[<prev] [next>] [day] [month] [year] [list]
Message-ID: <AANLkTinL3soYNmjb+8yS0yms+1eaFrva4=G-0obPOgGL@mail.gmail.com>
Date: Sat, 23 Oct 2010 23:27:50 -0400
From: Shawn Merdinger <shawnmer@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Lexis search for "scada + hackers" 1996-2010 --
544 citations
Hi List,
Below are the citations from the results of a Lexis-Nexis (Academic
Universe) search for keywords SCADA and HACKER going back to 1996.
For copyright reasons I cannot provide full documents, but you can go
to a college library, do the same search and pull the full-text. I
was going to cull through the full-text and write a compendium of
quotations/warnings/call-to-action starting from 1996, but I've not
the bandwidth at the moment. Perhaps someone else will.
Cheers,
--scm
1. PREPARED STATEMENT BY JOHN H. DEUTCH DIRECTOR OF CENTRAL
INTELLIGENCE BEFORE THE SENATE GOVERNMENTAL AFFAIRS COMMITTEE
SUBCOMMITTEE ON INVESTIGATIONS "FOREIGN INFORMATION WARFARE PROGRAMS
AND CAPABILITIES"
Federal News Service, JUNE 25, 1996, TUESDAY, IN THE NEWS, 2000 words
2. TESTIMONY June 25, 1996 JOHN M. DEUTCH DIRECTOR CENTRAL
INTELLIGENCE AGENCE SENATE GOVERNMENT AFFAIRS PERMANENT SUBCOMMITTEE
ON INVESTIGATIONS COMPUTER SECURITY
Federal Document Clearing House Congressional Testimony, June 25,
1996, Tuesday, CAPITOL HILL HEARING TESTIMONY, 2042 words
3. TELECOMMUNICATION, COMPUTER SYSTEMS VULNERABLE TO TERRORISM
Radio Comm. Report, July 08, 1996, News; Pg. 5, 627 words, Jeffrey Silva
4. A little knowledge can be a dangerous thing
Energy IT, UPFRONT; Vol. 3, No. 2; Pg. 6, 501 words
5. PREPARED STATEMENT OF JANT RENO UNITED STATES ATTORNEY GENERAL
BEFORE THE SENATE APPROPRIATIONS COMMITTEE COMMERCE, JUSTICE, STATE
AND JUDICIARY SUBCOMMITTEE
Federal News Service, MARCH 31, 1998, TUESDAY, IN THE NEWS, 10371 words
6. The U.S. power grid isn't hacker-friendly
The Washington Times, April 22, 1998, Wednesday, Final Edition, Part
A; COMMENTARY; EDITORIALS; LETTERS; Pg. A18, 415 words
7. Letters to the Editor ; This month: Bryan Morgan's call for
suggestions (in the debut installment of his new Distributed Objects
column) hasn't gone unnoticed. He sifts through the deluge to shape
his column's itinerary for the next six months. Plus: Corrections and
amendments to Carl Dichter's Java visual IDEs review; more on those
JVM server benchmarks; praise for Laurence Vanhelsuw and Chuck
McManis; and two major (and related) design headaches for Bill Venners
JavaWorld, May 1998, 3544 words
8. DELIVERS REMARKS AT FORTUNE 500 CIO FORUM; ASPEN, CO
FDCH Political Transcripts, August 12, 1998, Wednesday, 4681 words
9. U.S. DOD DoD news briefing
M2 PRESSWIRE, August 13, 1998, 4594 words
10. Plant managers focus on growth strategies
Power, September, 1998, /October, 1998, CONFERENCE REPORT; POWER'S
Seventh Annual Powerplant O&M Symposium; Vol. 142, No. 5; Pg. 42, 2186
words, Compiled by Allen Kopp, Contributing Writer
11. New Products, Access Control & Security Systems Integration,
November 1998, New Products; ISSN: 1084-6425 , 2072 words, AC&SSI
Staff
12. WHEN GOTHAM GOES DARK:TERRORISM'S TAKING ON A NEW FACE FOR THE
COMPUTER AGE
The New York Post, November 18, 1999, Thursday, 830 words, Bob McManus
13. Thin clients simplify maintenance, lower total cost of ownership
Instrumentation & Control Systems, December 1999, Pg. 67-68, 1587
words, Hancock, David
14. The next Y2K?
Energy IT, SECURITY; Vol. 5, No. 1; Pg. 12, 2025 words, By Ray
Pospisil; Ray Pospisil is a freelance writer based in Brooklyn, NY,
and a regular contributor to McGraw-Hill Energy publications.
