lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <AANLkTinL3soYNmjb+8yS0yms+1eaFrva4=G-0obPOgGL@mail.gmail.com>
Date: Sat, 23 Oct 2010 23:27:50 -0400
From: Shawn Merdinger <shawnmer@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Lexis search for "scada + hackers" 1996-2010 --
	544 citations

Hi List,

Below are the citations from the results of a Lexis-Nexis (Academic
Universe) search for keywords SCADA and HACKER going back to 1996.
For copyright reasons I cannot provide full documents, but you can go
to a college library, do the same search and pull the full-text.  I
was going to cull through the full-text and write a compendium of
quotations/warnings/call-to-action starting from 1996, but I've not
the bandwidth at the moment.  Perhaps someone else will.

Cheers,
--scm


1.      PREPARED STATEMENT BY JOHN H. DEUTCH DIRECTOR OF CENTRAL
INTELLIGENCE BEFORE THE SENATE GOVERNMENTAL AFFAIRS COMMITTEE
SUBCOMMITTEE ON INVESTIGATIONS "FOREIGN INFORMATION WARFARE PROGRAMS
AND CAPABILITIES"
 Federal News Service, JUNE 25, 1996, TUESDAY, IN THE NEWS, 2000 words

2.       TESTIMONY June 25, 1996 JOHN M. DEUTCH DIRECTOR CENTRAL
INTELLIGENCE AGENCE SENATE GOVERNMENT AFFAIRS PERMANENT SUBCOMMITTEE
ON INVESTIGATIONS COMPUTER SECURITY
 Federal Document Clearing House Congressional Testimony, June 25,
1996, Tuesday, CAPITOL HILL HEARING TESTIMONY, 2042 words

3.      TELECOMMUNICATION, COMPUTER SYSTEMS VULNERABLE TO TERRORISM
 Radio Comm. Report, July 08, 1996, News; Pg. 5, 627 words, Jeffrey Silva

4.       A little knowledge can be a dangerous thing
 Energy IT, UPFRONT; Vol. 3, No. 2; Pg. 6, 501 words

5.      PREPARED STATEMENT OF JANT RENO UNITED STATES ATTORNEY GENERAL
BEFORE THE SENATE APPROPRIATIONS COMMITTEE COMMERCE, JUSTICE, STATE
AND JUDICIARY SUBCOMMITTEE
 Federal News Service, MARCH 31, 1998, TUESDAY, IN THE NEWS, 10371 words

6.      The U.S.  power grid isn't hacker-friendly
 The Washington Times, April 22, 1998, Wednesday, Final Edition, Part
A; COMMENTARY; EDITORIALS; LETTERS; Pg. A18, 415 words

7.      Letters to the Editor ; This month: Bryan Morgan's call for
suggestions (in the debut installment of his new Distributed Objects
column) hasn't gone unnoticed. He sifts through the deluge to shape
his column's itinerary for the next six months. Plus: Corrections and
amendments to Carl Dichter's Java visual IDEs review; more on those
JVM server benchmarks; praise for Laurence Vanhelsuw and Chuck
McManis; and two major (and related) design headaches for Bill Venners
 JavaWorld, May 1998, 3544 words

8.       DELIVERS REMARKS AT FORTUNE 500 CIO FORUM; ASPEN, CO
 FDCH Political Transcripts, August 12, 1998, Wednesday, 4681 words

9.      U.S. DOD    DoD news briefing
 M2 PRESSWIRE, August 13, 1998, 4594 words

10.      Plant managers focus on growth strategies
 Power, September, 1998, /October, 1998, CONFERENCE REPORT; POWER'S
Seventh Annual Powerplant O&M Symposium; Vol. 142, No. 5; Pg. 42, 2186
words, Compiled by Allen Kopp, Contributing Writer

11.     New Products, Access Control & Security Systems Integration,
November 1998, New Products; ISSN: 1084-6425 , 2072 words, AC&SSI
Staff

12.     WHEN GOTHAM GOES DARK:TERRORISM'S TAKING ON A NEW FACE FOR THE
COMPUTER AGE
 The New York Post, November 18, 1999, Thursday, 830 words, Bob McManus

13.     Thin clients simplify maintenance, lower total cost of ownership
  Instrumentation & Control Systems, December 1999, Pg. 67-68, 1587
words, Hancock, David

14.      The next Y2K?
 Energy IT, SECURITY; Vol. 5, No. 1; Pg. 12, 2025 words, By Ray
Pospisil; Ray Pospisil is a freelance writer based in Brooklyn, NY,
and a regular contributor to McGraw-Hill Energy publications.

15.      EPRI SAYS OPEN-PLATFORM SYSTEMS COULD CAUSE HACKER VULNERABILITY
 Electric Utility Week (formerly Electrical Week), March 13, 2000,
TECHNOLOGY; Pg. 17, 453 words

16.     CYBER WAR; WEAKNESS OF MILITARY AND CIVILIAN COMPUTER SYSTEMS IN
THE UNITED STATES AGAINST OUTSIDE COMPUTER HACKERS
 CBS News Transcripts, 2564 words

17.     Energy infrastructure security
 Electrical Business, May, 2000, Pg. v.36(5) My'00 pg 24, 812 words

18.      Five top IT applications in power delivery
 Electrical World, November, 2000, /December, 2000, SPECIAL SECTION;
Vol. 214, No. 6; Pg. 12, 2553 words

19.     What you don't know, will hurt you
 Electric Light & Power, December, 2000, COMMENTARY; Pg. 3, 702 words,
Pam Boschee

20.     The importance of infrastructure in a digital world;  FEATURES
- COVER STORY
 The Age (Melbourne, Australia), January 23, 2001 Tuesday, COMPUTERS;
It Professional; Pg. 1, 2085 words, SUE CANT

21.      U.S. SENATOR JUDD GREGG (R-NH) HOLDS HEARING ON TERRORISM AND
U.S. GOVERNMENT CAPABILITIES (AFTERNOON SESSION)
 FDCH Political Transcripts, May 8, 2001, Tuesday, 22753 words

22.     California hack points to possible IT surveillance threat
 InfoWorld Daily News, June 13, 2001, Wednesday, 862 words, By Dan
Verton, Computerworld, InfoWorld.com

23.     California Hack Points to Possible Surveillance Threat; Power grid
unaffected; perps unidentified
 Computerworld, June 18, 2001, NEWS - EARLY; Pg. 17, 628 words

24.     Information Security for T&D Automation, Transmission &
Distribution World, July 2001, INFOCUS; ISSN: 1087-0849, 1180 words,
Joe Weiss

25.      Telecom technologies boost utility operations
 Energy IT, COMMUNICATIONS; Vol. 6, No. 4; Pg. 51, 3825 words, By
Frank E. Benassi

26.     VIRTUAL PROBLEMS
 Foreign Affairs, September, 2001 / October, 2001, LETTERS TO THE
EDITOR; Pg. 180, 442 words, RALPH HITCHENS; U.S. Department of Energy

27.      B2B creates securITy challenges
 Energy IT, DATA SECURITY; Vol. 6, No. 5; Pg. 45, 4288 words, By
Frank E. Benassi

28.     PREPARED STATEMENT OF RONALD L. DICK DEPUTY ASSISTANT DIRECTOR,
COUNTER TERRORISM DIVISION, AND DIRECTOR, NATIONAL INFRASTRUCTURE
PROTECTION CENTER, FEDERAL BUREAU OF INVESTIGATION   BEFORE THE HOUSE
COMMITTEE ON TRANSPORTATION AND INFRASTRUCTURE SUBCOMMITTEE ON WATER
RESOURCES AND ENVIRONMENT   SUBJECT - TERRORISM: ARE AMERICA'S WATER
RESOURCES AND ENVIRONMENT AT RISK
 Federal News Service, October 10, 2001, Wednesday, PREPARED
TESTIMONY, 5997 words

29.     TERRORIST RISK TO WATER AND ENVIRONMENT
 Federal Document Clearing House Congressional Testimony, October 10,
2001, Wednesday, CAPITOL HILL HEARING TESTIMONY, 6063 words

30.     Energy Firms Stand Guard Amid Threats
 InternetWeek, November 19, 2001 Monday, NEWS & ANALYSIS; Pg. 1, 776
words, Rutrell Yasin

31.     The State Journal-Register (Springfield, IL), December 8, 2001
Saturday, LOCAL; Pg. 9, 2429 words

32.     Locking down on system security, American City & County, January
2002, WATERSUPPLY; ISSN: 0149-337X, 2871 words, Beth Wade, Managing
Editor

33.      Protecting critical infrastructures by sharing information
 Energy IT, SECURITY; Vol. 7, No. 1; Pg. 45, 985 words, Willard S.
Evans, Jr. is vice president of Information Technology Services at
Peoples Energy Corp., Chicago. He is one of the 11 members of the
Energy/ISAC's Board of Managers.; By Willard S. Evans, Jr.

34.     Companies on the prowl for IT security
 Electric Light & Power, February, 2002, Pg. 1, 1672 words, Dana
Bacciocco, Associate Editor, Walls is associate director of advanced
energy systems with Arthur D. Little Inc.  He can be reached directly
via telephone (617-498-6649) or e-mail (walls.d@....com).

35.      How one hacker penetrated a utility network: A true story
 Energy IT, DATA SECURITY; Vol. 7, No. 2; Pg. 46, 1183 words

36.     Digital Terrorism: Holes in the Firewall? Plugging cyber security
holes isn't as easy as everyone wants to think.
 PUBLIC UTILITIES FORTNIGHTLY, March 15, 2002, ARTICLE; Pg. 12, 4886
words, By Jennifer Alvey; Jennifer Alvey is associate editor at Public
Utilities Fortnightly.

37.     The Truth About Cyberterrorism
 CIO Magazine, March 15, 2002, FEATURE, 2821 words, Scott Berinato

38.     DIGITAL NIGHTMARE
 Governing Magazine, April, 2002, FEATURE;Pg. 20, 2840 words, Ellen Perlman

39.     CSIS warns infrastructure vulnerable to cyberterrorism
 Cobourg Daily Star (Ontario), May 8, 2002 Wednesday, NATIONAL NEWS;
Pg. 19, 561  words, Southam News

40.     CSIS warns infrastructure vulnerable to cyberterrorism
 Port Hope Evening Guide (Ontario), May 8, 2002 Wednesday, NATIONAL
NEWS; Pg. 19, 561  words, Southam News

41.     HEARING OF THE SENATE GOVERNMENTAL AFFAIRS COMMITTEE   SUBJECT:
SECURING OUR INFRASTRUCTURE: PRIVATE/PUBLIC INFORMATION SHARING
CHAIRED BY: SENATOR JOSEPH LIEBERMAN (D-CT)   LOCATION: HOUSE/SENATE
OFFICE BUILDING, WASHINGTON, D.C.
 Federal News Service, May 8, 2002 Wednesday, CAPITOL HILL HEARING, 27430 words

42.     U.S. Fears Al Qaeda Cyber Attacks
 Newsbytes, 3398 words, Barton Gellman; Washington Post Staff Writer

43.     Related Documents and Resources On The Web
 Newsbytes, 187 words, Compiled by The Washington Post and
washingtonpostcomTechNewscom

44.     Cyber-Attacks by Al Qaeda Feared;  Terrorists at Threshold of
Using Internet as Tool of Bloodshed, Experts Say
 The Washington Post, June 27, 2002 Thursday  Correction Appended, A
SECTION; Pg. A01, 3409 words, Barton Gellman, Washington Post Staff
Writer

45.     Al-Qaida hackers targeting Bay Area
 Tri-Valley Herald (Pleasanton, CA), June 27, 2002 Thursday, HEADLINE
NEWS, 1239 words, By Barton Gellman, Washington Post

46.     Bay Area probed for attack; FBI: Al-Qaida has cased computer systems
 Alameda Times-Star (Alameda, CA), June 27, 2002 Thursday, HEADLINE
NEWS, 1226 words, By Barton Gellman , Washington Post

47.     Bay Area probed for attack; FBI: Al-Qaida has cased computer systems
 The Oakland Tribune (Oakland, CA), June 27, 2002 Thursday, HEADLINE
STORIES, 1226 words, By Barton Gellman , Washington Post

48.     Al-Qaida casing Bay Area networks; FBI: Cyberterrorists
 The Daily Review (Hayward, CA), June 27, 2002 Thursday, HEADLINE
NEWS, 1240 words, By Barton Gellman, Washington Post

49.     Al-Qaida Internet threat revealed; State infrastructure,
disruption of communications were targets
 San Mateo County Times (San Mateo, CA), June 27, 2002 Thursday, FRONT
PAGE, 1703 words, By Barton Gellman, Washington Post

50.     4 cities shield Web data
 San Jose Mercury News (California), June 28, 2002 Friday PS1 EDITION,
B; Pg. 1, 893 words, Sean Webby Mercury News

51.     Four Bay Area cities sanitized Web sites; SUSPICIOUS TRAFFIC LED
TO REMOVAL OF DATA
 San Jose Mercury News (California), June 28, 2002 Friday F1 EDITION,
B; Pg. 1, 701 words, Sean Webby Mercury News

52.     4 cities take data off Web; AUTHORITIES REMOVE INFO AFTER HITS
FROM MIDEAST
 San Jose Mercury News (California), June 28, 2002 Friday MO1 EDITION,
B; Pg. 1, 665 words, Sean Webby Mercury News

53.     Four Bay Area cities reported suspicious traffic on Web sites;
TERROR CONCERN: HITS INVOLVED 911 CENTERS, POWER, WATER SUPPLIES;
SENSITIVE DATA REMOVED
 San Jose Mercury News (California), June 28, 2002 Friday A1 EDITION,
B; Pg. 1, 777 words, Sean Webby Mercury News

54.     Suspicious traffic led to removal of data on Bay Area cities' Web sites
 San Jose Mercury News, June 29, 2002, Saturday, STATE AND REGIONAL
NEWS, 727 words, By Sean Webby

55.     Securing supervisory control and data acquisition systems
 Hydrocarbon Processing, July 2002 , 1832  words

56.     Despite gains, U.S. remains vulnerable to terrorist hackers, White
House aide says
 Gannett News Service, July 18, 2002, Thursday, 532 words, GREG
WRIGHT; Gannett News Service

57.     CYBERTERRORISM
 Federal Document Clearing House Congressional Testimony, July 24,
2002 Wednesday, CAPITOL HILL HEARING TESTIMONY, 2808 words

58.     CYBERTERRORISM
 Federal Document Clearing House Congressional Testimony, July 24,
2002 Wednesday, CAPITOL HILL HEARING TESTIMONY, 2724 words

59.     U.S. REPRESENTATIVE STEPHEN HORN (R-CA) HOLDS HEARING ON
CYBERTERRORISM AND CRITICAL INFRASTRUCTURE
 FDCH Political Transcripts, July 24, 2002 Wednesday, 25774 words

60.     NeoNET, Inc. Announces Security Services
 Business Wire, July 26, 2002, Friday, 291 words

61.     Hackers and Tall Tales
 The Washington Post, August 2, 2002 Friday, EDITORIAL; Pg. A22, 192 words

62.     Cybersecurity Gains Momentum
 Chemical Week, August 21, 2002, E-COMMERCE; Pg. 42, 1928 words, ESTHER D'AMICO

63.     NeoNET's Free ''Over-the-Wire'' Vulnerability Test Answers
''Yes'' or ''No''
 Business Wire, August 28, 2002, Wednesday, 438 words

64.      Control systems: The weak link in infrastructure protection
 Platts Energy Business & Technology, September, 2002, CYBER
SECURITY; Vol. 4, No. 5; Pg. 35, 1154 words, BY JOSEPH M. WEISS, P.E.,
AND DR. GERALD J. FITZPATRICK; Joseph M. Weiss, P.E., is an executive
consultant with KEMA Consulting, Fairfax, Va.
(jweiss@...aconsulting.com). Dr. Gerald J. FitzPatrick is leader of
the Electric Systems Group at the National Institute of Standards and
Technology (NIST), Gaithersburg, Md. (fitzpa@...t.gov).

