On May 13, 2026, divers on a routine maintenance dive at the J.B. Converse Reservoir dam in Mobile, Alabama found a grenade-style improvised explosive device underwater. The reservoir is the drinking water supply for roughly 350,000 residents of Mobile County. MAWSS called in the Gulf Coast Regional Maritime Response and Render-Safe Team. The device was retrieved and detonated. No damage to the dam. No contamination.

DIVER IED (grenade-style) at dam structure CONVERSE RESERVOIR / BIG CREEK LAKE RAW WATER  ·  SOURCE SIDE 350,000 residents served downstream
IED placement point Reservoir water (Big Creek Lake) J.B. Converse dam structure (1952)

MAWSS director Bud McCrory called it "an unprecedented threat." DHS was notified. No suspect has been identified.

Our top priority is keeping your drinking water safe. This is an unprecedented threat, and we are fortunate that this device was discovered before it could cause serious damage to our water supply or harm to individuals.
Bud McCrory, MAWSS Director

Federally designated critical infrastructure. Placed deliberately. Authorities are publicly calling it an improvised explosive device, not stray ordnance.

This is not history, it is this week

Operators routinely discount the threat as old case studies. Aliquippa. Muleshoe. Oldsmar. The Converse Reservoir IED was yesterday, and the Iranian CyberAv3ngers cyber campaign that hit Aliquippa in 2023 is still running. CISA reissued AA23-335A in December 2024. Same target class, different vector, same calendar week.

Defending against the wrong timeline is the same as not defending.

The attack surface has four layers, not one

Most operators we assess are well-prepared on one layer and effectively blind on the others.

Same target class, different vector
Cyber Path  |  CyberAv3ngers, 2023→present
Scan internet for exposed Unitronics PLCs
Default creds or known CVE on Vision-series
Control booster pump / HMI screen
Physical Path  |  Mobile, AL, May 13
Approach reservoir or dam structure
Bypass perimeter or water-side access
Place device at dam, underwater
Same target asset
Municipal Drinking Water Supply
Hundreds of thousands of residents per system  |  AWIA 2018 critical infrastructure

An adversary does not care which layer is your strongest. They look for the weakest.

Not the IED, the mindset

We are a cyber and ICS firm. We did not stop this attack. We are writing about it because of a way of thinking we keep hearing in the field:

All three are wrong the same way. The attack surface is multi-layered, and the operators who get hurt are the ones who treat each layer as someone else's problem.

The question is not "are we protected against underwater IEDs." It is: do we know which layers are being defended, by whom, with what visibility? Most operators cannot answer that with confidence.

How the response actually unfolded
1
Routine dive
May 13, scheduled maintenance
2
Device located
Underwater, at the dam
3
Six agencies on-scene
FBI, MCSO, MPD EOD, ALEA, Daphne SAR, Render-Safe Team
4
Render-safe and detonation
Same day, on-site
5
All clear
No contamination, DHS notified

What to do this week

Three steps that cost nothing:

Converse staff did this right. Routine dive, escalate fast, agencies clean it up, no contamination, no harm. The reason no one was hurt on May 13 is that someone actually got in the water and looked.

If you are reading this thinking "we don't dive our intakes," that is the takeaway. Not the IED. The fact that someone looked.


Matt Lucas

Founder, RedEye Security

RedEye Security provides ICS/SCADA assessments and continuous monitoring for water, energy, and industrial operators. Assessments are AWIA 2018-aligned and can be funded through CWSRF/DWSRF and FEMA HSGP grant programs.