15. EPRI SAYS OPEN-PLATFORM SYSTEMS COULD CAUSE HACKER VULNERABILITY
Electric Utility Week (formerly Electrical Week), March 13, 2000,
TECHNOLOGY; Pg. 17, 453 words
16. CYBER WAR; WEAKNESS OF MILITARY AND CIVILIAN COMPUTER SYSTEMS IN
THE UNITED STATES AGAINST OUTSIDE COMPUTER HACKERS
CBS News Transcripts, 2564 words
17. Energy infrastructure security
Electrical Business, May, 2000, Pg. v.36(5) My'00 pg 24, 812 words
18. Five top IT applications in power delivery
Electrical World, November, 2000, /December, 2000, SPECIAL SECTION;
Vol. 214, No. 6; Pg. 12, 2553 words
19. What you don't know, will hurt you
Electric Light & Power, December, 2000, COMMENTARY; Pg. 3, 702 words,
Pam Boschee
20. The importance of infrastructure in a digital world; FEATURES
- COVER STORY
The Age (Melbourne, Australia), January 23, 2001 Tuesday, COMPUTERS;
It Professional; Pg. 1, 2085 words, SUE CANT
21. U.S. SENATOR JUDD GREGG (R-NH) HOLDS HEARING ON TERRORISM AND
U.S. GOVERNMENT CAPABILITIES (AFTERNOON SESSION)
FDCH Political Transcripts, May 8, 2001, Tuesday, 22753 words
22. California hack points to possible IT surveillance threat
InfoWorld Daily News, June 13, 2001, Wednesday, 862 words, By Dan
Verton, Computerworld, InfoWorld.com
23. California Hack Points to Possible Surveillance Threat; Power grid
unaffected; perps unidentified
Computerworld, June 18, 2001, NEWS - EARLY; Pg. 17, 628 words
24. Information Security for T&D Automation, Transmission &
Distribution World, July 2001, INFOCUS; ISSN: 1087-0849, 1180 words,
Joe Weiss
25. Telecom technologies boost utility operations
Energy IT, COMMUNICATIONS; Vol. 6, No. 4; Pg. 51, 3825 words, By
Frank E. Benassi
26. VIRTUAL PROBLEMS
Foreign Affairs, September, 2001 / October, 2001, LETTERS TO THE
EDITOR; Pg. 180, 442 words, RALPH HITCHENS; U.S. Department of Energy
27. B2B creates securITy challenges
Energy IT, DATA SECURITY; Vol. 6, No. 5; Pg. 45, 4288 words, By
Frank E. Benassi
28. PREPARED STATEMENT OF RONALD L. DICK DEPUTY ASSISTANT DIRECTOR,
COUNTER TERRORISM DIVISION, AND DIRECTOR, NATIONAL INFRASTRUCTURE
PROTECTION CENTER, FEDERAL BUREAU OF INVESTIGATION BEFORE THE HOUSE
COMMITTEE ON TRANSPORTATION AND INFRASTRUCTURE SUBCOMMITTEE ON WATER
RESOURCES AND ENVIRONMENT SUBJECT - TERRORISM: ARE AMERICA'S WATER
RESOURCES AND ENVIRONMENT AT RISK
Federal News Service, October 10, 2001, Wednesday, PREPARED
TESTIMONY, 5997 words
29. TERRORIST RISK TO WATER AND ENVIRONMENT
Federal Document Clearing House Congressional Testimony, October 10,
2001, Wednesday, CAPITOL HILL HEARING TESTIMONY, 6063 words
30. Energy Firms Stand Guard Amid Threats
InternetWeek, November 19, 2001 Monday, NEWS & ANALYSIS; Pg. 1, 776
words, Rutrell Yasin
31. The State Journal-Register (Springfield, IL), December 8, 2001
Saturday, LOCAL; Pg. 9, 2429 words
32. Locking down on system security, American City & County, January
2002, WATERSUPPLY; ISSN: 0149-337X, 2871 words, Beth Wade, Managing
Editor
33. Protecting critical infrastructures by sharing information
Energy IT, SECURITY; Vol. 7, No. 1; Pg. 45, 985 words, Willard S.