65.      Preparing for the worst
 Platts Energy Business & Technology, September, 2002, BUSINESS
SECURITY; Vol. 4, No. 5; Pg. 37, 1729 words, Tina M. Sivinski is Vice
President and Energy Global Industry Solutions President of EDS,
Plano, Tex.; BY TINA M. SIVINSKI

66.     Cyber Terror Lurks As Potential Threat; Could Do Serious Harm;
Financial services and utilities among sectors that could be damaged
 Investor's Business Daily, September 11, 2002 Wednesday, INTERNET &
TECHNOLOGY; NATIONAL, 847 words, BY DONNA HOWELL

67.     White House Issues Cyber Security Plan; Containing threats
requires cooperation from all sectors, plan recommends
 State Department, September 20, 2002, NEWS FROM THE WASHINGTON FILE, 4596 words

68.     Bush team lays out cybersecurity plan; Recommendations draw
praise, but some question whether they go far enough.
 Network World, September 23, 2002, FRONT NEWS; Pg. 10, 895 words, ?BY
CAROLYN DUFFY MARSAN AND ELLEN MESSMER

69.     Critical Infrastructure Security and You -- You don't have to be a
utility to apply some of the same network safeguards they use.
 Network Magazine, October 1, 2002, NETWORK DEFENSE; Pg. 66, 2166
words, Rik Farrow

70.     New equipment
 World Oil, October 2002 , DEPARTMENTS, 799  words

71.     The Business Lawyer, November, 2002, SURVEY., 15216 words

72.     Is Our Infrastructure Open To Online Terror?; Beefing Up Security;
Command-and-control for U.S. gas, water, rail could yet be vulnerable
 Investor's Business Daily, November 5, 2002 Tuesday, SECTION INTERNET
& TECHNOLOGY; NATIONAL EDITION; Pg. A06, 1199 words, BY DONNA HOWELL

73.     CRITICAL INFRASTRUCTURE SECURITY AND YOU
 Network Computing Asian Edition, December 1, 2002, 1229 words, Rik Farrow

74.     IT Security: Who's Investing in What? Regulatory and market forces
put the pressure on information technology to perform.
 PUBLIC UTILITIES FORTNIGHTLY, January 1, 2003, ARTICLE; Pg. 18, 3419
words, BY JENNIFER ALVEY; Jennifer Alvey is associate editor of Public
Utilities Fortnightly.

75.     CHALLENGES FOR SELECTED AGENCIES AND INDUSTRY SECTORS
 GAO Reports, February 28, 2003, Friday, GAO REPORT, 20950 words,
ROBERT F. DACEY

76.     Get safe: Prepare for Security Intrusion; Threats to
control-system security are like the weather ... you can't control it,
but you can construct adequate shelter. Avoid drama and crisis; ensure
control systems can weather security intrusion storms.,  Control
Engineering, March 01, 2003, Features; Cover Story; Pg. 34, 3128
words, Dave Harrold, Control Engineering

77.     New threats prompt renewed security scrutiny for product storage sites
 Oil & Gas Journal, March 3, 2003, TRANSPORTATION; Pg. 52, 3490 words,
Robert I. Williams; SCADA Systems Engineering and Training
Consultants, Mold, Flintshire, UK

78.     Rising Threat -- As war looms, the risk of cyberattacks from
hackers and terrorists grows. Are you ready?
 InformationWeek, March 10, 2003, NEWS SECURITY; Pg. 22, 1366 words,
George V. Hulme

79.     President's Plan Causes No 'Heartache' for Industry
 Chemical Week, March 12, 2003, INFORMATION TECHNOLOGY; Cybersecurity;
Pg. 21, 508 words, ESTHER D'AMICO

80.     MI2G    Satellite hacker attacks planned with Eastern European help
 M2 PRESSWIRE, April 1, 2003, 1285 words

81.     Cyber Terrorism Expert Available for Interviews
 PR Newswire, April 3, 2003 Thursday, FINANCIAL NEWS, 802 words

82.     MI2G    Digital turbulence points to deepening instability in
Middle East
 M2 PRESSWIRE, April 10, 2003, 1144 words

83.     MI2G    Monthly world record for overt digital attacks broken;
Politically motivated attacks major contributing force
 M2 PRESSWIRE, May 21, 2003, 1177 words

84.     Industrial security gets a Linux-based lock
 Breaking News from globeandmail.com, June 11, 2003 9:59 AM EST,
CAT3; einsider, 602 words, ij; Robert Lemos; CNET

85.     The cyberspace invaders;  FEATURES - REPORTAGE
 Sunday Age (Melbourne, Australia), June 22, 2003 Sunday, NEWS; Pg.
15, 2551 words, Gary Hughes

86.     CYPERSECURITY ISSUES
 Federal Document Clearing House Congressional Testimony, June 25,
2003 Wednesday, CAPITOL HILL HEARING TESTIMONY, 5435 words

87.      Ready for a cyber attack on your control systems?
 Platts Energy Business & Technology, July 2003, SECURITY; Vol. 5,
No. 6; Pg. 46, 1455 words, By Joseph M. Weiss, PE; Joseph M. Weiss, PE
is an executive consultant with KEMA Inc., Fairfax, Va. He is based in
California and can be reached at (408) 253-7934 or
jweiss@...aconsulting.com.

88.     Securing Our Water Systems And Their Infrastructures
 The Journal of Counterterrorism & Homeland Security International,
2003 Summer, Vol. 9, No. 3, 2586 words, Edward J. Courtney; Edward J.
Courtney has been Deputy Commissioner of the Department of Public
Works for the City of Yonkers, New York since 1996.  He presently
serves as a member of the city's Emergency Management Planning
Committee.  He is a former police lieutenant, civil service
commissioner, and director of Civil Defense and Disaster Preparedness
for the city.  Presently, he is a member of IACSP, the Middle East
Forum, the Center for Security Policy, and the Homeland Security
Leadership Alliance.  Contact: ejc41@...oo.com

89.     Red alert on the e-war front; Is it possible to take down a
superpower using only a keyboard, a mouse and an internet connection?
With corporate and government bodies across the US taking the threat
of electronic terrorism seriously, Duncan Graham-Rowe decided to give
it a go,  New Scientist, July 05, 2003, Features; Pg. 38, 2458 words,
Duncan Graham-Rowe

90.      Alliance tests distributed energy control system
 Inside Energy /with Federal Lands, July 7, 2003, Pg. 1, 1090 words,
David Jones

91.     CYPERSECURITY ISSUES
 Federal Document Clearing House Congressional Testimony, July 22,
2003 Tuesday, CAPITOL HILL HEARING TESTIMONY, 6855 words

92.     PREPARED STATEMENT OF DANIEL G. WOLF DIRECTOR OF INFORMATION
ASSURANCE NATIONAL SECURITY AGENCY   BEFORE THE HOUSE COMMITTEE ON
HOMELAND SECURITY SUBCOMMITTEE ON CYBERSECURITY, SCIENCE AND RESEARCH
& DEVELOPMENT   SUBJECT - "CYBERSECURITY GETTING IT RIGHT"
 Federal News Service, July 22, 2003 Tuesday, PREPARED TESTIMONY, 5375 words

93.     CYPERSECURITY ISSUES
 Federal Document Clearing House Congressional Testimony, July 22,
2003 Tuesday, CAPITOL HILL HEARING TESTIMONY, 5423 words

94.     PREPARED TESTIMONY OF ROBERT F. DACEY DIRECTOR, INFORMATION
SECURITY ISSUES   BEFORE THE HOUSE COMMITTEE ON ARMED SERVICES
SUBCOMMITTEE ON TERRORISM, UNCONVENTIONAL THREATS AND CAPABILITIES,
 Federal News Service, July 24, 2003 Thursday, PREPARED TESTIMONY, 11720 words

95.     Customised hacking,  New Scientist, August 2, 2003, Letters;
Letters; Pg. 23, 148 words, John Crowther, Morissen, Switzerland

96.     BlackIce; Corporate America is still in denial about the threat of
cyber-terrorist attacks against critical facilities in the energy,
telecommunications and financial industries. By Dan Verton
 Computerworld, August 11, 2003, BIZ - FEATURES; Pg. 35, 1651 words

97.     SPECIAL REPORT INTRODUCTION
 ABC News Transcripts, August 14, 2003 Thursday, 11086 words

98.     Q&A 14:30
 CNN INTERNATIONAL, August 15, 2003 Friday, NEWS; DOMESTIC, 1933
words, Michael Holmes

99.     Florida's Power Grid Can Withstand A Crisis, Officials Say
 Tampa Tribune (Florida), August 16, 2003, Saturday,, NATION/WORLD,,
764 words, MICHAEL SASSO and WILL RODGERS, The Tampa Tribune; Reporter
Michael Sasso can be reached at (813) 259-7865 or
msasso@...patrib.com. Reporter Will Rodgers can be reached at (813)
259-7870 or wjrodgers@...patrib.com.

100.    Blackout prompts worries about security of power grid
 USA TODAY, August 19, 2003, Tuesday,, 533 words, Kevin Maney and
Michelle Kessler

101.    Computer Virus Expert Available for Interviews on SoBig and Worm Viruses
 PR Newswire, August 21, 2003 Thursday, FINANCIAL NEWS, 650 words

102.    Expert on Internet Security and Computer Viruses Available for
Media Interviews
 PR Newswire, August 26, 2003 Tuesday, FINANCIAL NEWS, 649 words

103.    MI2G    August sees burst of malware activity
 M2 PRESSWIRE, August 27, 2003, 1053 words

104.    Electricity grids left wide open to hackers,  New Scientist,
August 30, 2003, News; This Week; Pg. 5, 595 words, Duncan Graham-Rowe

105.    Cyber-Terrorism Revealed;  New Book Explores High-Tech Terrorism
& America's Growing Vulnerability
 PR Newswire, September 2, 2003 Tuesday, LIFESTYLE, 1053 words

106.    MI2G    Linux remains most attacked server OS
 M2 PRESSWIRE, September 11, 2003, 1005 words

107.    MI2G    Top 10 malware targets Microsoft software; Combined
economic damage $72 billion
 M2 PRESSWIRE, September 11, 2003, 1090 words

108.    Computers failed in 4 places just before August blackout
 Plain Dealer (Cleveland, Ohio), September 14, 2003 Sunday, Sports
Final / All Correction Appended, NATIONAL; Pg. A1, 1741 words, Teresa
Dixon Murray and John Funk, Plain Dealer Reporters

109.    Computers failed in 4 places just before August blackout
 Plain Dealer (Cleveland, Ohio), September 14, 2003 Sunday, Sports
Final / All Correction Appended, NATIONAL; Pg. A1, 1741 words, Teresa
Dixon Murray and John Funk, Plain Dealer Reporters

110.    Congress Calls Upon Computerworld Senior Writer and
Cyber-Security Expert to Testify on the Security of National
Infrastructure
 Business Wire, September 15, 2003, Monday, 877 words

111.    A 'Virtual' Reality
 PUBLIC UTILITIES FORTNIGHTLY, September 15, 2003, CYBER SECURITY; Pg.
48, 3337 words, BY JENNIFER ALVEY; Jennifer Alvey is associate editor
of Public Utilities Fortnightly. Contact her at jalvey@....com.

112.     DHS science chief sees industry shielding assets
 Inside Energy /with Federal Lands, October 6, 2003, Pg. 1, 1076
words, David Jones

113.    BCIT cyber security expert warns U.S. congressional subcommittee
of critical infrastructure vulnerabilities
 Canada NewsWire, October 9, 2003, Thursday, DOMESTIC NEWS, 806 words

114.    Weak links leave U.S. electricity grid vulnerable to attack
 Akron Beacon Journal, October 28, 2003, Tuesday, DOMESTIC NEWS, 1368
words, By Ed Meyer

115.    Cyber Security Solutions Growing for Utilities
 Natural Gas Week, October 29, 2003, CURRENT, 1103 words

116.    Cyber Security Solutions Growing for Utilities
 Natural Gas Week, October 29, 2003, CURRENT, 1103 words

117.    Dispelling cyber attack myths: the first step in securing
vulnerable control systems.
  Utility Automation, November 2003, Pg. 26, 2041 words

118.     DOE laboratories look at buttressing energy facilities against
cyber attack
 Inside Energy /with Federal Lands, November 3, 2003, ENERGY
SECURITY; Pg. 7, 1292 words, David Jones

119.    Ice storm
 The Age (Melbourne, Australia), November 18, 2003 Tuesday,
COMPUTERS; Next; Pg. 5, 1882 words, Dan Verton

120.    Ice storm
 Sydney Morning Herald (Australia), November 18, 2003 Tuesday,
COMPUTERS; Next; Pg. 5, 1882 words, Dan Verton

121.    Computer worms, viruses pose serious threats to utility control systems
 Electric Light & Power, December, 2003, NEWS; Pg. 6, 951 words,
JOSEPH WEISS, KEMA; Weiss is an executive consultant at KEMA.  He is
also a member of ISA's process control systems security committee --
SP99, and CIGRE's task force on cyber security.  Weiss is located in
California and may be reached at jweiss@...aconsulting.com or
408-253-7934.

122.    Security: The year ahead
 InfoWorld,  January 5, 2004, BREAKING NEWS; Pg. 17, 526 words, Paul Roberts

123.    Policy Papers, January 20, 2004, 11549 words

124.    Cyber security: read the FAQs, mount a defense, set up an offense!
  Control Solutions International, February 2004, 653 words

125.    Intrusic's Zephon Detects, Ousts Enemy Sleeper Cells Embedded
Inside Corporate and Government IT Systems
 Business Wire, February 23, 2004 Monday, 751 words

126.    CYPERTERRORISM
 Federal Document Clearing House Congressional Testimony, February 24,
2004 Tuesday, CAPITOL HILL HEARING TESTIMONY, 2266 words

127.    CYPERTERRORISM
 Federal Document Clearing House Congressional Testimony, February 24,
2004 Tuesday, CAPITOL HILL HEARING TESTIMONY, 4410 words

128.    HEARING OF THE TERRORISM, TECHNOLOGY, AND HOMELAND SECURITY
SUBCOMMITTEE OF THE SENATE JUDICIARY COMMITTEE   SUBJECT: VIRTUAL
THREAT, REAL TERROR: CYBERTERRORISM IN THE 21ST CENTURY   CHAIRED BY:
SENATOR JON KYL (R-AZ)   LOCATION: 226 DIRKSEN SENATE OFFICE BUILDING,
WASHINGTON, D.C.
 Federal News Service, February 24, 2004 Tuesday, CAPITOL HILL
HEARING, 15769 words

129.    CYBERSECURITY
 Federal Document Clearing House Congressional Testimony, March 30,
2004 Tuesday, CAPITOL HILL HEARING TESTIMONY, 2687 words

130.    CYBERSECURITY
 Federal Document Clearing House Congressional Testimony, March 30,
2004 Tuesday, CAPITOL HILL HEARING TESTIMONY, 8290 words

131.    Communications Daily, March 31, 2004, Wednesday

132.    Hill Panel Sounds Alarm on Telecom Network Vulnerability
 WASHINGTON INTERNET DAILY, MARCH 31, 2004, Vol.5, No.62, 904 words

133.    US warns of cyber attacks
 PACE (Process & Control Engineering) (Australia), April 2004, 587
words, Denes Bolza

134.    Utilities' Security Is Too Lax, Report Says -- General Accounting
Office cites threat of cyberattacks against control systems
 InformationWeek, April 5, 2004, NEWS; Security; Pg. 24, 611 words,
Martin J. Garvey

135.    GAO: SCADA Systems Vulnerable to Terrorists
 THE ELECTRICITY DAILY, April 8, 2004, Thursday, Vol. 22, No. 68, 646 words

136.    mounting concerns over SCADA security
 Electric Light & Power, May 2004/June 2004, Pg. 39, 867 words, Gary
Sevounts, Symantec Corp.; Sevounts is director of industry solutions
for Symantec Corporation and is responsible for delivering customized
information security solutions to investor-owned companies within the
electric power sector.  He can be reached at gsevounts@...antec.com.

137.    PROVE IT
 Information Security, May, 2004, EXPOSE; Pg. 24, 1665 words, By Erik
Sherman; ERIK SHERMAN (ebs@...ksherman.com) is a Massachusetts-based
freelance writer.

