Case Study: The "Copper Ghost"

How ISP Disorganization Blinds Critical Infrastructure

The Incident

During a routine migration to transition communication circuits from a legacy provider to a modern solution, the utility faced a catastrophic "premature disconnection." Despite multiple written and verbal verifications that service must remain active until the port was finalized, the ISP unilaterally severed the lines.

The Technical Fail: Why This Isn't Just "Bad Tech Support"

In the world of utilities, a "dead line" is not a minor inconvenience; it is a systemic security failure. This incident highlights three major technical and organizational vulnerabilities:

  • The Blind Spot: The disconnected circuits provided the primary telemetry path for multiple alarm and communication systems. When the ISP pulled the plug, the utility lost real-time visibility into grid/pipeline health.
  • Physical Security Downgrade: The legacy PSTN/DSL lines served as the backbone for fire alarms and intrusion detection systems at remote substations. For a period of hours, these critical sites were physically vulnerable with no remote alert capability.
  • The Escalation Abyss: Attempts to remediate the error revealed a total collapse of internal ISP hierarchy. Even at Tier 4 escalation, employees were unable to locate circuit ownership or "undo" the administrative error, proving that the ISP no longer has the technical literacy to manage the legacy copper it still owns.

The Scenario: A Threat Profile

  • > Vendor Negligence: The ISP treated a critical utility line like a residential Netflix account, ignoring the "Critical Infrastructure" tags on the circuit and failing to follow specialized handling protocols.
  • > Legacy Fragility: As copper is retired, ISPs are "zombifying" the infrastructure—keeping it alive with no documentation, no "as-built" maps, and zero expert staff who understand legacy signaling.
  • > Social Engineering: The chaotic state of the ISP's support desk creates a massive security opening. Attackers can call in, impersonate utility staff, and reroute traffic under the guise of "fixing" the mess, with little to no verification required to take action on the account.

The "Computer Guts" Reality Check

The "guts" of our nation’s infrastructure are still tied to aging copper wires. This incident proves that the greatest threat to these systems isn't always a sophisticated hacker; sometimes, it’s a disorganized provider with a "delete" key and no internal oversight.

When an ISP’s internal disorganization reaches a point where they can no longer fulfill basic verification requests, they cease to be a "service provider" and become a threat actor by proxy.

The Resolution: The Nuclear Option

Faced with a partner that had become a liability to public safety and regulatory compliance, the utility made the only logical security move after consulting with Computer Guts staff: Complete Abandonment.

By terminating the relationship with the legacy provider and migrating to a hardened, modern network, the utility effectively "patched" a human and administrative vulnerability that no software update could fix.


Case Study Supplement: Lessons Learned & Technical Hardening

To ensure a "premature kill" by a provider never results in a total blackout again, the following technical and procedural safeguards are recommended for critical infrastructure environments.

I. Technical Hardening: Breaking the "Single Point of Failure"

Relying on a single copper or fiber "pipe" for utility data is a high-risk strategy. The following hardware solutions provide the necessary redundancy to survive an ISP’s administrative errors:

  • Software-Defined WAN (SD-WAN) with Active Failover: Implement SD-WAN Orchestrators that can bond multiple disparate connections. If the primary provider line drops, the system sub-second switches to a secondary path without dropping the sessions.
  • Dual-SIM Industrial LTE/5G Gateways: Deploy ruggedized cellular gateways (e.g., Cradlepoint, Sierra Wireless, Others) as a secondary "Out-of-Band" (OOB) management path. This ensures that even if the physical wire is cut, the alarm and monitoring traffic remains live.
  • Satellite Backhaul (Starlink for Business/LEO): For remote substations where terrestrial redundancy is unavailable, Starlink’s Low Earth Orbit (LEO) service provides a low-latency secondary path that is physically independent of local ground infrastructure and ISP disorganization.

II. Procedural Hardening: Guarding the Transition

When porting numbers or migrating legacy services, use these "Defense in Depth" steps:

  • Establish a "Parallel Run" Period: Never initiate a port-out until the new service is fully installed and verified alongside the old. Assume the old provider will make a mistake; treat the legacy line as a "bonus" connection until the port is confirmed, rather than a primary requirement.
  • Hard-Coded "Critical Asset" Tags: Demand that the ISP place a "Do Not Disconnect/No-Limit Facility" tag on the circuit record. While this didn't work in this scenario, having the documentation of this request is vital for legal and regulatory filings with the FCC.
  • Pre-emptive Escalation Contact: Before the migration starts, secure the direct contact information for the ISP’s NOC (Network Operations Center) or specialized "Critical Infrastructure Desk," bypassing the standard Level 1-4 support queue that proved ineffective.

III. The "Computer Guts" Conclusion: Don’t Trust, Verify

The "guts" of our utility systems are only as strong as the weakest link in the supply chain. If your ISP’s internal processes are decaying alongside their copper wires, your security is an illusion.

The Final Lesson: When a provider demonstrates they can no longer manage the complexity of their own network, the only "fix" is to engineer them out of your architecture. Abandoning an unreliable partner isn't just a business decision—it’s a mandatory security patch for your organization’s physical and digital integrity.

This concludes the full Case Study and Risk Report for Computer Guts.
Published February 24th, 2026

Protecting Public Infrastructure Starts with a Strong Security Foundation.

Contact us today to learn how we can help safeguard your critical systems.