Evans, Jr. is vice president of Information Technology Services at
Peoples Energy Corp., Chicago. He is one of the 11 members of the
Energy/ISAC's Board of Managers.; By Willard S. Evans, Jr.
34. Companies on the prowl for IT security
Electric Light & Power, February, 2002, Pg. 1, 1672 words, Dana
Bacciocco, Associate Editor, Walls is associate director of advanced
energy systems with Arthur D. Little Inc. He can be reached directly
via telephone (617-498-6649) or e-mail (walls.d@....com).
35. How one hacker penetrated a utility network: A true story
Energy IT, DATA SECURITY; Vol. 7, No. 2; Pg. 46, 1183 words
36. Digital Terrorism: Holes in the Firewall? Plugging cyber security
holes isn't as easy as everyone wants to think.
PUBLIC UTILITIES FORTNIGHTLY, March 15, 2002, ARTICLE; Pg. 12, 4886
words, By Jennifer Alvey; Jennifer Alvey is associate editor at Public
Utilities Fortnightly.
37. The Truth About Cyberterrorism
CIO Magazine, March 15, 2002, FEATURE, 2821 words, Scott Berinato
38. DIGITAL NIGHTMARE
Governing Magazine, April, 2002, FEATURE;Pg. 20, 2840 words, Ellen Perlman
39. CSIS warns infrastructure vulnerable to cyberterrorism
Cobourg Daily Star (Ontario), May 8, 2002 Wednesday, NATIONAL NEWS;
Pg. 19, 561 words, Southam News
40. CSIS warns infrastructure vulnerable to cyberterrorism
Port Hope Evening Guide (Ontario), May 8, 2002 Wednesday, NATIONAL
NEWS; Pg. 19, 561 words, Southam News
41. HEARING OF THE SENATE GOVERNMENTAL AFFAIRS COMMITTEE SUBJECT:
SECURING OUR INFRASTRUCTURE: PRIVATE/PUBLIC INFORMATION SHARING
CHAIRED BY: SENATOR JOSEPH LIEBERMAN (D-CT) LOCATION: HOUSE/SENATE
OFFICE BUILDING, WASHINGTON, D.C.
Federal News Service, May 8, 2002 Wednesday, CAPITOL HILL HEARING, 27430 words
42. U.S. Fears Al Qaeda Cyber Attacks
Newsbytes, 3398 words, Barton Gellman; Washington Post Staff Writer
43. Related Documents and Resources On The Web
Newsbytes, 187 words, Compiled by The Washington Post and
washingtonpostcomTechNewscom
44. Cyber-Attacks by Al Qaeda Feared; Terrorists at Threshold of
Using Internet as Tool of Bloodshed, Experts Say
The Washington Post, June 27, 2002 Thursday Correction Appended, A
SECTION; Pg. A01, 3409 words, Barton Gellman, Washington Post Staff
Writer
45. Al-Qaida hackers targeting Bay Area
Tri-Valley Herald (Pleasanton, CA), June 27, 2002 Thursday, HEADLINE
NEWS, 1239 words, By Barton Gellman, Washington Post
46. Bay Area probed for attack; FBI: Al-Qaida has cased computer systems
Alameda Times-Star (Alameda, CA), June 27, 2002 Thursday, HEADLINE
NEWS, 1226 words, By Barton Gellman , Washington Post
47. Bay Area probed for attack; FBI: Al-Qaida has cased computer systems
The Oakland Tribune (Oakland, CA), June 27, 2002 Thursday, HEADLINE
STORIES, 1226 words, By Barton Gellman , Washington Post
48. Al-Qaida casing Bay Area networks; FBI: Cyberterrorists
The Daily Review (Hayward, CA), June 27, 2002 Thursday, HEADLINE
NEWS, 1240 words, By Barton Gellman, Washington Post
49. Al-Qaida Internet threat revealed; State infrastructure,
disruption of communications were targets
San Mateo County Times (San Mateo, CA), June 27, 2002 Thursday, FRONT
PAGE, 1703 words, By Barton Gellman, Washington Post
50. 4 cities shield Web data
San Jose Mercury News (California), June 28, 2002 Friday PS1 EDITION,
B; Pg. 1, 893 words, Sean Webby Mercury News