138.    Power play; They could turn out your lights, cut off your water
and leave your phone line dead. Why are vital networks such as power
grids and water supplies so vulnerable to hackers, and can one of the
world's largest experiments prevent total meltdown? Duncan Graham-Rowe
investigates,  New Scientist, May 15, 2004, Technology; Technology;
Pg. 24, 2557 words, Duncan Graham-Rowe; Duncan Graham-Rowe is a
freelance journalist

139.    The Terrorist Threat to the Gas and Oil Sectors:;  A
Comprehensive Threat Assessment
 The Journal of Counterterrorism & Homeland Security International,
2004 Summer, Vol. 10, No. 4, 4404 words, Dr. Joshua Sinai

140.    CYPERSECURITY
 Federal Document Clearing House Congressional Testimony, June 2, 2004
Wednesday, CAPITOL HILL HEARING TESTIMONY, 2421 words

141.    DIGITAL MOLES IN LARGE-SCALE NETWORKS: How the Bad Guys Get In
 Security Technology Executive, July 2004, GOVERNMENT & HOMELAND
SECURITY SUPPLEMENT, 1138 words, By Peiter Mudge Zatko

142.    Utility Merges Mission-Critical Networks,  Transmission &
Distribution World, July 1, 2004, ISSN: 1087-0849; Pg. 7, 2211 words,
By Kevin Streett, Overton Power District No. 5

143.    Certicom CodeSign Enables Secure Code Distribution;
Browser-based code-signing application secures remote provisioning in
wireless and cable environments
 Canada NewsWire, July 21, 2004, Wednesday, FINANCIAL NEWS, 1126 words

144.    Certicom CodeSign Enables Secure Code Distribution
 PR Newswire, July 21, 2004 Wednesday, FINANCIAL NEWS, 1097 words

145.    Out of Control
 CSO Magazine, August 1, 2004, FEATURE, 2862 words, Todd Datz

146.    Mission: Critical
 Information Security, September, 2004, SPECIAL REPORT; Pg. 26, 3188
words, By Stephen Barlas, Alan Earls, Michael Fitzgerald, Jerri
Ledford and Dennis McCafferty; This report was written by Information
Security contributing writers STEPHEN BARLAS (government), ALAN EARLS
(financial services), MICHAEL FITZGERALD (energy), JERRI LEDFORD
(telecommunications) and DENNIS McCAFFERTY (transportation).

147.    PROTECTING FINANCIAL INFRASTRUCTURE
 Federal Document Clearing House Congressional Testimony, September 8,
2004 Wednesday, CAPITOL HILL HEARING TESTIMONY, 5810 words

148.    New and original study on industrial cyber security reveals
tenfold increase in number of successful attacks on process control
and SCADA systems since 2000
 PR Newswire US, October 4, 2004 Monday, 876 words

149.    New and original study on industrial cyber security reveals
tenfold increase in number of successful attacks on process control
and SCADA systems since 2000
 Canada NewsWire, October 4, 2004, Monday, DOMESTIC NEWS, 776 words

150.    Plant automation, IT dead center in cyber terrorism concerns
 MSI, November 1, 2004, VIEWS FROM THE FRONT; Top of Mind at ISA; Pg.
10, 667  words, by Staff

151.    Microsoft patch management a top-level plant-floor concern
 MSI, November 1, 2004, VIEWS FROM THE FRONT; Plant-Floor Security;
Pg. 18, 293  words, by Staff

152.    Industrial Net Security Found Lacking; Study sees tenfold spike
in attacks on systems running trains, factories
 Investor's Business Daily, November 9, 2004 Tuesday, SECTION INTERNET
& TECHNOLOGY; Q & A; NATIONAL EDITION; Pg. A05, 884 words, BY DONNA
HOWELL

153.    The battle against cyberterror; The race is on to harden the
nation's critical infrastructure before cyberterrorists gain enough
skills to launch attacks.
 Network World, November 29, 2004, NEWS; Pg. 49, 822 words, JOHN BLAU

154.    Cybersecurity: It Doesn't Come In A Box
 The Metropolitan Corporate Counsel, December, 2004, KELLEY DRYE; Pg.
6, 2154 words, STEPHEN M. ARNER , KELLEY DRYE & WARREN LLP; Stephen M.
Arner is an attorney in the Tysons Corner office of Kelley Drye &
Warren LLP where his practice focuses on litigation and cybersecurity.

155.    TDi Signs Cooperative Research and Development Agreement With INEEL
 Business Wire, December 22, 2004 Wednesday 3:20 PM GMT, 555 words

156.    analyzing cyber security
 Electric Light & Power, January 2005 / February 2005, NEWS; Pg. 17,
952 words, Gary Sevounts, Symantec; As director of electric power
solutions for Symantec Corporation, Gary Sevounts is responsible for
the definition and introduction of enterprise security solutions in
the electric power industry.

157.    Report warns of increased industrial security risk
 CIO Canada, February 1, 2005, Pg. n/a, 252 words, Dubowski, Stefan

158.    Control systems cyber security;  Terrorist threats, hackers,
disgruntled employees, and vulnerable process control systems in
highly volatile industries give plenty of cause for concern. Should
voices calling for greater security be heeded, or are they just the
cries of modern-day Chicken Littles?
 Control Engineering, February 1, 2005, FEATURES; Cover Story; Pg.
26, 2260  words, Bryan L. Singer, chairman ISA SP-99, and Joe Weiss,
KEMA.  Bryan L. Singer is chairman of ISA SP-99 and works for Rockwell
Automation as a senior business consultant and leader for security
services. Joseph Weiss, PE, CISM, is executive consultant at KEMA and
chairman of the IEEE Power Engineering Society's task force reviewing
equipment standards for cyber security, a member of ISA's process
Control Systems Security Committee - SP99, and CIGRE's Task Force on
cyber security.

159.    InfoSec Institute and Core Security Technologies Work Together to
Provide an Improved Ethical Hacking Course
 Business Wire, February 22, 2005 Tuesday 11:56 PM GMT, 409 words

160.    Plant-floor security, by the numbers;  Count the ways to secure
your plant-floor data, networks, and operations
 Manufacturing Business Technology, March 1, 2005, APPLICATIONS AND
SERVICES; Pg. 24, 2037  words, By Nancy Bartels, senior editor

161.    Hackers Target U.S. Power Grid;  Government Quietly Warns
Utilities To Beef Up Their Computer Security
 The Washington Post, March 11, 2005 Friday, Financial; E01, 1502
words, Justin Blum, Washington Post Staff Writer

162.    U. Illinois team works to secure data systems for homeland security
 University Wire, March 15, 2005 Tuesday, 759 words, By Liz Deavila,
Daily Illini; SOURCE: U. Illinois

163.    Industrial Ethernet: IEC, go back to the negotiation table;
Hubert Kirrmann, a member of the Swiss National Committee, tells why
he and his colleagues have voted against the IEC standardisation
proposals for Ethernet.
 Control Engineering Europe, April 1, 2005, FEATURE ARTICLES; Pg. 26,
1893  words, Hubert Kirrmann

164.    SPECIAL REPORT; ARE OUR CRITICAL SYSTEMS SAFE FROM CYBER ATTACK?
 Computing, April 21, 2005, Pg.26, 2269 words

165.    Three-zone security
 Control Engineering, June 1, 2005, DEPARTMENTS; Insight; IT and
engineering; Pg. 22, 692  words, Dennis Brandl, BR&L Consulting.
Dennis Brandl, dbrandl@...consulting.com , is the president of BR&L
Consulting, a consulting firm focusing on manufacturing IT solutions,
based in Cary, N.C.

166.    Many Facets, One Point;  Safeguarding data in automation and
control systems boils down to risk assessment that emphasizes policies
and procedures as much as technology.
 Control Engineering, July 1, 2005, FEATURES; HMI Security; Pg. 41,
2420  words, Jeanine Katzel, Control Engineering

167.    Vendors Need to Present Convincing Business Plans to Justify
Investments on SCADA Systems
 Business Wire, July 19, 2005 Tuesday 12:00 PM GMT, 889 words

168.    SECURING CYBERSPACE
 CQ Congressional Testimony, July 19, 2005 Tuesday, CAPITOL HILL
HEARING TESTIMONY, 5697 words

169.    SCADA goes into outer space
 PACE (Process & Control Engineering) (Australia), August 2005, 999 words

170.    Al-Qaida Recruiting Target: Skilled Hackers; Cyberterrorism
Threat; Ex-Justice Dept. official says terror organizations seek
coordinated attacks
 Investor's Business Daily, August 19, 2005 Friday, SECTION INTERNET &
TECHNOLOGY; Q & A; NATIONAL EDITION; Pg. A04, 942 words, BY DOUG
TSURUOKA

171.    Networks still vulnerable
 The Capital (Annapolis, MD), August 21, 2005 Sunday, BUSINESS; Pg.
B1, 778 words, DAVID E. LEIVA, Staff Writer

172.    Internet Security Systems Protects SCADA Networks, Helps To
Ensure Stability of National Infrastructure; Company Adds Specialized
SCADA Protection to its Intrusion Prevention Technology
 Business Wire, August 24, 2005 Wednesday 11:45 AM GMT, 771 words

173.    Networks are 'potential for disaster'
 The Maryland Gazette, August 24, 2005 Wednesday, BUSINESS; Pg. A6,
789 words, DAVID E. LEIVA, Staff Writer

174.    Security Tips That Will Scare-And Help-You
 InformationWeek, August 29, 2005, BUSINESS TECHNOLOGY; Pg. 76, 721
words, Bob Evans

175.    Trusted Network Technologies' Utility IT Study Reveals
Expectations of Critical Energy Systems Breaches; Utilities Executives
Burdened by Compliance, but Optimistic Regarding Security and Identity
Management Efforts
 Business Wire, August 29, 2005 Monday 11:01 AM GMT, 810 words

176.    CYBERSECURITY VULNERABILITIES
 CQ Congressional Testimony, September 15, 2005 Thursday, CAPITOL HILL
HEARING TESTIMONY, 2516 words

177.    CYBERSECURITY VULNERABILITIES
 CQ Congressional Testimony, September 15, 2005 Thursday, CAPITOL HILL
HEARING TESTIMONY, 6000 words

178.    Terrorism's New Operating System
 National Review, September 16, 2005, Friday, National Review Online,
1431 words, By Mansoor Ijaz

179.    NEWS; BP LEADS SECURITY INITIATIVE.
 Computing, September 22, 2005, Pg.1, 429 words, Daniel Thomas.

180.    Crescent Tech Vent. Interim Results
 London Stock Exchange Aggregated Regulatory News Service (ARNS),
September 30, 2005 Friday 2:00 AM GMT, 542 words

181.    Securing the process industries;  Everyone wants a secure plant
floor, but process manufacturers have special concerns that require
unique strategies
 Manufacturing Business Technology, October 1, 2005, SECURITY AND
WIRELESS; Pg. 52, 2132  words, By Nancy Bartels, senior editor

182.    SUPERVISORY CONTROL AND DATA ACQUISITION SYSTEMS
 CQ Congressional Testimony, October 18, 2005 Tuesday, CAPITOL HILL
HEARING TESTIMONY, 3189 words

183.    SUPERVISORY CONTROL AND DATA ACQUISITION SYSTEMS
 CQ Congressional Testimony, October 18, 2005 Tuesday, CAPITOL HILL
HEARING TESTIMONY, 4053 words

184.    SUPERVISORY CONTROL AND DATA ACQUISITION SYSTEMS
 CQ Congressional Testimony, October 18, 2005 Tuesday, CAPITOL HILL
HEARING TESTIMONY, 5031 words

185.    SUPERVISORY CONTROL AND DATA ACQUISITION SYSTEMS
 CQ Congressional Testimony, October 18, 2005 Tuesday, CAPITOL HILL
HEARING TESTIMONY, 3972 words

186.    HEARING OF THE ECONOMIC SECURITY, INFRASTRUCTURE PROTECTION, AND
CYBERSECURITY SUBCOMMITTEE AND THE EMERGENCY PREPAREDNESS, SCIENCE,
AND TECHNOLOGY SUBCOMMITTEE OF THE HOUSE HOMELAND SECURITY COMMITTEE
SUBJECT: SCADA AND THE TERRORIST THREAT: PROTECTING THE NATION'S
CRITICAL CONTROL SYSTEMS   CHAIRED BY: REPRESENTATIVE DANIEL LUNGREN
(R-CA)   WITNESSES:   DONALD "ANDY" PURDY, ACTING DIRECTOR, NATIONAL
CYBER SECURITY DIVISION, DEPARTMENT OF HOMELAND SECURITY; DR. SAM
VARNADO, DIRECTOR OF INFORMATION OPERATIONS CENTER, SANDIA NATIONAL
LABORATORY;   DR. WILLIAM RUSH, INSTITUTE PHYSICIST, GAS TECHNOLOGY
INSTITUTE; LARRY TODD, DIRECTOR, SECURITY, SAFETY AND LAW ENFORCEMENT,
BUREAU OF RECLAMATION, DEPARTMENT OF THE INTERIOR; DR. K. P. ANANTH,
ASSOCIATE LABORATORY DIRECTOR, NATIONAL AND HOMELAND SECURITY, IDAHO
NATIONAL LABORATORY;   ALAN PALLER, DIRECTOR OF RESEARCH, THE SANS
INSTITUTE   LOCATION: 311 CANNON HOUSE OFFICE BUILDING, WASHINGTON,
D.C.
 Federal News Service, October 18, 2005 Tuesday, CAPITOL HILL
HEARING, 15371 words

187.    Security update
 Control Engineering, November 1, 2005, DEPARTMENTS; Editorial; Pg.
2, 482  words, By David Greenfield, Editorial Director

188.    Verano Announces Second Generation Industrial Defender(R) SCADA
Cybersecurity Solution;  Enhanced Scalability and Security Agents
Provide Comprehensive Protection, Enable Compliance With NERC CIP
Standards
 PR Newswire, November 1, 2005 Tuesday 1:01 PM GMT, 1084  words

189.    Black Hat Federal 2006 Briefings Begin on January 25th; Dr.
Linton Wells II, Principal Deputy Assistant Secretary of Defense,
Keynotes on Security Research and Vulnerability Disclosure;  Simson
Garfinkel on Hard Drive Forensics, David Aitel and Billy Hoffmann on
Worm Writing, Joanna Rutkowska and John Heasman on Advanced Rootkits,
Robert Graham on SCADA Systems, Halvar Flake on Exploiting a New
Vulnerability Class, and David Litchfield on New Oracle
Vulnerabilities and Fixes
 PR Newswire, January 18, 2006 Wednesday 11:31 PM GMT, 790  words

190.    Key U.S. systems vulnerable to hacking, security firm says
 Chattanooga Times Free Press (Tennessee), January 26, 2006 Thursday,
WIRE - GENERAL NEWS; Pg. A6, 794 words

191.    Government lab keeps hackers away from control systems
 Manufacturing Business Technology, February 1, 2006, VIEWS FROM THE
FRONT; Plant-Floor Security; Pg. 8, 453  words, By Staff

192.    The Feds Step In
 Government Security, February 1, 2006, Pg. 18, 2081  words, By Michael Fickes

193.    SCADA systems at risk for attacks
 Mobile Radio Technology, February 1, 2006, NEWS; Pg. 8, 785  words,
BY GLENN BISCHOFF

194.    Confab to examine security of utility, other control systems
 Network World, February 27, 2006, NEWS; Pg. 10, 423 words, Cara Garretson

195.    REP. REICHERT RECEIVES SECURITY LEADERSHIP AWARD FOR HEARING RESULTS
 US Fed News, March 8, 2006 Wednesday 5:31 AM  EST, 442  words, US Fed News

196.    Tier-3: Australian defence systems protected by Tier-3; Tier-3
launches Huntsman Threat Management Technology capable of managing
both known and unknown threats
 M2 Presswire, April 24, 2006, 1093 words

197.    Evaluation: Control System Security Software;  Major
fossil-fueled power plant cannot afford control interruptions due to
security breaches or system glitches.
 Control Engineering, May 1, 2006, FEATURES; Inside Process; Pg.
IP15, 780  words, Ron Derynck.  Ron Derynck is director of product
strategies at Verano Inc.

