top of page

The Weakest Link: Why AI’s Growth Could Break the Power Grid First

The Weakest Link: Why AI’s Growth Could Break the Power Grid First

by Darrell Brown and Sakshi Hinduja

The relentless expansion of AI and high-performance computing is no longer just a technological trend; it’s a fundamental reshaping of the risk landscape as data centers become linked with critical energy infrastructure. This co-location creates a new level of vulnerability that demands a radical departure from traditional security thinking and necessitates proactive, multi-layered solutions. 

______________________________________________________________________________

Data centers used to live in the background. Today, they sit on the frontlines.

The operational logic of situating data centers near large power sources - nuclear plants, gas pipelines, and hydroelectric dams - is undeniable, promising reduced transmission losses and enhanced power reliability. 

However, the surge in AI-driven computing has inadvertently highlighted these co-located sites as potential targets. They have evolved from mere data repositories to pivotal nodes whose disruption could cascade across both physical and digital systems. This threat is tangible: (CISA)

  • In 2022, the U.S. Department of Energy reported 163 direct physical attacks on the electric grid, marking a 77% increase from the previous year (​Yahoo Finance).

  • A notable incident involved coordinated gunfire damaging two substations in Moore County, North Carolina, leaving over 40,000 residents without power (WSJ, 2023)

  • Cyberattacks have also escalated. In 2024, Check Point Research documented a 70% increase in cyberattacks on U.S. utilities compared to the previous year (​Reuters), demonstrating the growing digital threat landscape.

The physical proximity of data centers to energy infrastructure transforms localized disruptions into potential national crises. Sabotage of a substation adjacent to a major data hub is no longer just a localized power outage; it's a potential digital black swan event. The internal operations of data centers now require robust security measures, extending beyond traditional IT defenses to include zero-trust architectures that verify every user and device and continuous monitoring powered by AI to detect anomalous activity before it escalates to a crisis. 

Geographically, many new data centers are emerging in rural or smaller urban areas. However, these regions often lack the infrastructure and regulatory frameworks to effectively manage Tier IV facilities, creating vulnerabilities in the national digital backbone. The rapid growth of data centers has also led to conflicts with local communities over environmental and social impacts (​AP News).

We’re seeing a shift. Some hyperscalers now work directly with national security agencies to evaluate physical siting and digital threat modeling. Others are requiring dual-grid redundancy or hardened substations as part of land deals. Cyber-resilience is no longer IT’s responsibility—it’s a board-level priority.

While regulators and municipalities are beginning to adapt—modifying zoning reviews and simulating grid stress events—the pace of technological advancement and the sophistication of adversaries threaten to outstrip these efforts. The current regulatory patchwork, often designed for traditional infrastructure, may prove insufficient to address the compound vulnerabilities created by digital and physical interdependence.

The Federal Energy Regulatory Commission (FERC) has initiated discussions on the implications of co-locating data centers with power plants, focusing on grid reliability and cost distribution (Reuters). These steps are necessary but not sufficient. Protecting critical digital infrastructure demands more than regulatory catch-up—it requires a coordinated, forward-leaning strategy. Securing this new digital-physical frontier calls for layered action across sectors.

1. Elevate Siting and Energy Resilience Standards - Developers must factor national security and energy resilience into site selection—not just land costs and latency. Facilities near critical infrastructure must include hardened substations, dual feeds, microgrids, and negotiated priority restoration protocols. Dual power feeds from independent grids should be mandatory, ensuring uninterrupted operation even if one grid fails. 

2. Integrate Security at the Design Stage - While cybersecurity dominates headlines, real resilience starts with physical security. Leading data centers never abandoned fundamentals like wide setbacks, crash barriers, hardened perimeters, underground cores, and restricted access zones. These proven defenses—once seen as Cold War relics—are again vital as digital operations sit atop fragile physical systems. Protecting infrastructure today demands equal mastery of both the firewall and the front gate.

3. Forge Public-Private Threat Alliances - Hyperscalers, energy providers, municipalities, and national security agencies must create standing joint security frameworks: real-time intelligence sharing, coordinated response plans, and periodic physical-cyber stress testing.

4. Modernize Regulatory Frameworks - National standards must replace regional patchworks. Permitting, zoning, and interconnection processes must assess and mitigate compound risk profiles. FERC, DOE, and DHS must coordinate a unified resilience model for critical digital infrastructure.

5. Simulate the Threat, Stress the System - Operators must routinely red-team facilities, conduct blended cyber-physical penetration testing, and simulate large-scale attack scenarios. Threat assumptions must evolve from equipment failure to intentional, coordinated disruption.

Securing the future of digital infrastructure demands more than adaptation—it requires transformation. Those who move first will not only protect their own operations but will shape a future where digital trust and national security remain inseparable.

bottom of page