51. Four Bay Area cities sanitized Web sites; SUSPICIOUS TRAFFIC LED
TO REMOVAL OF DATA
San Jose Mercury News (California), June 28, 2002 Friday F1 EDITION,
B; Pg. 1, 701 words, Sean Webby Mercury News
52. 4 cities take data off Web; AUTHORITIES REMOVE INFO AFTER HITS
FROM MIDEAST
San Jose Mercury News (California), June 28, 2002 Friday MO1 EDITION,
B; Pg. 1, 665 words, Sean Webby Mercury News
53. Four Bay Area cities reported suspicious traffic on Web sites;
TERROR CONCERN: HITS INVOLVED 911 CENTERS, POWER, WATER SUPPLIES;
SENSITIVE DATA REMOVED
San Jose Mercury News (California), June 28, 2002 Friday A1 EDITION,
B; Pg. 1, 777 words, Sean Webby Mercury News
54. Suspicious traffic led to removal of data on Bay Area cities' Web sites
San Jose Mercury News, June 29, 2002, Saturday, STATE AND REGIONAL
NEWS, 727 words, By Sean Webby
55. Securing supervisory control and data acquisition systems
Hydrocarbon Processing, July 2002 , 1832 words
56. Despite gains, U.S. remains vulnerable to terrorist hackers, White
House aide says
Gannett News Service, July 18, 2002, Thursday, 532 words, GREG
WRIGHT; Gannett News Service
57. CYBERTERRORISM
Federal Document Clearing House Congressional Testimony, July 24,
2002 Wednesday, CAPITOL HILL HEARING TESTIMONY, 2808 words
58. CYBERTERRORISM
Federal Document Clearing House Congressional Testimony, July 24,
2002 Wednesday, CAPITOL HILL HEARING TESTIMONY, 2724 words
59. U.S. REPRESENTATIVE STEPHEN HORN (R-CA) HOLDS HEARING ON
CYBERTERRORISM AND CRITICAL INFRASTRUCTURE
FDCH Political Transcripts, July 24, 2002 Wednesday, 25774 words
60. NeoNET, Inc. Announces Security Services
Business Wire, July 26, 2002, Friday, 291 words
61. Hackers and Tall Tales
The Washington Post, August 2, 2002 Friday, EDITORIAL; Pg. A22, 192 words
62. Cybersecurity Gains Momentum
Chemical Week, August 21, 2002, E-COMMERCE; Pg. 42, 1928 words, ESTHER D'AMICO
63. NeoNET's Free ''Over-the-Wire'' Vulnerability Test Answers
''Yes'' or ''No''
Business Wire, August 28, 2002, Wednesday, 438 words
64. Control systems: The weak link in infrastructure protection
Platts Energy Business & Technology, September, 2002, CYBER
SECURITY; Vol. 4, No. 5; Pg. 35, 1154 words, BY JOSEPH M. WEISS, P.E.,
AND DR. GERALD J. FITZPATRICK; Joseph M. Weiss, P.E., is an executive
consultant with KEMA Consulting, Fairfax, Va.
(jweiss@...aconsulting.com). Dr. Gerald J. FitzPatrick is leader of
the Electric Systems Group at the National Institute of Standards and
Technology (NIST), Gaithersburg, Md. (fitzpa@...t.gov).
65. Preparing for the worst
Platts Energy Business & Technology, September, 2002, BUSINESS
SECURITY; Vol. 4, No. 5; Pg. 37, 1729 words, Tina M. Sivinski is Vice
President and Energy Global Industry Solutions President of EDS,
Plano, Tex.; BY TINA M. SIVINSKI
66. Cyber Terror Lurks As Potential Threat; Could Do Serious Harm;
Financial services and utilities among sectors that could be damaged
Investor's Business Daily, September 11, 2002 Wednesday, INTERNET &
TECHNOLOGY; NATIONAL, 847 words, BY DONNA HOWELL
67. White House Issues Cyber Security Plan; Containing threats
requires cooperation from all sectors, plan recommends
State Department, September 20, 2002, NEWS FROM THE WASHINGTON FILE, 4596 words
68. Bush team lays out cybersecurity plan; Recommendations draw
praise, but some question whether they go far enough.