198.    Green Hills Software Announces Landmark POSIX Certification;
INTEGRITY Workstation First Desktop and Enterprise Class System to Be
Certified POSIX.1 Conformant Under the IEEE and The Open Group
POSIX(R) Certification Program
 Market Wire, May 1, 2006 Monday 5:00 AM GMT, 1082 words

199.    The future starts here ...
 PACE (Process & Control Engineering) (Australia), May 2006, 5008 words

200.    Science&Technology: The enemy within;  Could a ruthless new breed
of cyber-terrorist cause meltdown at the click of a mouse? Jimmy Lee
Shreeve reports
 The Independent (London), May 31, 2006 Wednesday, FEATURES; Pg. 8,
1632 words, Jimmy Lee Shreeve

201.    TECHNOLOGY ENEMY WITHIN
 The Statesman (India), June 5, 2006 Monday, 1480 words

202.    Top Cyber Security Post Still Unfilled After a Year
 TechNews, July 12, 2006 Wednesday 3:54 AM GMT, TECHNOLOGY; Special;
08, 1193 words, By Brian Krebs, washingtonpost.com Staff Writer

203.    Top Cyber Security Post Still Unfilled After a Year
 Washingtonpost.com, July 12, 2006 Wednesday 4:40 PM EST, TECHNOLOGY,
1193 words, Brian Krebs, washingtonpost.com Staff Writer,
washingtonpost.com

204.    Top Cyber Security Post Still Unfilled After a Year
 TechNews, 1216 words, Brian Krebs; washingtonpostcom Staff Writer

205.    Scientists teaching power grid, dam operators how to thwart hackers
 The Associated Press State & Local Wire, July 19, 2006 Wednesday
7:38 AM GMT, STATE AND REGIONAL, 335 words, By CHRISTOPHER SMITH,
Associated Press Writer

206.    Agencies to Teach Cybersecurity Protection
 Associated Press Online, July 19, 2006 Wednesday 9:57 PM GMT,
BUSINESS NEWS, 267 words, By CHRISTOPHER SMITH, Associated Press
Writer

207.    Agencies to teach cybersecurity protection
 AFX International Focus, July 19, 2006 Wednesday 11:13 PM GMT, 292 words

208.    Agencies to teach cybersecurity protection
 AFX.COM, July 19, 2006 Wednesday 11:13 PM GMT, 292 words

209.    Agencies to teach cybersecurity protection
 AFX - Asia, July 19, 2006 Wednesday 10:58 PM GMT, 292 words

210.    TECHBITS: AI anniversary, Blog survey, Kids game, AIM for
business, Cybersecurity
 The Associated Press, July 19, 2006 Wednesday 9:23 PM GMT, BUSINESS
NEWS, 1512 words, By The Associated Press

211.    TECHBITS: AI anniversary, Blog survey, Kids game, AIM for
business, Cybersecurity
 Associated Press Financial Wire, July 19, 2006 Wednesday 9:24 PM
GMT, BUSINESS NEWS, 1512 words, By The Associated Press

212.    What happens when the Net is attacked?;  That's the question an
obscure Homeland Security project is attempting to answer. So far, so
good.
 Government Computer News, July 24, 2006 Monday, TECH-REPORT, 1856
words, William Jackson, GCN Staff

213.    CYBER SECURITY ISSUES
 CQ Congressional Testimony, July 28, 2006 Friday, CAPITOL HILL
HEARING TESTIMONY, 3289 words

214.    CYBER SECURITY ISSUES
 CQ Congressional Testimony, July 28, 2006 Friday, CAPITOL HILL
HEARING TESTIMONY, 3290 words

215.    Is Your Cyberterrorism Prevention Effort Missing the Mark?
 Security Director's Report, August 2006, CORPORATE SECURITY, 2136  words

216.    Control Systems Can't Hide from Hackers, Don't Ruffle Researchers
 WASHINGTON INTERNET DAILY, August 23, 2006 Wednesday, TODAY'S NEWS, 772  words

217.    Paller: Government cybersecurity gets an F
 InfoWorld, September 11, 2006 Monday, BREAKING NEWS, 692 words

218.    FUTURE OF DHS CYBER AND TELECOMMUNICATIONS SECURITY
 CQ Congressional Testimony, September 13, 2006 Wednesday, CAPITOL
HILL HEARING TESTIMONY, 3277 words

219.    SECURITY LACKING IN NETWORKS CONTROLLING CRITICAL INFRASTRUCTURE
 Cox News Service, September 28, 2006 Thursday, Financial Pages, 2133 words

220.    IDAHO LAB A PRIME DEFENDER OF NATION'S SCADA NETWORKS
 Cox News Service, September 28, 2006 Thursday, Financial Pages, 588 words

221.    With SCADA. <PUB>Cox News Service</PUB>
 Cox News Service, September 28, 2006 Thursday, Financial Pages, 157 words

222.    With SCADA. <PUB>Cox News Service</PUB>
 Cox News Service, September 28, 2006 Thursday, Financial Pages, 229 words

223.    Federal security rules fueling energy company anxiety;  SCADA
systems seen as vulnerable to cyberattack.
 Network World, September 28, 2006, Pg. 1, 1121 words, Ellen Messmer

224.    Eds: Corrects number in third section from 24 to 17 percent.
 Cox News Service, September 29, 2006 Friday, Financial Pages, 157 words

225.    Computer networks control America's electricity infrastructure,
its nuclear power plants, its pipelines and many other functions. But
because the networks have exposure to the Internet, it makes them ...
VULNERABLE TO HACKER ATTACKS
 The Atlanta Journal-Constitution, October 1, 2006 Sunday, BUSINESS;
Pg. 1G, 1964 words, BOB KEEFE; Cox Washington Bureau

226.     Cox News Service, October 1, 2006 Sunday, Domestic;
Non-Washington; General News Item, 1692 words, BOB KEEFE

227.    Idaho lab in security race;  Hardware suppliers can test the
safety of equipment
 The Atlanta Journal-Constitution, October 1, 2006 Sunday, BUSINESS;
Pg. 5G, 497 words, BOB KEEFE; Cox Washington Bureau

228.    Next attack could be silent, digital
 Austin American-Statesman (Texas), October 2, 2006 Monday, NEWS; Pg.
A01, 2021 words, Bob Keefe WEST COAST BUREAU

229.    Government offers companies expert hacker advice
 Austin American-Statesman (Texas), October 2, 2006 Monday, NEWS; Pg.
A09, 574 words, Bob Keefe WEST COAST BUREAU

230.    NUCLEAR SAFETY: U.S. plant computer systems vulnerable to
hackers, experts say
 Greenwire, October 2, 2006 Monday, Security, 367 words

231.    Workshops identify threats to process control systems
 Oil & Gas Journal, October 9, 2006, PROCESSING; SPECIAL Report; Pg.
44, 4446 words, Annie McIntyre, Sandia National Laboratories
Albuquerque.  Annie McIntyre is a senior member of the technical staff
at Sandia National Laboratories, Albuquerque. In the Networked Systems
Survivability organization, her primary areas of research include
threats, vulnerabilities, and protection of critical infrastructure
under the I3P program and leading security metrics efforts under the
National SCADA Test Bed. Previous to this, McIntyre worked extensively
in the defense sector on information warfare and survivability,
serving as IO Laboratory Chief and Information Warfare Lead for Future
Combat Systems Assessments at the Army Research Laboratory. She
previously served as New Mexico Regional Manager for Concurrent
Technologies Corp. and performed systems analysis and engineering
under the Human Genome Project. She holds a BS from New Mexico Tech,
an MS from Troy State University, and is a member of AAPG.; Jason
Stamp, Sandia National Laboratories Albuquerque.  Jason Stamp is a
principal member of the technical staff at Sandia National
Laboratories, where he has more than 7 years' experience in the field
of information systems and national security. His research areas
include the development of improved tools for information security and
the integration of network technology into security architectures for
infrastructure, homeland security, and the military. Stamp holds a BS
(1995) in electrical engineering from the Rose-Hulman Institute of
Technology, Terre Haute, Ind., and a PhD (1998) in electrical
engineering from Clemson University. Jason is a member of the Power
Engineering Society of IEEE.; Ben Cook, Sandia National Laboratories
Albuquerque.  Ben Cook is a principal member of the technical staff at
Sandia National Laboratories. He currently leads research efforts on
robust critical infrastructure systems and supports the management of
Sandia's process control research and development. Cook is the
technical project leader for the I3P's process control security
research program, and Sandia's project lead on the DHS LOGIIC project.
His technical background is in modeling and simulation with an
emphasis on large-scale natural and engineered systems. Cook holds a
ScD in information technology from the Massachusetts Institute of
Technology.; Andrew Lanzone, Sandia National Laboratories Albuquerque.
 Andrew Lanzone is a senior member of the technical staff at Sandia
National Laboratories. He has several years experience in both
cryptographic research and applied cryptography with an emphasis on
algorithm development and software programming. Lanzone spent several
years designing and analyzing cryptographic protocols and digital
security systems. He holds a BS in electrical engineering from Grove
City College, Pa., and a Masters of computer science and engineering
from the University of Michigan.

232.    LOGIIC HELPS KEEP OIL, GAS CONTROL SYSTEMS SAFE
 US Fed News, October 9, 2006 Monday 3:44 AM  EST, 642  words, US Fed News

233.    Verano Expands Worldwide Distribution Network for Industrial Defender(R)
 MediaNet Press Release Wire, October 17, 2006 Tuesday 10:02 PM AEST,
938  words

234.    VERANO EXPANDS WORLDWIDE DISTRIBUTION NETWORK
 Asia Pulse, October 18, 2006 Wednesday 1:39 PM EST, NATIONWIDE
INTERNATIONAL NEWS, 924 words

235.    United Kingdom: Be Vigilant Against Identity Theft
 Mondaq Business Briefing, November 22, 2006, 6307 words

236.    Applied Watch Technologies - President & CEO Inter
 Fox News Network, December 4, 2006 Monday, BUSINESS, 554  words, Neil Cavuto

237.    DHS, industry use LOGIIC to combat cyberthreats;  Joint exercise
focuses on protecting systems at oil and gas facilities
 Government Computer News, December 11, 2006 Monday, NEWS, 966 words,
Kerri Hostetler, GCN Staff

238.    Enterprise security measures may heighten vulnerability of
plant-floor solutions
 Manufacturing Business Technology, January 1, 2007, INTEGRATION AND
INFRASTRUCTURE; Cyber Threat Management; Pg. 50, 646  words, By Staff

239.    THREAT ASSESSMENT
 CQ Congressional Testimony, January 11, 2007 Thursday, CAPITOL HILL
HEARING TESTIMONY, 3569 words

240.    CYBER SECURITY - PLANT SAFETY;  Beating the hackers
 Process Engineering, February 5, 2007, Pg. 21, 1150  words

241.    Pexx Brings a Heightened Level of Awareness With Wireless;  A
Better "Sense" of the World Around Us
 Market Wire, February 8, 2007 Thursday 6:00 AM GMT, 1624 words

242.    Two new terror threats: Proposed Vancouver system puts city at
risk of attack, according to police
 The Vancouver Sun (British Columbia), February 14, 2007 Wednesday,
NEWS; Pg. A1 , 1080  words, Randy Shore, Vancouver Sun; with a file
from CanWest News Service

243.    Games wireless plan flawed
 The Calgary Herald (Alberta), February 14, 2007 Wednesday, NEWS; Pg.
A3, 255  words, Randy Shore, CanWest News Service

244.    WiFi could post threat during Vancouver Olympics: police expert
 Prince Rupert Daily News (British Columbia), February 15, 2007
Thursday, NEWS; Pg. 7, 506  words, Randy Shore, CanWest News Service

245.    10 Control System Security Threats;  Based on work done by the
North American Electric Reliability Corp., these control system
vulnerabilities are the place to start to prevent a security breach.
 Control Engineering, April 1, 2007, FEATURES; Cover Story; Pg. 38,
3398  words, Peter Welander, Control Engineering.  Peter Welander is
process industries editor. Reach him at
peter.welander@...dbusiness.com .

246.    CYBER INSECURITY
 CQ Congressional Testimony, April 19, 2007 Thursday, CAPITOL HILL
HEARING TESTIMONY, 3077 words

247.    Convergence of physical and IT security is becoming a necessity
 Government Computer News, May 9, 2007 Wednesday, DAILY-UPDATES, 481
words, William Jackson, GCN Daily Updates

248.    Verano Relaunches as Industrial Defender Inc. to Fight Increasing
Global Security Threats to Critical Infrastructures;  Company
Introduces World's First Integrated Industrial Cyber Security Solution
with the Launch of its Co-Managed Security Services (CMSS) Offering
 PR Newswire US, May 15, 2007 Tuesday 12:00 PM GMT, 1053 words

249.    FOREIGN OWNERSHIP OF INFRASTRUCTURE
 CQ Congressional Testimony, May 16, 2007 Wednesday, CAPITOL HILL
HEARING TESTIMONY, 1819 words

250.    Ten Control System security threats
 PACE (Process & Control Engineering) (Australia), June 2007, Pg. 18,
3299  words

251.    RWE boosts security on Scada networks
 Computer Weekly, June 19, 2007, NEWS, 454  words

252.    From ID To IP Theft
 Industry Week, July 2007, INFORMATION TECHNOLOGY; Pg. 49, 434 words,
BY BRAD KENNEY

253.    Hacker shows flaw in software that controls key infrastructure
 Associated Press Financial Wire, August 5, 2007 Sunday 1:20 AM GMT,
BUSINESS NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer

254.    Hacker shows flaw in software that controls key infrastructure
 The Associated Press, August 5, 2007 Sunday 1:20 AM GMT, BUSINESS
NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer

255.    Hacker shows flaw in software that controls key infrastructure
 Associated Press Financial Wire, August 5, 2007 Sunday 12:22 AM GMT,
STATE AND REGIONAL, 681 words, By JORDAN ROBERTSON, AP Technology
Writer

256.    Hacker shows flaw in software that controls key infrastructure
 The Associated Press State & Local Wire, August 5, 2007 Sunday 12:22
AM GMT, STATE AND REGIONAL, 681 words, By JORDAN ROBERTSON, AP
Technology Writer

257.    Researcher: Flaw Exposes Hack Threat
 Associated Press Financial Wire, August 5, 2007 Sunday 8:01 AM GMT,
BUSINESS NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer

258.    Researcher: Flaw Exposes Hack Threat
 Associated Press Financial Wire, August 5, 2007 Sunday 8:01 AM GMT,
BUSINESS NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer

259.    Flaw Shown in Infrastructure Software
 Associated Press Financial Wire, August 5, 2007 Sunday 1:20 AM GMT,
BUSINESS NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer

260.    Researcher: Flaw Exposes Hack Threat
 Associated Press Online, August 5, 2007 Sunday 1:58 AM GMT, BUSINESS
NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer

261.    Researcher: Flaw Exposes Hack Threat
 Associated Press Online, August 5, 2007 Sunday 8:01 AM GMT, BUSINESS
NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer

262.    Fred Thompson Enters GOP Race; John Walsh Weighs in on Fight
Against Child Molesters; Hillary Clinton Blocking 9/11 DVD Release
 CNN, September 6, 2007 Thursday, NEWS; Domestic, 7079  words, Glenn Beck

263.    MULTIPLE EFFORTS TO SECURE CONTROL SYSTEMS ARE UNDER WAY, BUT
CHALLENGES REMAIN
 GAO Reports, September 10, 2007, GAO REPORT, 8864 words

264.    Authority eyes $320K in security improvements
 Chambersburg Public Opinion (Pennsylvania), October 11, 2007
Thursday, LOCAL, 617 words, By ADAM KULIKOWSKI Staff writer

265.    SECURITY OF THE ELECTRIC GRID
 CQ Congressional Testimony, October 17, 2007 Wednesday, CAPITOL HILL
HEARING TESTIMONY, 3961 words

266.    SECURITY OF THE ELECTRIC GRID
 CQ Congressional Testimony, October 17, 2007 Wednesday, CAPITOL HILL
HEARING TESTIMONY, 7029 words

267.    New U.S. tack to defend power grid
 Christian Science Monitor, October 30, 2007, Tuesday, USA; Pg. 1,
1297 words, Mark Clayton Staff writer of The Christian Science Monitor

268.    Security
 Control Engineering, November 1, 2007, SUPPLEMENTS; The Risk That
Cannot Be Ignored; Pg. 1, 526  words, Staff

269.    Taking steps to secure your process control system
 Control Engineering, November 1, 2007, SUPPLEMENTS; The Risk That
Cannot Be Ignored; Pg. 1, 612  words, Staff

270.    Cyber Risk Assessment;  The process of plotting an appropriate
cyber security strategy must begin with an analysis of where you are
now.
 Control Engineering, November 1, 2007, SUPPLEMENTS; Cyber Security;
Pg. 11, 972  words, Todd Nicholson, Industrial Defender.  Todd
Nicholson is chief marketing officer, Industrial Defender Inc. Reach
him at tnicholson@...ustrialdefender.com .

