sites\/default\/files\/Digital-Twin-for-the-digital-power-plant-.pdf\">https:\/\/www.ge.com\/digital\/sites\/default\/files\/Digital-Twin-for-the-digital-power-plant-.pdf<\/a>, accessed November 2017.<\/p>\n<p>[7] Williams, Power Engineering International.<\/p>\n<p>[8] Ibid.<\/p>\n<p>[9] Larry Dignan, \u201cGE aims to replicate Digital Twin success with security-focused Digital Ghost,\u201d ZDNet, March 24, 2017, <a href=\"http:\/\/www.zdnet.com\/article\/ge-aims-to-replicate-digital-twin-success-with-security-focused-digital-ghost\/\">http:\/\/www.zdnet.com\/article\/ge-aims-to-replicate-digital-twin-success-with-security-focused-digital-ghost\/<\/a>, accessed November 2017.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digitizing the electricity supply chain opens opportunities&#8230; but also vulnerabilities &#8211; how are manufacturers responding?<\/p>\n","protected":false},"author":9783,"featured_media":24301,"comment_status":"open","ping_status":"closed","template":"","categories":[2244,26,788,95],"class_list":["post-24079","hck-submission","type-hck-submission","status-publish","has-post-thumbnail","hentry","category-asset-management","category-clean-energy","category-digital","category-energy","hck-taxonomy-organization-general-electric","hck-taxonomy-industry-energy","hck-taxonomy-country-united-states"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/rc-tom-challenge-2017\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ghosts in the power machine - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ghosts-in-the-power-machine\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ghosts in the power machine - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"Digitizing the electricity supply chain opens opportunities... but also vulnerabilities - how are manufacturers responding?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ghosts-in-the-power-machine\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/american-public-power-association-430854-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"5068\" \/>\n\t<meta property=\"og:image:height\" content=\"1924\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ghosts-in-the-power-machine\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ghosts-in-the-power-machine\\\/\",\"name\":\"Ghosts in the power machine - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ghosts-in-the-power-machine\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ghosts-in-the-power-machine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2017\\\/11\\\/american-public-power-association-430854-2.jpg\",\"datePublished\":\"2017-11-15T22:15:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ghosts-in-the-power-machine\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ghosts-in-the-power-machine\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ghosts-in-the-power-machine\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2017\\\/11\\\/american-public-power-association-430854-2.jpg\",\"contentUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2017\\\/11\\\/american-public-power-association-430854-2.jpg\",\"width\":5068,\"height\":1924},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ghosts-in-the-power-machine\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ghosts in the power machine\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ghosts in the power machine - Technology and Operations Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ghosts-in-the-power-machine\/","og_locale":"en_US","og_type":"article","og_title":"Ghosts in the power machine - Technology and Operations Management","og_description":"Digitizing the electricity supply chain opens opportunities... but also vulnerabilities - how are manufacturers responding?","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ghosts-in-the-power-machine\/","og_site_name":"Technology and Operations Management","og_image":[{"width":5068,"height":1924,"url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/american-public-power-association-430854-2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ghosts-in-the-power-machine\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ghosts-in-the-power-machine\/","name":"Ghosts in the power machine - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ghosts-in-the-power-machine\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ghosts-in-the-power-machine\/#primaryimage"},"thumbnailUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/american-public-power-association-430854-2.jpg","datePublished":"2017-11-15T22:15:24+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ghosts-in-the-power-machine\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ghosts-in-the-power-machine\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ghosts-in-the-power-machine\/#primaryimage","url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/american-public-power-association-430854-2.jpg","contentUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/american-public-power-association-430854-2.jpg","width":5068,"height":1924},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ghosts-in-the-power-machine\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"Ghosts in the power machine"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/24079","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/9783"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=24079"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/24079\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media\/24301"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=24079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=24079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}