Network World, September 23, 2002, FRONT NEWS; Pg. 10, 895 words, ?BY
CAROLYN DUFFY MARSAN AND ELLEN MESSMER
69. Critical Infrastructure Security and You -- You don't have to be a
utility to apply some of the same network safeguards they use.
Network Magazine, October 1, 2002, NETWORK DEFENSE; Pg. 66, 2166
words, Rik Farrow
70. New equipment
World Oil, October 2002 , DEPARTMENTS, 799 words
71. The Business Lawyer, November, 2002, SURVEY., 15216 words
72. Is Our Infrastructure Open To Online Terror?; Beefing Up Security;
Command-and-control for U.S. gas, water, rail could yet be vulnerable
Investor's Business Daily, November 5, 2002 Tuesday, SECTION INTERNET
& TECHNOLOGY; NATIONAL EDITION; Pg. A06, 1199 words, BY DONNA HOWELL
73. CRITICAL INFRASTRUCTURE SECURITY AND YOU
Network Computing Asian Edition, December 1, 2002, 1229 words, Rik Farrow
74. IT Security: Who's Investing in What? Regulatory and market forces
put the pressure on information technology to perform.
PUBLIC UTILITIES FORTNIGHTLY, January 1, 2003, ARTICLE; Pg. 18, 3419
words, BY JENNIFER ALVEY; Jennifer Alvey is associate editor of Public
Utilities Fortnightly.
75. CHALLENGES FOR SELECTED AGENCIES AND INDUSTRY SECTORS
GAO Reports, February 28, 2003, Friday, GAO REPORT, 20950 words,
ROBERT F. DACEY
76. Get safe: Prepare for Security Intrusion; Threats to
control-system security are like the weather ... you can't control it,
but you can construct adequate shelter. Avoid drama and crisis; ensure
control systems can weather security intrusion storms., Control
Engineering, March 01, 2003, Features; Cover Story; Pg. 34, 3128
words, Dave Harrold, Control Engineering
77. New threats prompt renewed security scrutiny for product storage sites
Oil & Gas Journal, March 3, 2003, TRANSPORTATION; Pg. 52, 3490 words,
Robert I. Williams; SCADA Systems Engineering and Training
Consultants, Mold, Flintshire, UK
78. Rising Threat -- As war looms, the risk of cyberattacks from
hackers and terrorists grows. Are you ready?
InformationWeek, March 10, 2003, NEWS SECURITY; Pg. 22, 1366 words,
George V. Hulme
79. President's Plan Causes No 'Heartache' for Industry
Chemical Week, March 12, 2003, INFORMATION TECHNOLOGY; Cybersecurity;
Pg. 21, 508 words, ESTHER D'AMICO
80. MI2G Satellite hacker attacks planned with Eastern European help
M2 PRESSWIRE, April 1, 2003, 1285 words
81. Cyber Terrorism Expert Available for Interviews
PR Newswire, April 3, 2003 Thursday, FINANCIAL NEWS, 802 words
82. MI2G Digital turbulence points to deepening instability in
Middle East
M2 PRESSWIRE, April 10, 2003, 1144 words
83. MI2G Monthly world record for overt digital attacks broken;
Politically motivated attacks major contributing force
M2 PRESSWIRE, May 21, 2003, 1177 words
84. Industrial security gets a Linux-based lock
Breaking News from globeandmail.com, June 11, 2003 9:59 AM EST,
CAT3; einsider, 602 words, ij; Robert Lemos; CNET
85. The cyberspace invaders; FEATURES - REPORTAGE
Sunday Age (Melbourne, Australia), June 22, 2003 Sunday, NEWS; Pg.
15, 2551 words, Gary Hughes
86. CYPERSECURITY ISSUES
Federal Document Clearing House Congressional Testimony, June 25,
2003 Wednesday, CAPITOL HILL HEARING TESTIMONY, 5435 words
87. Ready for a cyber attack on your control systems?
Platts Energy Business & Technology, July 2003, SECURITY; Vol. 5,
No. 6; Pg. 46, 1455 words, By Joseph M. Weiss, PE; Joseph M. Weiss, PE
is an executive consultant with KEMA Inc., Fairfax, Va. He is based in
California and can be reached at (408) 253-7934 or
jweiss@...aconsulting.com.