271.    Experts worry hackers will endanger economy
 Newhouse News Service, December 26, 2007 Wednesday 3:09 PM EST,
DOMESTIC, 816 words, By GARRY LENTON

272.    CYBERTERRORISM / COMPUTER HACKERS PUT THE NATION'S ECONOMY AT
RISK // GUARDING AGAINST HIGH-TECH TERRORISM
 Patriot News (Harrisburg, Pennsylvania), December 26, 2007
Wednesday, A SECTION; Pg. A01, 844 words, GARRY LENTON, Of The
Patriot-News

273.    Hackers may threaten economy;  Without better security, nation's
industries could lose billions, experts warn
 The Houston Chronicle, December 27, 2007 Thursday, A; Pg. 8, 804
words, GARRY LENTON, Newhouse News Service

274.    LESSONS LEARNED: AURORA ATTACK; Test gets major media hype, but
SCADA vulnerabilities remain
 PUBLIC UTILITIES FORTNIGHTLY, January, 2008, SECTION; Pg. 41, 1213
words, BY LORI A. BURKHART; Lori Burkhart is managing editor of Public
Utilities Fortnightly. Email her at lab@....com

275.    SMART-GRID SECURITY; Intelligent power grids present vexing cyber
security problems
 PUBLIC UTILITIES FORTNIGHTLY, January, 2008, SECTION; Pg. 43, 1238
words, BY MICHAEL T. BURR; Michael T. Burr is editor-in-chief of
Public Utilities Fortnightly. Email him at burr@....com

276.    CIA says hackers brought down power grid
 UPI Energy, January 18, 2008 Friday 7:58 PM EST, 393 words

277.    Hackers Are Going After Power Grids [Outage]
 Gizmodo, January 19, 2008 Saturday 5:30 PM EST, 198 words

278.    Hackers Take Control of Your Electricity and Water [Hacking]
 io9, January 22, 2008 Tuesday 8:00 PM EST, 260 words

279.    Cyber extortionists switch off the lights
 The Australian Financial Review, January 22, 2008 Tuesday, ABIX NEWS
SUMMARIES; Pg. 47, 130 words, Julian Bajkowski

280.    Which Candidate Has Best Economic Plan?; Did Over-Medication
Cause Heath Ledger`s Death?; Author Says Looks Matter for Presidential
Candidates
 CNN, January 23, 2008 Wednesday, NEWS; Domestic, 7626  words, Glenn Beck

281.    Tier-3: Tier-3 says hackers hijacking power grids to extort
ransom is worrying trend
 M2 Presswire, January 24, 2008, 486 words

282.    Does Race Matter in `08?; Did Over-Medication Cause Heath
Ledger`s Death?; Sean Penn at Odds with San Francisco Paper
 CNN, January 25, 2008 Friday, NEWS; Domestic, 7348  words, Glenn Beck

283.     Computer Weekly, January 29, 2008, NEWS, 247 words, Ian Grant

284.     Computer Weekly, January 29, 2008, NEWS, 248  words, Ian Grant

285.    Security Experts Announce New East Coast Computer Security
Conference - SOURCE 2008;  Famed L0pht hackers and top security
executives to discuss state of security industry and share best
practices in intimate setting
 PR Newswire, January 31, 2008 Thursday 10:57 PM GMT, 620 words

286.    Change default credentials
 SC (Secure Computing) Magazine, February 1, 2008, Pg. 17, 686
words, Ken Munro

287.    Cyber rules guard grid
 ELECTRONIC ENGINEERING TIMES, February 4, 2008, BUSINESS; Pg. 25,
991  words, Sheila Riley

288.    Quantifying Cyber Security Risk;  Part 1: Basic risk analysis
techniques can help you understand the cyber threats to industrial
control systems and SCADA systems overseeing electric utility
distribution. This step will help as you begin planning a defensive
strategy.
 Control Engineering, March 1, 2008, FEATURES; Inside Process; Pg.
IP12, 2000  words, Morgan Henrie, University of Alaska; Paul Liddell,
Alyeska Pipeline Service.  M. Henrie is a research assistant professor
of logistics at the University of Alaska, Anchorage. Reach him at
afmeh1@....alaska.edu . P. Liddell is SCADA supervisor at Alyeska
Pipeline Service Co. Reach him at liddellp@...eska-pipeline.com .

289.    Arab countries at threat from potential disruption to their
logistics, utility and oil and gas networks
 Middle East Company News Wire, March 25, 2008 Tuesday 9:20 AM GMT, 669  words

290.     Hydrocarbon Processing, April 2008 , HPINNOVATIONS, 4039 words

291.    As Cellular Carriers Cap Unlimited Data Plans, Proxicast
Introduces Cell-Sentry Cost Control and Bandwidth Management
Capabilities for its 3G Cellular Routers
 Product News Network, April 3, 2008 Thursday 7:36 AM GMT, 1196 words

292.    Slaying the hackers;  Columns
 The Age (Melbourne, Australia), April 15, 2008 Tuesday, COMPUTERS;
Next; Pg. 7, 659 words, Penelope Debelle

293.    Frost & Sullivan Acknowledges Industrial Defender as Market
Leader in Critical Infrastructure Cyber Security Protection;
Industrial Defender Selected as Frost & Sullivan Company of the Year
for Global Risk Management in Process Control and SCADA
 Market Wire, April 16, 2008 Wednesday 5:30 AM GMT, 760 words

294.    Homeland Security's Electric Grid Focus Could Drive NERC Revisions
 EnergyWashington Week, April 16, 2008, 880  words

295.    Frost & Sullivan Recognizes Industrial Defender's Leadership of
Critical Infrastructure Cyber Security Protection Markets
 Business Wire, April 16, 2008 Wednesday 11:45 AM GMT, 1082 words

296.    In cyberspace they can't hear you scream;  The essay
 Sydney Morning Herald (Australia), April 19, 2008 Saturday, NEWS AND
FEATURES; News Review; Pg. 29, 1836 words, Tom Allard

297.    Terror's new frontier: cyberspace;  SECURITY
 The Age (Melbourne, Australia), April 19, 2008 Saturday, INSIGHT;
Pg. 4, 1662 words, Tom Allard - Tom Allard is a Fairfax reporter

298.    Quantifying Cyber Security Risk;  Part 2: Understanding cyber
incidents and their severity can help you plot a strategy to prevent
them.
 Control Engineering, May 1, 2008, FEATURES; Inside Process; Pg. P12,
1393  words, Morgan Henrie, University of Alaska; Paul Liddell,
Alyeska Pipeline Service.  Morgan Henrie is a research assistant
professor of logistics at the University of Alaska, Anchorage. Reach
him at afmeh1@....alaska.edu . Paul Liddell is SCADA supervisor at
Alyeska Pipeline Service Co. Reach him at
liddellp@...eska-pipeline.com .

299.    Cyber Security: Are We Doing Enough?
 Electric Light & Power, May 2008 - June 2008, INDUSTRY REPORT; Pg.
20, 2414 words, by Nancy Spring, managing editor

300.    Power plants open to hacker attack;  A software package widely
used to automate power stations and production lines has a serious
security vulnerability
 New Scientist, May 17, 2008, TECHNOLOGY; News; Pg. 25, 126  words, Staff

301.    PANEL III OF A HEARING OF THE U.S.-CHINA ECONOMIC AND SECURITY
REVIEW COMMISSION;  SUBJECT: CHINA'S PROLIFERATION PRACTICES AND THE
DEVELOPMENT OF ITS CYBER AND SPACE WARFARE CAPABILITIES;  CHAIRED BY:
COMMISSIONER PETER T.R. BROOKES, SENIOR FELLOW FOR NATIONAL SECURITY
AFFAIRS AND DIRECTOR, ASIAN STUDIES CENTER, THE HERITAGE FOUNDATION;
WITNESSES: COLONEL GARY D. MCALUM, DIRECTOR OF OPERATIONS, JOINT TASK
FORCE FOR GLOBAL NETWORK OPERATIONS, UNITED STATES STRATEGIC COMMAND;
TIMOTHY L. THOMAS, ANALYST, THE FOREIGN MILITARY STUDIES OFFICE;
LOCATION: 562 DIRKSEN SENATE OFFICE BUILDING, WASHINGTON, D.C.
 Federal News Service, May 20, 2008 Tuesday, CAPITOL HILL HEARING, 15269 words

302.    HEARING OF THE U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION
(AS RELEASED BY THE USCC);  SUBJECT: CHINA'S PROLIFERATION PRACTICES,
AND THE DEVELOPMENT OF ITS CYBER AND SPACE WARFARE CAPABILITIES;
CHAIRED BY: COMMISSIONERS PETER T.R. BROOKES AND WILLIAM A. REINSCH
(HEARING COCHAIRS);  WITNESSES: PANEL I: CONGRESSIONAL PERSPECTIVES
REPRESENTATIVE ZOE LOFGREN (D-CA) PANEL II: PRC CYBER SPACE
CAPABILITIES BRIGADIER GENERAL JEFFREY C. HORNE, USA; DEPUTY
COMMANDER, JOINT FUNCTIONAL COMPONENT COMMAND FOR SPACE, UNITED STATES
STRATEGIC COMMAND, VANDENBERG AIR FORCE BASE; ASHLEY J. TELLIS, SENIOR
ASSOCIATE, CARNEGIE ENDOWMENT FOR INTERNATIONAL PEACE; WILLIAM B.
SCOTT, FORMER BUREAU CHIEF, AVIATION WEEK & SPACE COAUTHOR: "SPACE
WARS: THE FIRST SIX HOURS OF WORLD WAR III" PANEL III: PRC CYBER SPACE
CAPABILITIES STATEMENT OF COLONEL GARY D. MCALUM, DIRECTOR OF
OPERATIONS, JOINT TASK FORCE FOR GLOBAL NETWORK OPERATIONS, UNITED
STATES STRATEGIC COMMAND; TIMOTHY L. THOMAS, ANALYST, FOREIGN MILITARY
STUDIES OFFICE; JAMES C. MULVENON, CENTER FOR INTELLIGENCE RESEARCH
AND ANALYSIS, DEFENSE GROUP, INC. PANEL IV: ADMINISTRATION
PERSPECTIVES STATEMENT OF MS. PATRICIA MCNERNEY, PRINCIPAL DEPUTY
ASSISTANT SECRETARY OF STATE FOR INTERNATIONAL SECURITY AND
NONPROLIFERATION PANEL IV: DISCUSSION, QUESTIONS AND
ANSWERS.................................... 94 PANEL V: CHINA'S
PROLIFERATION PRACTICES STEPHEN G. RADEMAKER, SENIOR COUNSEL, BGR
HOLDING, LLC; HENRY D. SOKOLSKI, EXECUTIVE DIRECTOR, THE
NONPROLIFERATION POLICY EDUCATION CENTER;  LOCATION: 562 DIRKSEN
SENATE OFFICE BUILDING, WASHINGTON, D.C.
 Federal News Service, May 20, 2008 Tuesday, PRESS CONFERENCE OR
SPEECH, 59704 words

303.    TVA Power Plants Vulnerable to Cyber Attacks, GAO Finds;
Regulators Want Authority to Require Security Upgrades Industry-wide
 Washingtonpost.com, May 21, 2008 Wednesday 12:01 AM EST, 1320 words,
Brian Krebs, washingtonpost.com Staff Writer, washingtonpost.com

304.    Largest public power grid at cyber risk, feds say;  The TVA lacks
basic security measures, U.S. Government Accountability Office says
 Network World, May 21, 2008, 560 words, Tim Greene

305.    TVA NEEDS TO ADDRESS WEAKNESSES IN CONTROL SYSTEMS AND NETWORKS
 GAO Reports, May 21, 2008, GAO REPORT, 16267 words

306.    TERRORISM Hi-tech threat close to home
 The Advertiser (Australia), May 24, 2008 Saturday, MAGAZINE; Pg. 5,
629  words, Anthony Johnson, Miles Kemp

307.    U.S. House Security Panel Frets Over Electric Grid; System Still
Vulnerable; Subcommittee chairman bothered that regulators have had
little progress
 Investor's Business Daily, May 28, 2008 Wednesday, INTERNET &
TECHNOLOGY; Q & A; Pg. A04, 766 words, DONNA HOWELL

308.    U.S. House Security Panel Frets Over Electric Grid System Still
Vulnerable Subcommittee chairman bothered that regulators have had
little progress
 Investor's Business Daily, May 28, 2008 Wednesday, A; Q AND A; Pg.
A04, 766 words, DONNA HOWELL

309.    Features
 Power Magazine, June 2008, GRID SECURITY; Pg. 40, 2298 words, By
Andrew Bartels, Aegis Technologies Inc.

310.    RISK ASSESSMENT: New Data Focuses on Handling Linked Security Breaches
 Security Director's Report, June 2008, CORPORATE SECURITY, 1593  words

311.    Cyber Incident Blamed for Nuclear Power Plant Shutdown
 Washingtonpost.com, June 5, 2008 Thursday 1:46 PM EST, 1255 words,
Brian Krebs, washingtonpost.com Staff Writer, washingtonpost.com

312.    Utilities vulnerable to hackers, experts say
 CNN.com, June 11, 2008 Wednesday 10:36 AM EST, TECHNOLOGY, 581 words

313.    Security hole exposes utilities to Internet attack
 The Associated Press, June 11, 2008 Wednesday 8:32 AM GMT, BUSINESS
NEWS, 580 words, By JORDAN ROBERTSON, AP Technology Writer

314.    Security hole exposes utilities to Internet attack
 The Associated Press, June 11, 2008 Wednesday 11:48 AM GMT, BUSINESS
NEWS, 580 words, By JORDAN ROBERTSON, AP Technology Writer

315.    Security hole exposes utilities to Internet attack
 Associated Press Financial Wire, June 11, 2008 Wednesday 11:48 AM
GMT, BUSINESS NEWS, 580 words, By JORDAN ROBERTSON, AP Technology
Writer

316.    Security hole exposes utilities to Internet attack
 Associated Press Financial Wire, June 11, 2008 Wednesday 8:32 AM
GMT, BUSINESS NEWS, 580 words, By JORDAN ROBERTSON, AP Technology
Writer

317.    Security hole exposes utilities to Internet attack
 Associated Press Online, June 11, 2008 Wednesday 8:54 AM GMT,
BUSINESS NEWS, 580 words, By JORDAN ROBERTSON, AP Technology Writer

318.    Security hole exposes utilities to Internet attack
 Associated Press Online, June 11, 2008 Wednesday 11:48 AM GMT,
BUSINESS NEWS, 580 words, By JORDAN ROBERTSON, AP Technology Writer

319.    Software security hole shows utilities and other infrastructure
vulnerable to hacking
 Associated Press Worldstream, June 11, 2008 Wednesday 9:17 AM GMT,
INTERNATIONAL NEWS, 584 words, By JORDAN ROBERTSON, AP Technology
Writer

320.    Better safe than sorry
 Utility Week, June 13, 2008, EARLY SECTION, 1411 words

321.    Top Layer TopResponse Research Team Delivers Protection against
Critical CitectSCADA Buffer Overflow Vulnerability;  Protection Pack
with the Top Layer IPS 5500 Protects against Remote Attacks on SCADA
Systems
 Business Wire, June 23, 2008 Monday 1:52 PM GMT, 649 words

322.    FERC RECEIVES COMMENT OF KENNETH R BASS
 US Fed News, June 23, 2008 Monday 6:22 AM  EST, 723  words, US Fed News

323.    Air Liquide Deploys Top Layer's IPS 5500 Across 100 Sites
Nationwide to Protect Industrial Network;  Air Liquide Turns to IPS
5500 to Protect Industrial Network and SCADA Systems that It Relies on
for Operation of Plant Production Across the U.S.
 Business Wire, June 23, 2008 Monday 1:00 PM GMT, 889 words

324.    Nokia Plans Mobile Software Surge With Open-Source Symbian
 TECHWEB, June 25, 2008 Wednesday 6:08 PM GMT, 2084  words

325.    Top Layer TopResponse Research Team Unveils CitectSCADA Protection Pack
  Wireless News, June 27, 2008 Friday, 232 words

326.    Air Liquide Deploys Top Layer's IPS 5500 Across 100 Sites Nationwide
  Wireless News, June 27, 2008 Friday, 323 words

327.    Air Liquide to Utilize Top Layer's IPS 5500 Intrusion
Prevention Solutions
  Health & Beauty Close-up, June 29, 2008 Sunday, 552  words

328.    NAS Sees Aging Grid Crisis A Threat To U.S. Even Without Terrorism
 EnergyWashington Week, July 8, 2008, 833  words

329.    NAS SEES AGING GRID CRISIS AS THREAT TO U.S. EVEN WITHOUT TERRORISM
 Defense Environment Alert, July 22, 2008, 836  words

330.    Rapid7's Latest NeXpose Release Offers Breakthrough Performance,
Higher Productivity and Improved Compliance for Vulnerability
Assessment Scanning;  Version 4.7 of NeXpose Unified Vulnerability
Management Features Critical Infrastructure Protection, High
Performance Scanning for Large Enterprise Environments and
Vulnerability Exception Reporting
 Business Wire, July 31, 2008 Thursday 12:47 PM GMT, 930 words

331.    Bit9 Announces Application Whitelisting Solution for
Point-of-Sale;  Easiest, most effective way to control and secure POS
systems and kiosks
 PR Newswire, August 6, 2008 Wednesday 6:08 PM GMT, 952 words

332.    Bit9 Announces Application Whitelisting Solution for Point-of-Sale
 Product News Network, August 18, 2008 Monday 7:38 AM GMT, 917 words

333.    Georgia cyberwar overblown
 Network World, August 19, 2008, Pg. 15, 539 words, Andreas M. Antonopoulos

334.    SUBCOMMITTEE ON ENERGY AND AIR QUALITY HEARING, PROTECTING GRID
FROM CYBERSECURITY THREATS.
 States News Service, September 11, 2008 Thursday, 649 words, States
News Service