88. Securing Our Water Systems And Their Infrastructures
The Journal of Counterterrorism & Homeland Security International,
2003 Summer, Vol. 9, No. 3, 2586 words, Edward J. Courtney; Edward J.
Courtney has been Deputy Commissioner of the Department of Public
Works for the City of Yonkers, New York since 1996. He presently
serves as a member of the city's Emergency Management Planning
Committee. He is a former police lieutenant, civil service
commissioner, and director of Civil Defense and Disaster Preparedness
for the city. Presently, he is a member of IACSP, the Middle East
Forum, the Center for Security Policy, and the Homeland Security
Leadership Alliance. Contact: ejc41@...oo.com
89. Red alert on the e-war front; Is it possible to take down a
superpower using only a keyboard, a mouse and an internet connection?
With corporate and government bodies across the US taking the threat
of electronic terrorism seriously, Duncan Graham-Rowe decided to give
it a go, New Scientist, July 05, 2003, Features; Pg. 38, 2458 words,
Duncan Graham-Rowe
90. Alliance tests distributed energy control system
Inside Energy /with Federal Lands, July 7, 2003, Pg. 1, 1090 words,
David Jones
91. CYPERSECURITY ISSUES
Federal Document Clearing House Congressional Testimony, July 22,
2003 Tuesday, CAPITOL HILL HEARING TESTIMONY, 6855 words
92. PREPARED STATEMENT OF DANIEL G. WOLF DIRECTOR OF INFORMATION
ASSURANCE NATIONAL SECURITY AGENCY BEFORE THE HOUSE COMMITTEE ON
HOMELAND SECURITY SUBCOMMITTEE ON CYBERSECURITY, SCIENCE AND RESEARCH
& DEVELOPMENT SUBJECT - "CYBERSECURITY GETTING IT RIGHT"
Federal News Service, July 22, 2003 Tuesday, PREPARED TESTIMONY, 5375 words
93. CYPERSECURITY ISSUES
Federal Document Clearing House Congressional Testimony, July 22,
2003 Tuesday, CAPITOL HILL HEARING TESTIMONY, 5423 words
94. PREPARED TESTIMONY OF ROBERT F. DACEY DIRECTOR, INFORMATION
SECURITY ISSUES BEFORE THE HOUSE COMMITTEE ON ARMED SERVICES
SUBCOMMITTEE ON TERRORISM, UNCONVENTIONAL THREATS AND CAPABILITIES,
Federal News Service, July 24, 2003 Thursday, PREPARED TESTIMONY, 11720 words
95. Customised hacking, New Scientist, August 2, 2003, Letters;
Letters; Pg. 23, 148 words, John Crowther, Morissen, Switzerland
96. BlackIce; Corporate America is still in denial about the threat of
cyber-terrorist attacks against critical facilities in the energy,
telecommunications and financial industries. By Dan Verton
Computerworld, August 11, 2003, BIZ - FEATURES; Pg. 35, 1651 words
97. SPECIAL REPORT INTRODUCTION
ABC News Transcripts, August 14, 2003 Thursday, 11086 words
98. Q&A 14:30
CNN INTERNATIONAL, August 15, 2003 Friday, NEWS; DOMESTIC, 1933
words, Michael Holmes
99. Florida's Power Grid Can Withstand A Crisis, Officials Say
Tampa Tribune (Florida), August 16, 2003, Saturday,, NATION/WORLD,,
764 words, MICHAEL SASSO and WILL RODGERS, The Tampa Tribune; Reporter
Michael Sasso can be reached at (813) 259-7865 or
msasso@...patrib.com. Reporter Will Rodgers can be reached at (813)
259-7870 or wjrodgers@...patrib.com.
100. Blackout prompts worries about security of power grid
USA TODAY, August 19, 2003, Tuesday,, 533 words, Kevin Maney and
Michelle Kessler
101. Computer Virus Expert Available for Interviews on SoBig and Worm Viruses
PR Newswire, August 21, 2003 Thursday, FINANCIAL NEWS, 650 words
102. Expert on Internet Security and Computer Viruses Available for
Media Interviews
PR Newswire, August 26, 2003 Tuesday, FINANCIAL NEWS, 649 words
103. MI2G August sees burst of malware activity
M2 PRESSWIRE, August 27, 2003, 1053 words
104. Electricity grids left wide open to hackers, New Scientist,
August 30, 2003, News; This Week; Pg. 5, 595 words, Duncan Graham-Rowe
105. Cyber-Terrorism Revealed; New Book Explores High-Tech Terrorism
& America's Growing Vulnerability
PR Newswire, September 2, 2003 Tuesday, LIFESTYLE, 1053 words
106. MI2G Linux remains most attacked server OS
M2 PRESSWIRE, September 11, 2003, 1005 words
107. MI2G Top 10 malware targets Microsoft software; Combined
economic damage $72 billion
M2 PRESSWIRE, September 11, 2003, 1090 words
108. Computers failed in 4 places just before August blackout
Plain Dealer (Cleveland, Ohio), September 14, 2003 Sunday, Sports
Final / All Correction Appended, NATIONAL; Pg. A1, 1741 words, Teresa
Dixon Murray and John Funk, Plain Dealer Reporters
109. Computers failed in 4 places just before August blackout
Plain Dealer (Cleveland, Ohio), September 14, 2003 Sunday, Sports
Final / All Correction Appended, NATIONAL; Pg. A1, 1741 words, Teresa
Dixon Murray and John Funk, Plain Dealer Reporters
110. Congress Calls Upon Computerworld Senior Writer and
Cyber-Security Expert to Testify on the Security of National
Infrastructure
Business Wire, September 15, 2003, Monday, 877 words
111. A 'Virtual' Reality
PUBLIC UTILITIES FORTNIGHTLY, September 15, 2003, CYBER SECURITY; Pg.
48, 3337 words, BY JENNIFER ALVEY; Jennifer Alvey is associate editor
of Public Utilities Fortnightly. Contact her at jalvey@....com.
112. DHS science chief sees industry shielding assets
Inside Energy /with Federal Lands, October 6, 2003, Pg. 1, 1076
words, David Jones
113. BCIT cyber security expert warns U.S. congressional subcommittee
of critical infrastructure vulnerabilities
Canada NewsWire, October 9, 2003, Thursday, DOMESTIC NEWS, 806 words
114. Weak links leave U.S. electricity grid vulnerable to attack
Akron Beacon Journal, October 28, 2003, Tuesday, DOMESTIC NEWS, 1368
words, By Ed Meyer
115. Cyber Security Solutions Growing for Utilities
Natural Gas Week, October 29, 2003, CURRENT, 1103 words
116. Cyber Security Solutions Growing for Utilities
Natural Gas Week, October 29, 2003, CURRENT, 1103 words
117. Dispelling cyber attack myths: the first step in securing
vulnerable control systems.
Utility Automation, November 2003, Pg. 26, 2041 words
118. DOE laboratories look at buttressing energy facilities against
cyber attack
Inside Energy /with Federal Lands, November 3, 2003, ENERGY
SECURITY; Pg. 7, 1292 words, David Jones
119. Ice storm
The Age (Melbourne, Australia), November 18, 2003 Tuesday,
COMPUTERS; Next; Pg. 5, 1882 words, Dan Verton
120. Ice storm
Sydney Morning Herald (Australia), November 18, 2003 Tuesday,
COMPUTERS; Next; Pg. 5, 1882 words, Dan Verton
121. Computer worms, viruses pose serious threats to utility control systems
Electric Light & Power, December, 2003, NEWS; Pg. 6, 951 words,
JOSEPH WEISS, KEMA; Weiss is an executive consultant at KEMA. He is
also a member of ISA's process control systems security committee --
SP99, and CIGRE's task force on cyber security. Weiss is located in
California and may be reached at jweiss@...aconsulting.com or
408-253-7934.