335.    REP. DINGELL ISSUES STATEMENT ON PROTECTING GRID FROM
CYBERSECURITY THREATS
 US Fed News, September 11, 2008 Thursday 1:21 AM  EST, 650 words, US Fed News

336.    ELECTRIC GRID AND CYBER-SECURITY THREATS
 CQ Congressional Testimony, September 11, 2008 Thursday, CAPITOL HILL
HEARING TESTIMONY, 670 words

337.    ELECTRIC GRID AND CYBER-SECURITY THREATS
 CQ Congressional Testimony, September 11, 2008 Thursday, CAPITOL HILL
HEARING TESTIMONY, 3584 words

338.    WIRELESS;  Attitudes to wireless
 Process Engineering, September 15, 2008, Pg. 29, 1357  words

339.    SCADA Security: Of "Paramount Importance"
 MENA English (Middle East and North Africa Financial Network),
September 23, 2008 Tuesday, 696 words

340.    Paramount launches new division for SCADA and Process Control Security
 Middle East Company News Wire, September 24, 2008 Wednesday 10:20 AM
GMT, 666  words

341.    PARAMOUNT LAUNCHES NEW DIVISION FOR SCADA AND PROCESS CONTROL SECURITY
 AME Info - ME Company Newswire, September 24, 2008 Wednesday, 663 words

342.    Paramount signs deal with Industrial Defender
 The Nation (Pakistan), September 24, 2008 Wednesday, 279 words, OUR
STAFF REPORTER

343.    Paramount signs deal with Industrial Defender
 The Nation (Pakistan), September 24, 2008 Wednesday, NATIONWIDE
INTERNATIONAL NEWS, 279  words

344.     Computer Weekly, October 7, 2008, NEWS, 657 words, Danny
Dresner, National Computing Centre

345.    Supplies Important SCADA-Specific Security Signatures; Provides
Industry-Leading Protection for Critical Infrastructure Networks
 Market News Publishing, October 13, 2008 Monday 5:28 AM PST, 1070 words

346.    Secure Computing Supplies Important SCADA-Specific Security
Signatures; Provides Industry-Leading Protection for Critical
Infrastructure Networks;  Secure Firewall Supplies Strongest Firewall
on the Market to Ensure That SCADA Control Networks Are Fully
Protected
 Market Wire, October 13, 2008 Monday 6:00 AM GMT, 1021 words

347.    Nation's Largest E-Discovery and Digital Forensics Conference to
Feature Speakers from the FBI, US Congress, Georgian Ambassador to the
US, Former KGB Major General, and Leading Government and Private
Sector Cyber Crime Experts
 Business Wire, October 14, 2008 Tuesday 11:00 AM GMT, 652 words

348.    Secure Computing supplies important SCADA-specific security signatures
 Al-Bawaba, October 23, 2008 Thursday 4:57 AM EST, 469  words, By
Al-Bawaba Reporters

349.    Secure Computing supplies important SCADA-specific security signatures
 Albawaba.com, October 23, 2008 Thursday, 582 words

350.    Secure Computing supplies important SCADA-specific security signatures
 Middle East Company News Wire, October 27, 2008 Monday 10:23 AM GMT,
565  words

351.    SECURE COMPUTING SUPPLIES IMPORTANT SCADA-SPECIFIC SECURITY SIGNATURES
 AME Info - ME Company Newswire, October 27, 2008 Monday, 563 words

352.    SECURE COMPUTING USES SCADA-SPECIFIC SECURITY SIGNATURES
 COMPUTER SECURITY UPDATE, November 2008, 715  words

353.    Hackers vs slackers [control security]
 IEE Engineering & Technology, November 2008, Pg. 40, 107  words

354.    No Respect
 Information Security, November 2008, LAYER 8; Pg. 16, 597 words, BY
JAY G. HEISER.  Jay G. Heiser is a London-based research vice
president at Gartner. Send your comments on this column to
feedback@...osecuritymag.com

355.    PR Newswire Summary of Technology Copy, Nov. 3, 2008
 PR Newswire, November 3, 2008 Monday 9:22 PM GMT, 6752 words

356.    Domestic Infrastructure-Critical Vulnerabilities and Protection
discussed at TAG-College
 Al-Bawaba, November 6, 2008 Thursday 8:04 AM EST, 415  words, By
Al-Bawaba Reporters

357.    Domestic Infrastructure-Critical Vulnerabilities and Protection
discussed at TAG-College
 Albawaba.com, November 6, 2008 Thursday, 467 words

358.    DOMESTIC INFRASTRUCTURE-CRITICAL VULNERABILITIES AND PROTECTION
DISCUSSED AT TAG-COLLEGE
 AME Info - ME Company Newswire, November 8, 2008 Saturday, 543 words

359.    Domestic infrastructure-critical vulnerabilities and protection
discussed at TAG-College
 Middle East Company News Wire, November 8, 2008 Saturday 1:51 PM
GMT, 546  words

360.    Green Hills Software Announces Launch of INTEGRITY Global
Security, LLC;  Delivering the World's Most Secure Technology
Solutions
 Marketwire, November 17, 2008 Monday 5:00 AM GMT, 1090 words

361.    Check Point Delivers Total Security for Branch Offices with
Upgrade to UTM-1 Edge Appliances;  Extended Unified Threat Management
Capabilities with New Multi-Layer Messaging Security Deliver Best
All-Inclusive Security Solution
 Business Wire, November 18, 2008 Tuesday 1:30 PM GMT, 967 words

362.    Cyber Security Reaches "Tipping Point" in 2008; Attacks on
Critical Infrastructure Systems and Cyber Warfare Will Increase in
2009;  New VeriSign iDefense Report Looks Back at 2008's Most Serious
Security Threats; Outlines New Trends and Security Disruptors to
Develop in 2009
 Marketwire, December 16, 2008 Tuesday 9:17 AM GMT, 979 words

363.     Associated Press Financial Wire, December 16, 2008 Tuesday 5:17
PM GMT, BUSINESS NEWS, 1041 words

364.    VeriSign iDefense Report: Cyber Security Reaches "Tipping Point" in 2008
  Entertainment Close-up, December 28, 2008 Sunday, 661  words

365.    VeriSign iDefense Report: Cyber Security Reaches "Tipping Point" in 2008
  Wireless News, December 29, 2008 Monday, 661 words

366.    Cyber Security Hits Home;  If you've been wondering if and when
you might be forced to address cyber security issues with your process
control or SCADA systems, watch efforts with electric utilities.
Implementations going on now could serve as models.
 Control Engineering, January 1, 2009, FEATURES; Critical Systems;
Pg. 40, 2551  words, Peter Welander, Control Engineering.  Peter
Welander is process industries editor. Reach him at
peter.welander@...dbusiness.com .

367.    Cyber Security Hits Home.
 Control Engineering, January 1, 2009, Pg. 40, 2663 words

368.    Evolution or Revolution?
 Transmission & Distribution World, January 1, 2009, Pg. 67, 2234
words, By Gene Wolf, Technical Writer

369.    Who goes there?
 Utility Week, January 30, 2009, FEATURES, 1645 words

370.    Who goes there?
 Utility Week, January 30, 2009, FEATURES, 1645 words

371.    Who goes there?
 Utility Week, January 30, 2009, FEATURES, 1645 words

372.    HEARING OF THE SENATE SELECT COMMITTEE ON INTELLIGENCE;  SUBJECT:
CURRENT AND PROJECTED NATIONAL SECURITY THREATS TO THE UNITED STATES;
WITNESS: ADMIRAL DENNIS BLAIR, DIRECTOR OF NATIONAL INTELLIGENCE;
CHAIRED BY: SENATOR DIANNE FEINSTEIN (D-CA);  LOCATION: 216 HART
SENATE OFFICE BUILDING, WASHINGTON, D.C.
 Federal News Service, February 12, 2009 Thursday, CAPITOL HILL
HEARING, 16970 words

373.    SEN. DIANNE FEINSTEIN HOLDS A HEARING ON THE "WORLD THREAT"
 CQ Transcriptions  "All materials herein are protected by United
States copyright law and may not be reproduced, distributed,
transmitted, displayed, published or broadcast without the prior
written permission of CQ Transcriptions. You may not alter or remove
any trademark, copyright or other notice from copies of the content.",
February 12, 2009 Thursday, 17678 words

374.    NEW DNI STRESSES THREAT TO POWER GRID FROM CYBERSPACE
 Inside the Pentagon, February 19, 2009, 677  words

375.    Fighting wars in cyber space;  Cyber attacks are a cheap and easy
way to attack another country, but now the Pentagon is learning how to
fight back
 New Scientist, March 14, 2009, TECHNOLOGY; Feature; Pg. 18-19, 1084
words, Paul Marks

376.    IMPROVING CYBERSECURITY;  COMMITTEE: SENATE COMMERCE, SCIENCE AND
TRANSPORTATION
 CQ Congressional Testimony, March 19, 2009 Thursday, CAPITOL HILL
HEARING TESTIMONY, 6807 words

377.    Fortify Software: Fortify says energy network hacks can be
avoided through the use of code auditing and analysis
 M2 PressWIRE, March 26, 2009 Thursday, 488 words

378.    Major Brands
 Communications Today (Contify.com), March 28, 2009, 20298  words

379.    United States: Government seizes opportunity to build security
into new critical infrastructure
 TendersInfo, March 31, 2009 Tuesday, 427 words, prashant03

380.    United States : Government seizes opportunity to build security
into new critical infrastructure
 TendersInfo, March 31, 2009 Tuesday, 427 words, pinto03

381.    The Transparency of Wireless;  Wireless networking and device
manufacturers have gone to great lengths to create products that are
secure, easy to work with, and operationally indistinguishable from
wired equivalents.
 Control Engineering, April 1, 2009, FEATURES; Cover Story; Pg. 32,
2674  words, Peter Welander, Control Engineering.  Peter Welander is
process industries editor. Reach him at
peter.welander@...dbusiness.com .

382.    Cyberspies have compromised U.S. power grid, newspaper reports;
The intrusions appear to be pervasive, government officials tell The
Wall Street Journal
 Network World, April 8, 2009, 667 words, Grant Gross;  Ellen Messmer

383.    United States: The US electrical grid: How big of a cyber target is it?
 TendersInfo, April 9, 2009 Thursday, 470 words, shiv03

384.    How serious is threat to power grid? Depends who you ask.
 Network World, April 9, 2009, 953 words, Ellen Messmer

385.    Lawmakers Seek to Tighten Cyber Regulation on Power Grids
 Washingtonpost.com, April 29, 2009 Wednesday 3:11 PM EST, 828 words,
Brian Krebs, washingtonpost.com Staff Writer, washingtonpost.com

386.    House Energy and Commerce Subcommittee on Communications,
Technology, and the Internet Hearing;  Cybersecurity: Network Threats
and Policy Challenges;  Testimony by Rodney Joffe, Senior Vice
President and Senior Technologist, Neustar
 Congressional Documents and Publications, May 1, 2009, U.S. HOUSE OF
REPRESENTATIVES DOCUMENTS, 3096  words

387.    INFRASTRUCTURE Is U.S. vulnerable to a cyber attack? THE GRID:
Few facts available in talk of cyber attacks much rhetoric, fewer
facts in debate over likelihood of penetration of America's grid
 The Houston Chronicle, May 3, 2009 Sunday, B; Pg. 10, 1013 words, By
CHRIS BRONK, KEN MEDLOCK and DAN WALLACH

388.    HEARING OF THE SENATE COMMITTEE ON ENERGY AND NATURAL RESOURCES;
SUBJECT: CYBERSECURITY AND CRITICAL ELECTRICITY INFRASTRUCTURE;
CHAIRED BY: SENATOR JEFF BINGAMAN (D-NM);  WITNESSES: MS. PATRICIA
HOFFMAN, ACTING DEPUTY ASSISTANT SECRETARY, OFFICE OF ENERGY, U.S.
DEPARTMENT OF ENERGY; MR. JOSEPH MCCLELLAND, FEDERAL ENERGY REGULATORY
COMMISSION; MR. RICK SERGEL, NORTH AMERICAN ELECTRIC RELIABILITY
COUNCIL; MR. ALLEN MOSHER, AMERICAN PUBLIC POWER ASSOCIATION; MR.
DAVID OWENS, EDISON ELECTRIC INSTITUTE;;  LOCATION: 366 DIRKSEN SENATE
OFFICE BUILDING, WASHINGTON, D.C.
 Federal News Service, May 7, 2009 Thursday, CAPITOL HILL HEARING, 14314 words

389.    Rep. Thompson Introduces Bill Concerning Federal Power Act to
Provide Additional Authorities to Adequately Protect Critical Electric
Infrastructure
 US Fed News, May 8, 2009 Friday 11:14 AM  EST, 2476  words

390.    Defense Department developing portable hacking device for soldiers
 Engadget, May 26, 2009 Tuesday 3:58 PM EST, 211 words,
PRODS@...LOGSINC.COM (Donald Melanson)

391.    The Looming Cybersecurity Emergency Reaction
 Pacific Free Press, May 26, 2009 Tuesday 11:18 AM EST, 2994 words,
Tom Burghardt antifa89202@...il.com

392.    TIP SHEET: GEORGE MASON UNIVERSITY EXPERTS AVAILABLE TO DISCUSS
HEALTH DATA SECURITY/ELECTRONIC MEDICAL RECORDS
 States News Service, June 3, 2009 Wednesday, 1761 words, States News Service

393.    George Mason University Experts Available to Discuss Health Data
Security/Electronic Medical Records
 Targeted News Service, June 3, 2009 Wednesday 8:28 AM  EST, 1707  words

394.    THE CONFLUENCE OF CYBER CRIME AND TERRORISM
 States News Service, June 12, 2009 Friday, 4249 words, States News Service

395.    House Science and Technology Subcommittee on Technology and
Innovation Hearing;  Agency Response to Cyberspace Policy Review;
Testimony by Rep. Lipinski, Daniel - (D-IL);  Agency Response to
Cyberspace Policy Review;  Testimony by Cita Furlani, Director,
Information Technology Laboratory, National Institute of Standards and
Technology (NIST)
 Congressional Documents and Publications, June 16, 2009, U.S. HOUSE
OF REPRESENTATIVES DOCUMENTS, 3877  words

396.    Addressing SIS Cyber Security; Is it First or Last?;  Part 2:
When considering integrated control and safety systems, building a
strong defense is an investment in ensuring business continuity. How
should you implement the concepts?
 Control Engineering, July 1, 2009  Correction Appended, FEATURES;
Inside Process; Pg. P4, 1999  words, Bob Huba and Chuck Miller,
Emerson Process Management.  Bob Huba is a senior product manager for
Emerson Process Management and coordinates security and cyber security
initiatives for DeltaV products. Chuck Miller is the business
development manager for safety instrumented systems for Emerson
Process Management.

397.    Cyber Sentries to Guard Networks
 Intelligence Online, July 2, 2009, GOVERNMENT INTELLIGENCE, 331 words

398.    Cyber Sentries to Guard Networks
 Intelligence Online, July 2, 2009, GOVERNMENT INTELLIGENCE, 331 words

399.    Vital Infrastructure, But Not Hacker-Proof
 Intelligence Online, July 16, 2009, CORPORATE
INTELLIGENCE/TERABYTES, 317 words

400.    Vital Infrastructure, But Not Hacker-Proof
 Intelligence Online, July 16, 2009, CORPORATE
INTELLIGENCE/TERABYTES, 318 words

401.    House Homeland Security Subcommittee on Emerging Threats,
Cybersecurity, and Science and Technology Hearing;  "Securing the
Modern Electric Grid from Physical and Cyber Attacks";  Testimony by
Sean McGurk, Director, Control Systems Security Program National Cyber
Security Division
 Congressional Documents and Publications, July 21, 2009, U.S. HOUSE
OF REPRESENTATIVES DOCUMENTS, 2443  words

402.    House Homeland Security Subcommittee on Emerging Threats,
Cybersecurity, and Science and Technology Hearing;  "Securing the
Modern Electric Grid from Physical and Cyber Attacks";  Testimony by
Mark Fabro, Lofty Perch, Inc.
 Congressional Documents and Publications, July 21, 2009, U.S. HOUSE
OF REPRESENTATIVES DOCUMENTS, 5510  words

403.    REP. YVETTE D. CLARKE HOLDS A HEARING ON SECURING THE MODERN
ELECTRIC GRID FROM PHYSICAL AND CYBER ATTACKS
 CQ Transcriptions  "All materials herein are protected by United
States copyright law and may not be reproduced, distributed,
transmitted, displayed, published or broadcast without the prior
written permission of CQ Transcriptions. You may not alter or remove
any trademark, copyright or other notice from copies of the content.",
July 21, 2009 Tuesday, 23972 words

404.    HEARING OF THE SUBCOMMITTEE ON EMERGING THREATS, CYBERSECURITY,
AND SCIENCE AND TECHNOLOGY OF THE HOUSE HOMELAND SECURITY COMMITTEE;
SUBJECT: SECURING THE MODERN ELECTRIC GRID FROM PHYSICAL AND CYBER
ATTACKS;  CHAIRED BY: REPRESENTATIVE YVETTE D. CLARKE (D-NY) WITNESSES
PANEL I: WILLIAM GRAHAM, CHAIRMAN, COMMISSION TO ASSESS THE TREAT TO
THE UNITED STATES FROM ELECTROMAGNETIC PULSE; MARK FABRO, PRESIDENT
AND CHIEF SECURITY SCIENTIST, LOFTY PERCH; MICHAEL ASSANTE, CHIEF
SECURITY OFFICER, NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION;
STEVE NAUMANN, VICE PRESIDENT OF WHOLESALE MARKETS, REPRESENTING
EDISON ELECTRIC INSTITUTE, ELECTRIC POWER SUPPLY ASSOCIATION; PANEL
II: JOE MCCLELLAND, DIRECTOR OF RELIABILITY, FEDERAL ENERGY REGULATORY
COMMISSION; PATRICIA HOFFMAN, ACTING ASSISTANT SECRETARY, OFFICE OF
ELECTRICITY DELIVERY AND ENERGY RELIABILITY; SEAN MCGURK, DIRECTOR,
CONTROL SYSTEMS SECURITY PROGRAM, DEPARTMENT OF HOMELAND SECURITY;
CITA FURLANI, DIRECTOR, INFORMATION TECHNOLOGY LABORATORY, NATIONAL
INSTITUTE OF STANDARDS AND TECHNOLOGY;  LOCATION: 311 CANNON HOUSE
OFFICE BUILDING, WASHINGTON, D.C.
 Federal News Service, July 21, 2009 Tuesday, 23888 words

405.    UNIVERSITY OF HOUSTON'S INFORMATION SECURITY PROGRAM EARNS
IMPORTANT DESIGNATION FROM NSA, DHS
 US Fed News, July 31, 2009 Friday 4:33 PM  EST, 1147  words

406.    Codenomicon DEFENSICS for XML Finds Multiple Critical Security
Issues in XML Libraries
 Business Wire, August 5, 2009 Wednesday 5:19 PM GMT, 861 words

407.    CODENOMICON LTD;  Codenomicon DEFENSICS for XML Finds Multiple
Critical Security Issues in XML Libraries
 Network Business Weekly, August 17, 2009, EXPANDED REPORTING; Pg.
23, 925  words

408.    CODENOMICON LTD;  Codenomicon DEFENSICS for XML Finds Multiple
Critical Security Issues in XML Libraries
 Network Weekly News, August 17, 2009, EXPANDED REPORTING; Pg. 37, 923  words

409.    CODENOMICON LTD;  Codenomicon DEFENSICS for XML Finds Multiple
Critical Security Issues in XML Libraries
 Internet, Networks & Communications, August 17, 2009, EXPANDED
REPORTING; Pg. 25, 928  words

410.    CODENOMICON LTD;  Codenomicon DEFENSICS for XML Finds Multiple
Critical Security Issues in XML Libraries
 Computers, Networks & Communications, August 20, 2009, EXPANDED
REPORTING; Pg. 172, 929  words

411.    CODENOMICON LTD;  Codenomicon DEFENSICS for XML Finds Multiple
Critical Security Issues in XML Libraries
 Computer Weekly News, August 20, 2009, EXPANDED REPORTING; Pg. 96, 924  words

412.    CODENOMICON LTD;  Codenomicon DEFENSICS for XML Finds Multiple
Critical Security Issues in XML Libraries
 Computer Business Week, August 20, 2009, EXPANDED REPORTING; Pg. 66,
924  words

413.    CODENOMICON LTD;  Codenomicon DEFENSICS for XML Finds Multiple
Critical Security Issues in XML Libraries
 Computer Technology Journal, August 20, 2009, EXPANDED REPORTING;
Pg. 89, 926  words

414.    Codenomicon Releases the First Security Testing Product for XML;
Hacker Halted Booth #308, Miami Hilton Downtown, September 20-25, 2009
 Business Wire, September 22, 2009 Tuesday 4:31 PM GMT, 696 words

415.    ADDRESS TO E-SECURITY FOR GOVERNMENT 2009 CONFERENCE
 States News Service, September 23, 2009 Wednesday, 2069 words,
States News Service

416.    Effective defense requires thorough risk assessment
 Oil & Gas Journal, September 28, 2009, TRANSPORTATION; Pg. 62, 4363
words, Tim Shaw, Cyber SECurity Consulting, Monkton, Md..  William T.
(Tim) Shaw is senior consultant, Cyber SECurity Consulting. In
addition, he has held senior positions at Hathaway Corp., EMC
Controls, Texas Instruments, and Foxboro Corp. Shaw has more than 30
years' experience in industrial automation, including process-plant
automation (DCS and PLC systems), SCADA systems, electrical substation
automation, building automation, and factory automation. He holds a BS
in electrical and computer engineering from University of Michigan; an
MS in engineering science from Loyola College, Baltimore; a PhD in
computer science from Kennedy-Western University; and a CISSP
certification in cyber security from the IS(C)*. He is a senior member
of the Instrument Society of America (ISA) and is also a member of the
IEEE Computer Society.

417.    SCADA system protection requires independent barriers
 Oil & Gas Journal, October 5, 2009, TRANSPORTATION; Pg. 68, 2859
words, Tim Shaw, Cyber SECurity Consulting, Monkton, Md.

418.    CODENOMICON LTD;  Codenomicon Releases the First Security Testing
Product for XML
 Telecommunications Weekly, October 7, 2009, EXPANDED REPORTING; Pg.
232, 745  words

419.    CODENOMICON LTD;  Codenomicon Releases the First Security Testing
Product for XML
 Telecommunications Business, October 7, 2009, EXPANDED REPORTING;
Pg. 232, 746  words

420.    CODENOMICON LTD;  Codenomicon Releases the First Security Testing
Product for XML
 Computer Business Week, October 8, 2009, EXPANDED REPORTING; Pg.
200, 744  words

421.    CODENOMICON LTD;  Codenomicon Releases the First Security Testing
Product for XML
 Computer Technology Journal, October 8, 2009, EXPANDED REPORTING;
Pg. 303, 746  words

422.    CODENOMICON LTD;  Codenomicon Releases the First Security Testing
Product for XML
 Computers, Networks & Communications, October 8, 2009, EXPANDED
REPORTING; Pg. 619, 749  words

423.    CODENOMICON LTD;  Codenomicon Releases the First Security Testing
Product for XML
 Computer Weekly News, October 8, 2009, EXPANDED REPORTING; Pg. 199, 744  words

424.    United States : Codenomicon Releases the First Security Testing
Product for XML
 Tendersinfo News, October 9, 2009 Friday 6:30 PM EST, 411  words

425.    United States : Codenomicon Releases the First Security Testing
Product for XML
 TendersInfo, October 10, 2009 Saturday, 411 words

426.    Ocala-bound tech company likely snags $750K grant
 Ocala Star-Banner (Florida), October 12, 2009 Monday, STATE AND
REGIONAL NEWS, 949 words, Bill Thompson, Ocala Star-Banner, Fla.

427.    IQPC's SCADA & Control Systems Security Summit to Feature
Speakers from NERC, U.S. Dept. of Homeland Security, Pepco Holdings,
Inc.
 Business Wire, October 26, 2009 Monday 5:41 PM GMT, 322 words

428.    New York Public Service Commission Chairman Gary Brown Testifies
Before House Energy and Commerce Subcommittee on Energy and
Environment - Final
 FD (Fair Disclosure) Wire, October 27, 2009 Tuesday, 4984  words

429.    NEW YORK PUBLIC SERVICE COMMISSION CHAIRMAN GARY A. BROWN
PREPARED TESTIMONY BEFORE THE HOUSE ENERGY AND COMMERCE SUBCOMMITTEE
ON ENERGY AND ENVIRONMENT HEARING ON PROTECTING THE ELECTRIC GRID:
H.R. 2165, THE BULK POWER SYSTEM PROTECTION ACT OF 2009, AND H.R.
2195, AS RELEASED BY THE COMMITTEE,  Financial Markets Regulatory Wire
, October 27, 2009 Tuesday, LOAD-DATE: October 27, 2009

430.    House Energy and Commerce Committee, Energy and Environment
Subcommittee Holds a Hearing on Electric Grid Security - Final
 FD (Fair Disclosure) Wire, October 27, 2009 Tuesday, 14718  words

431.    REP. EDWARD J. MARKEY HOLDS A HEARING ON ELECTRIC GRID SECURITY,
CQ Transcriptions , October 27, 2009 Tuesday, COMMITTEE: HOUSE
COMMITTEE ON ENERGY AND COMMERCE, SUBCOMMITTEE ON ENERGY AND
ENVIRONMENT, LOAD-DATE: October 28, 2009

432.    REP. EDWARD J. MARKEY HOLDS A HEARING ON ELECTRIC GRID SECURITY,
Financial Markets Regulatory Wire , October 27, 2009 Tuesday,
COMMITTEE: HOUSE COMMITTEE ON ENERGY AND COMMERCE, SUBCOMMITTEE ON
ENERGY AND ENVIRONMENT, LOAD-DATE: October 28, 2009

433.    HEARING OF THE ENERGY AND THE ENVIRONMENT SUBCOMMITTEE OF THE
HOUSE ENERGY AND COMMERCE COMMITTEE;  SUBJECT: PROTECTING THE ELECTRIC
GRID: H.R. 2165, THE BULK POWER SYSTEM PROTECTION ACT OF 2009, AND
H.R. 2195, A BILL TO AMEND THE FEDERAL POWER ACT TO PROVIDE ADDITIONAL
AUTHORITIES TO ADEQUATELY PROTECT THE CRITICAL ELECTRIC INFRASTRUCTURE
AGAINST CYBER ATTACK;  CHAIRED BY: REPRESENTATIVE EDWARD MARKEY
(D-MA);  WITNESSES: JOSEPH MCCLELLAND, DIRECTOR OF THE FEDERAL ENERGY
REGULATORY COMMISSION'S OFFICE OF ELECTRIC RELIABILITY; PATRICIA
HOFFMAN, PRINCIPAL DEPUTY ASSISTANT SECRETARY IN THE ENERGY
DEPARTMENT'S OFFICE OF ELECTRICITY; GARY BROWN, CHAIRMAN OF THE NEW
YORK PUBLIC SERVICE COMMISSION; DAVID COOK, VICE PRESIDENT AND GENERAL
COUNSEL OF THE NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION; JOHN
DISTASIO, GENERAL MANAGER AND CEO OF THE SACRAMENTO MUNICIPAL UTILITY
DISTRICT;  LOCATION: 2123 RAYBURN HOUSE OFFICE BUILDING, WASHINGTON,
D.C.
 Federal News Service, October 27, 2009 Tuesday, PRESS CONFERENCE OR
SPEECH, 19492 words

434.    IQPC's SCADA & Control Systems Security Summit Details Updates on
Speaker Roster
 Wireless News, October 29, 2009 Thursday, 259  words

435.    Q&A: Why IP is the right choice for Smart Grid;  NIST coordinator
Arnold explains pros, cons of using Internet standards to upgrade the
power grid
 Network World, October 29, 2009, 1598 words, Carolyn Duffy Marsan

436.    IQPC;  IQPC's SCADA & Control Systems Security Summit to Feature
Speakers from NERC, U.S. Dept. of Homeland Security, Pepco Holdings,
Inc.
 Bioterrorism Week, November 9, 2009, EXPANDED REPORTING; Pg. 28, 365  words

437.    IQPC;  IQPC's SCADA & Control Systems Security Summit to Feature
Speakers from NERC, U.S. Dept. of Homeland Security, Pepco Holdings,
Inc.
 Bioterrorism Week, November 9, 2009, EXPANDED REPORTING; Pg. 28, 365  words

438.    Did Hackers Black Out Entire Cities?
 Intelligence Online, November 12, 2009, GOVERNMENT INTELLIGENCE, 92 words

439.    IQPC;  IQPC's SCADA & Control Systems Security Summit to Feature
Speakers from NERC, U.S. Dept. of Homeland Security, Pepco Holdings,
Inc.
 Health Business Week, November 13, 2009, EXPANDED REPORTING; Pg.
724, 366  words

440.    IQPC;  IQPC's SCADA & Control Systems Security Summit to Feature
Speakers from NERC, U.S. Dept. of Homeland Security, Pepco Holdings,
Inc.
 Law & Health Weekly, November 14, 2009, EXPANDED REPORTING; Pg. 862,
366  words

441.    What's the Big Idea: O Canada: Quelling cybersecurity threats
 The Washington Times, December 10, 2009 Thursday, A, NATION; Pg. 4,
820 words, By James Jay Carafano SPECIAL TO THE WASHINGTON TIMES

442.    Siemens Teams With Materials Processing Corp. (MPC) for Secure,
Green Recycling of Control Systems;  Partnership provides best
practice expertise for secure recycling in the United States
 PR Newswire, December 14, 2009 Monday 11:45 AM EST, 687 words

443.    United States : Siemens Teams With Materials Processing Corp.
(MPC) for Secure, Green Recycling of Control Systems
 Tendersinfo News, December 15, 2009 Tuesday 6:30 PM EST, 498  words

444.    Germany : Siemens Teams With Materials Processing Corp. (MPC) for
Secure, Green Recycling of Control Systems
 Tendersinfo News, December 15, 2009 Tuesday 6:30 PM EST, 430  words

445.    United States : Siemens Teams With Materials Processing Corp.
(MPC) for Secure, Green Recycling of Control Systems
 TendersInfo, December 16, 2009 Wednesday, 477 words, prashant03

446.    Germany : Siemens Teams With Materials Processing Corp. (MPC) for
Secure, Green Recycling of Control Systems
 TendersInfo, December 16, 2009 Wednesday, 409 words, datta03

447.    SIEMENS ENERGY, INC.;  Siemens Teams With Materials Processing
Corp. MPC for Secure, Green Recycling of Control Systems
 Electronics Newsweekly, December 30, 2009, EXPANDED REPORTING; Pg.
93, 708  words

448.    SIEMENS ENERGY, INC.;  Siemens Teams With Materials Processing
Corp. MPC for Secure, Green Recycling of Control Systems
 Electronics Business Journal, December 30, 2009, EXPANDED REPORTING;
Pg. 61, 710  words

449.    SIEMENS ENERGY, INC.;  Siemens Teams With Materials Processing
Corp. MPC for Secure, Green Recycling of Control Systems
 Electronics Business Journal, December 30, 2009, EXPANDED REPORTING;
Pg. 61, 710  words

450.    SIEMENS ENERGY, INC.;  Siemens Teams With Materials Processing
Corp. MPC for Secure, Green Recycling of Control Systems
 Electronics Newsweekly, December 30, 2009, EXPANDED REPORTING; Pg.
93, 708  words

451.    SIEMENS ENERGY, INC.;  Siemens Teams With Materials Processing
Corp. MPC for Secure, Green Recycling of Control Systems
 Journal of Technology & Science, January 3, 2010, EXPANDED
REPORTING; Pg. 273, 711  words

452.    Government seizes opportunity to build security into new critical
infrastructure
 Government Computer News, January 13, 2010 Wednesday, 627 words,
William Jackson, Government Computer News

453.    United States : IT RealityString LLC Launches
Anti-Cyberterrorism Campaign
 Tendersinfo News, January 27, 2010 Wednesday 6:30 PM EST, 328  words

454.    United States : IT RealityString LLC Launches
Anti-Cyberterrorism Campaign
 TendersInfo, January 28, 2010 Thursday, 306 words, Mamta03

455.    DDoS attacks, network hacks rampant in oil and gas industry,
other infrastructure sectors;  Oil and gas industry faces the highest
rates of victimization, according to Center for Strategic and
International Studies
 Network World, January 28, 2010, 989 words, Ellen Messmer

456.    Cyber spies and thugs attacking power-water plants
 Agence France Presse -- English, January 29, 2010 Friday 4:11 AM
GMT, 668 words

457.    Reportlinker Adds Smart Grid Cyber Security
 PR Newswire, February 9, 2010 Tuesday 1:08 PM EST, 2293 words

458.    Tip Sheet: George Mason University Experts Available to Discuss
Health Data Security/Electronic Medical Records
 Targeted News Service, February 12, 2010 Friday 6:38 AM  EST, 1707
words, Targeted News Service

459.    SECURITY
 WASHINGTON INTERNET DAILY, February 22, 2010 Monday, SECURITY, 283  words

460.    Security
 WASHINGTON INTERNET DAILY, February 22, 2010 Monday, , 283  words

461.    HEARING OF THE SENATE COMMERCE, SCIENCE, AND TRANSPORTATION
COMMITTEE;  SUBJECT: CYBERSECURITY;  CHAIRED BY: SENATOR JAY
ROCKEFELLER (D-WV);  WITNESSES: VICE ADMIRAL MICHAEL MCCONNELL, USN
(RET.), EXECUTIVE VICE PRESIDENT, NATIONAL SECURITY BUSINESS, BOOZ
ALLEN HAMILTON; JAMES A. LEWIS, DIRECTOR AND SENIOR FELLOW, TECHNOLOGY
AND PUBLIC POLICY PROGRAM, CENTER FOR STRATEGIC AND INTERNATIONAL
STUDIES; SCOTT BORG, DIRECTOR AND CHIEF ECONOMIST, U.S. CYBER
CONSEQUENCES UNIT; REAR ADMIRAL JAMES ARDEN BARNETT, JR., USN (RET.),
CHIEF, PUBLIC SAFETY AND HOMELAND SECURITY BUREAU, FEDERAL
COMMUNICATIONS COMMISSION (FCC); MARY ANN DAVIDSON, CHIEF SECURITY
OFFICER, ORACLE CORPORATION;  LOCATION: 253 RUSSELL SENATE OFFICE
BUILDING, WASHINGTON, D.C.
 Federal News Service, February 23, 2010 Tuesday, CAPITOL HILL
HEARING, 19227 words

462.    Tech apocalypse: Five doomsday scenarios for IT
 InfoWorld Daily News, March 15, 2010 Monday, 3974 words, By Dan
Tynan, InfoWorld.com

463.    Enhancing SCADA and pipeline security
 Pipeline and Gas Technology, April 1, 2010, OPERATIONS, 1118  words, blank

464.    Money trumps security in smart meter rollouts, experts say
 CNET.com, June 15, 2010 Tuesday 7:00 AM EST, 1877 words, Elinor Mills

465.    Intentional EMI leapfrogs modern data center defenses: a look at
defenses against sabotage.
 Mission Critical, July 2010, Pg. 32, 2337 words

466.    Intentional EMI leapfrogs modern data center defenses: a look at
defenses against sabotage.
 Mission Critical, July 2010, Pg. 32, 2337 words

467.    War in the fifth domain;  Cyberwar
 The Economist, July 3, 2010, FRONT BRIEFING, 2888 words

468.    Proof that other countries are planning cyberattacks on the power grid?
 The Volokh Conspiracy, July 18, 2010 Sunday 12:15 PM EST, 827 words,
Stewart Baker

469.    Virus targets Siemens industrial control systems
 CIOL, July 20, 2010 Tuesday 5:05 AM EST, 376  words

470.     Computer Weekly, July 20, 2010, NEWS, 236 words, Warwick Ashford

471.    United States : Windows Exploit and Default Passwords Put
Critical Infrastructure at Risk
 Tendersinfo News, July 20, 2010 Tuesday 6:30 PM EST, 456  words

472.    Windows Exploit and Default Passwords Put Critical Infrastructure
at Risk;  Sophos finds CPLINK Vulnerability "Trivial to Exploit" And
Easy to Adapt for Other Malicious Payloads;  Critical Infrastructure
Caught Exposed by Widely Available Default Passwords and Questionable
Guidance;
 Business Wire, July 20, 2010 Tuesday 5:43 PM GMT, 603 words

473.    United States : Windows Exploit and Default Passwords Put
Critical Infrastructure at Risk
 TendersInfo, July 21, 2010 Wednesday, 435 words, sonu03

474.    United States : Flaw uses USB devices as vector to steal data
 TendersInfo, July 21, 2010 Wednesday, 474 words, roshani03

475.    Microsoft Windows flaw may put critical infrastructure at risk
 Guardian Unlimited, July 22, 2010 Thursday, 459 words, Charles
Arthurguardian.co.uk

476.    Stuxnet spyware targets industrial facilities, via USB memory
stick;  Beware the USB memory stick. Infected sticks are the means by
which a mystery spyware, dubbed Stuxnet, is penetrating control
systems of industrial facilities and utilities around the globe, say
cybersecurity experts.
 The Christian Science Monitor, July 23, 2010 Friday, 1772 words,
Mark Clayton Staff writer

477.    Friday Summary: July 23, 2010
 Securosis, July 23, 2010 Friday 2:12 AM EST, 1422 words

478.    Sophos Provides Free Tool to Protect Against Windows '.LNK'
Zero-Day Vulnerability
 Business Wire, July 26, 2010 Monday 2:55 PM GMT, 545 words

479.     Computer Weekly, July 27, 2010, NEWS, 321 words, Warwick Ashford

480.    Sophos provides free tool against .LNK
 CIOL, July 27, 2010 Tuesday 10:25 AM EST, 305  words

481.    United States : Sophos Blocks Windows Shell Attacks
 Tendersinfo News, July 27, 2010 Tuesday 6:30 PM EST, 400  words

482.    Sophos Blocks Windows Shell Attacks
 TECHWEB, July 27, 2010 Tuesday 1:08 PM GMT, 387  words

483.    Sophos Offers Windows Protection For All But W2K
 Lockergnome Blog Network, July 27, 2010 Tuesday 11:35 PM EST, 1334
words, the oracle

484.    Consultant: Companies running critical infrastructure take months
to patch holes
 FierceCIO, July 28, 2010 Wednesday 4:06 PM EST, 242 words, Caron Carlson

485.    Sophos offers free tool for Windows Shortcut flaw
 Government Computer News, July 28, 2010 Wednesday, 562 words, Kurt
Mackie, Government Computer News

486.    United States : Sophos Blocks Windows Shell Attacks
 TendersInfo, July 28, 2010 Wednesday, 378 words, roshani03

487.    Black Hat shines light on security (roundup)
 CNET.com, July 28, 2010 Wednesday 8:42 PM EST, 531 words, CNET News staff

488.    Black Hat shines light on security (roundup)
 CNET.com, July 29, 2010 Thursday 7:11 PM EST, 819 words, CNET News staff

489.    Black Hat shines light on security (roundup)
 CNET.com, July 29, 2010 Thursday 7:11 PM EST, 668 words, CNET News staff

490.    Black Hat shines light on security (roundup)
 CNET.com, July 29, 2010 Thursday 7:11 PM EST, 719 words, CNET News staff

491.    5 Takeaways From Black Hat 2010
 PC Magazine.com, July 30, 2010 Friday 5:47 PM EST, SECURITY, 482
words, Larry Seltzer

492.    DATA PROTECTION;  Windows Exploit and Default Passwords Put
Critical Infrastructure at Risk
 Information Technology Business, August 3, 2010, EXPANDED REPORTING;
Pg. 63, 625  words

493.    DATA PROTECTION;  Windows Exploit and Default Passwords Put
Critical Infrastructure at Risk
 Information Technology Newsweekly, August 3, 2010, EXPANDED
REPORTING; Pg. 225, 625  words

494.    DATA PROTECTION;  Windows Exploit and Default Passwords Put
Critical Infrastructure at Risk
 Computers, Networks & Communications, August 5, 2010, EXPANDED
REPORTING; Pg. 880, 626  words

495.    Stuxnet 'Zero Day' Worm Not New
 TECHWEB, August 5, 2010 Thursday 12:27 PM GMT, 420  words

496.    Friday Summary: August 6th, 2010
 Securosis, August 6, 2010 Friday 2:26 AM EST, 1612 words

497.    DATA PROTECTION;  Sophos Provides Free Tool to Protect Against
Windows '.LNK' Zero-Day Vulnerability
 Information Technology Newsweekly, August 10, 2010, EXPANDED
REPORTING; Pg. 35, 577  words

498.    DATA PROTECTION;  Sophos Provides Free Tool to Protect Against
Windows '.LNK' Zero-Day Vulnerability
 Information Technology Newsweekly, August 10, 2010, EXPANDED
REPORTING; Pg. 35, 577  words

499.    Revere Security Executive to Speak at Smart Grid Cyber Security
Conference and Expo;  Wireless Security Expert Examines Encryption,
Authentication Technologies
 Business Wire, August 10, 2010 Tuesday 5:50 PM GMT, 581 words

500.    Opinion: IT needs to help secure industrial control systems;
Stuxnet exploit exposed disconnect between IT and operators of
industrial control systems
 Network World, August 13, 2010, 843 words

501.    Dangerous Deals on Automation
 Electrical Marketing, August 13, 2010, Pg. 2, 745 words, Frank Hurtte

502.    Malware Threats Increasing Exponentially, McAfee Report Says
 Defense Daily, August 13, 2010 Friday, 1128  words

503.    Malware Threats Increasing Exponentially, McAfee Report Says
 Terror Response Technology Report, August 18, 2010 Wednesday, 1032  words

504.    REVERE SECURITY;  Revere Security Executive to Speak at Smart
Grid Cyber Security Conference and Expo
 Telecommunications Business, August 25, 2010, EXPANDED REPORTING;
Pg. 80, 609  words

505.    REVERE SECURITY;  Revere Security Executive to Speak at Smart
Grid Cyber Security Conference and Expo
 Telecommunications Weekly, August 25, 2010, EXPANDED REPORTING; Pg.
143, 608  words

506.    REVERE SECURITY;  Revere Security Executive to Speak at Smart
Grid Cyber Security Conference and Expo
 Computers, Networks & Communications, August 26, 2010, EXPANDED
REPORTING; Pg. 503, 612  words

507.    REVERE SECURITY;  Revere Security Executive to Speak at Smart
Grid Cyber Security Conference and Expo
 Computers, Networks & Communications, August 26, 2010, EXPANDED
REPORTING; Pg. 503, 612  words

508.    If this man wanted to blow up Dublin ... he could
 Irish Independent, August 28, 2010 Saturday, ANALYSIS, 1116 words

509.    If this man wanted to blow up Dublin ... he could
 Irish Independent, August 28, 2010 Saturday, ANALYSIS, 1116 words

510.    Work: Crash diet: A working life The computer virus expert: Every
day, Patrick Fitzgerald fights off internet infections, worms, malware
... or even spam zombies. He tells Mark King about the battle against
cyber crime.
 The Guardian (London) - Final Edition, August 28, 2010 Saturday,
GUARDIAN WORK PAGES; Pg. 3, 1640 words, Mark King

511.    Electric power industry as critical infrastructure
 Network World, September 6, 2010, 1108 words, M. E. Kabay

512.    Attacks on power systems: Data leakage, espionage, insider
threats, sabotage
 Network World, September 8, 2010, 1554 words, M. E. Kabay

513.    Questions & Answers Regarding New Echelon Control System Open
Software Platform, Edge Control Node Extensible Hardware, and Duke
Energy
 Business Wire, September 8, 2010 Wednesday 2:15 PM GMT, 5364 words

514.    Cyber security a growing concern in energy sector.
 Canwest News Service, September 10, 2010 Friday 08:02 PM EST, 841
words, Lynn Moore, Postmedia News

515.    Cyber security a growing concern in energy sector
 Canwest News Service, September 10, 2010 Friday 08:02 PM EST, 834
words, Lynn Moore, Postmedia News

516.    Grids under hack alert; As North America's electricity grid moves
toward a "smart grid" system, the cyber spies, thieves or terrorists
determined to attack that grid are sure to get smarter themselves,
industry experts warn
 Canwest News Service, September 10, 2010 Friday 11:00 AM EST, 1144
words, Lynn Moore, Postmedia News

517.    Grids under hack alert
 National Post's Financial Post & FP Investing (Canada), September
11, 2010 Saturday, FINANCIAL POST INVESTING; Pg. FP12, 1138  words,
Lynn Moore, Postmedia News

518.    Guarding the grid; Keeping electrical systems secure is a key
challenge of the energy industry
 Canwest News Service, September 11, 2010 Saturday 10:01 AM EST, 1234
 words, LYNN MOORE, Montreal Gazette; The Gazette

519.    Guarding the grid; Keeping electrical systems secure is a key
challenge of the energy industry
 The Gazette (Montreal), September 11, 2010 Saturday, BUSINESS: WORLD
ENERGY CONGRESS; Pg. C1, 1234  words, LYNN MOORE, The Gazette

520.    Grids under hack alert; As North America's electricity grid moves
toward a "smart grid" system, the cyber spies, thieves or terrorists
determined to attack that grid are sure to get smarter themselves,
industry experts warn
 Canwest News Service, September 12, 2010 Sunday 11:00 AM EST, 1146
words, Lynn Moore, Postmedia News

521.    Grids under hack alert; As North America's electricity grid moves
toward a "smart grid" system, the cyber spies, thieves or terrorists
determined to attack that grid are sure to get smarter themselves,
industry experts warn
 Canwest News Service, September 12, 2010 Sunday 11:00 AM EST, 1144
words, Lynn Moore, Postmedia News

522.    Attacks on power systems: Hackers, malware
 Network World, September 13, 2010, 1550 words, M. E. Kabay

523.    Power plays; Cyber security a growing concern in energy sector
 Prince George Citizen (British Columbia), September 13, 2010 Monday,
NEWS; Pg. 8, 839  words, Lynn Moore, Postmedia News

524.    Attacks on power systems: Industry/government consensus
 Network World, September 15, 2010, 1071 words, M. E. Kabay

525.    Stuxnet worm wreaks havoc among industrial firms
 vnunet.com, 18 September 2010 Saturday, 279 words, Phil Muncaster

526.    Increasing security of SCADA systems in power industry
 Network World, September 20, 2010, 1263 words, M. E. Kabay

527.    OTN's solutions are reliable, secure and easy to use
 Oil & Gas News, September 21, 2010, 1051 words

528.    A laundry list of power industry incidents to learn from
 Network World, September 22, 2010, 1628 words, M. E. Kabay

529.    Software smart bomb fired at Iranian nuclear plant: experts
 Agence France Presse -- English, September 24, 2010 Friday 1:51 AM
GMT, 639 words

530.    A New Kind of Software Attack, A Whole New Ballgame
 The Cutter Blog, September 24, 2010 Friday 1:46 PM EST, 608 words, Ken Orr

531.    Stuxnet worm is the 'work of a national government agency'
 Guardian Unlimited, September 24, 2010 Friday, 1223 words, Josh
Hallidayguardian.co.uk

532.    Stuxnet computer worm takes its toll on Iran, where nuclear plant
may be target
 VentureBeat, September 26, 2010 Sunday 1:32 AM EST, 322 words, Dean Takahashi

533.    Virus Targets Industrial OS, Reaches Iran's Nuclear Plant
 ReadWriteWeb, September 27, 2010 Monday 4:00 PM EST, 552 words, Curt Hopkins

534.    Web 'superbug' threatens Chinese national security: report
 The Press Trust of India, September 27, 2010 Monday, NATIONWIDE
INTERNATIONAL NEWS, 382 words

535.    WEB 'SUPERBUG' THREATENS CHINESE NATIONAL SECURITY REPORT
 The Statesman (India), September 27, 2010 Monday, 516 words

536.    Stuxnet mutating, rampaging through Iran: IT official
 Agence France Presse -- English, September 27, 2010 Monday 10:57 AM
GMT, 443 words

537.    Stuxnet wreaking havoc on industrial equipment in Iran
 Times of Oman, September 28, 2010 Tuesday, 383 words, AFP

538.    Is cyberwarfare a genuine threat?
 Guardian Unlimited, September 30, 2010 Thursday, 433 words, Charles
Arthurguardian.co.uk

539.    PandaLabs Q3 Report: Trojans Constituted More Than Half of All
New Threats; 95 Percent of Email was Spam;  - Email infections decline
as exploits propagated via social media increase
 PR Newswire, September 30, 2010 Thursday 8:00 AM EST, 803 words

540.    Cyber worm hits Chinese industry - Hong Kong paper
 BBC Monitoring Asia Pacific - Political Supplied by BBC Worldwide
Monitoring, September 30, 2010 Thursday, 1104 words

541.    Superbug that attacked 6 mn computers in China traced to US
 The Press Trust of India, October 1, 2010 Friday, NATIONWIDE
INTERNATIONAL NEWS, 363 words

542.    A worm in the centrifuge;  The Stuxnet outbreak
 The Economist, October 2, 2010, INTERNATIONAL, 953 words

543.    Indian websites targeted by internet worms; China suspected;
Experts believe that Chinese hackers are most likely to have written
the worm which has terrorised the world since June
 Accord Fintech, October 11, 2010 Monday 10:14 AM EST, 242  words

544.    2010 Institutional Investor Conference Webcast - Final
 FD (Fair Disclosure) Wire, October 13, 2010 Wednesday, 30839  words

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