122. Security: The year ahead
InfoWorld, January 5, 2004, BREAKING NEWS; Pg. 17, 526 words, Paul Roberts
123. Policy Papers, January 20, 2004, 11549 words
124. Cyber security: read the FAQs, mount a defense, set up an offense!
Control Solutions International, February 2004, 653 words
125. Intrusic's Zephon Detects, Ousts Enemy Sleeper Cells Embedded
Inside Corporate and Government IT Systems
Business Wire, February 23, 2004 Monday, 751 words
126. CYPERTERRORISM
Federal Document Clearing House Congressional Testimony, February 24,
2004 Tuesday, CAPITOL HILL HEARING TESTIMONY, 2266 words
127. CYPERTERRORISM
Federal Document Clearing House Congressional Testimony, February 24,
2004 Tuesday, CAPITOL HILL HEARING TESTIMONY, 4410 words
128. HEARING OF THE TERRORISM, TECHNOLOGY, AND HOMELAND SECURITY
SUBCOMMITTEE OF THE SENATE JUDICIARY COMMITTEE SUBJECT: VIRTUAL
THREAT, REAL TERROR: CYBERTERRORISM IN THE 21ST CENTURY CHAIRED BY:
SENATOR JON KYL (R-AZ) LOCATION: 226 DIRKSEN SENATE OFFICE BUILDING,
WASHINGTON, D.C.
Federal News Service, February 24, 2004 Tuesday, CAPITOL HILL
HEARING, 15769 words
129. CYBERSECURITY
Federal Document Clearing House Congressional Testimony, March 30,
2004 Tuesday, CAPITOL HILL HEARING TESTIMONY, 2687 words
130. CYBERSECURITY
Federal Document Clearing House Congressional Testimony, March 30,
2004 Tuesday, CAPITOL HILL HEARING TESTIMONY, 8290 words
131. Communications Daily, March 31, 2004, Wednesday
132. Hill Panel Sounds Alarm on Telecom Network Vulnerability
WASHINGTON INTERNET DAILY, MARCH 31, 2004, Vol.5, No.62, 904 words
133. US warns of cyber attacks
PACE (Process & Control Engineering) (Australia), April 2004, 587
words, Denes Bolza
134. Utilities' Security Is Too Lax, Report Says -- General Accounting
Office cites threat of cyberattacks against control systems
InformationWeek, April 5, 2004, NEWS; Security; Pg. 24, 611 words,
Martin J. Garvey
135. GAO: SCADA Systems Vulnerable to Terrorists
THE ELECTRICITY DAILY, April 8, 2004, Thursday, Vol. 22, No. 68, 646 words
136. mounting concerns over SCADA security
Electric Light & Power, May 2004/June 2004, Pg. 39, 867 words, Gary
Sevounts, Symantec Corp.; Sevounts is director of industry solutions
for Symantec Corporation and is responsible for delivering customized
information security solutions to investor-owned companies within the
electric power sector. He can be reached at gsevounts@...antec.com.
137. PROVE IT
Information Security, May, 2004, EXPOSE; Pg. 24, 1665 words, By Erik
Sherman; ERIK SHERMAN (ebs@...ksherman.com) is a Massachusetts-based
freelance writer.
138. Power play; They could turn out your lights, cut off your water
and leave your phone line dead. Why are vital networks such as power
grids and water supplies so vulnerable to hackers, and can one of the
world's largest experiments prevent total meltdown? Duncan Graham-Rowe
investigates, New Scientist, May 15, 2004, Technology; Technology;
Pg. 24, 2557 words, Duncan Graham-Rowe; Duncan Graham-Rowe is a
freelance journalist
139. The Terrorist Threat to the Gas and Oil Sectors:; A
Comprehensive Threat Assessment
The Journal of Counterterrorism & Homeland Security International,
2004 Summer, Vol. 10, No. 4, 4404 words, Dr. Joshua Sinai
140. CYPERSECURITY
Federal Document Clearing House Congressional Testimony, June 2, 2004
Wednesday, CAPITOL HILL HEARING TESTIMONY, 2421 words
141. DIGITAL MOLES IN LARGE-SCALE NETWORKS: How the Bad Guys Get In
Security Technology Executive, July 2004, GOVERNMENT & HOMELAND
SECURITY SUPPLEMENT, 1138 words, By Peiter Mudge Zatko
142. Utility Merges Mission-Critical Networks, Transmission &
Distribution World, July 1, 2004, ISSN: 1087-0849; Pg. 7, 2211 words,
By Kevin Streett, Overton Power District No. 5
143. Certicom CodeSign Enables Secure Code Distribution;
Browser-based code-signing application secures remote provisioning in
wireless and cable environments
Canada NewsWire, July 21, 2004, Wednesday, FINANCIAL NEWS, 1126 words
144. Certicom CodeSign Enables Secure Code Distribution
PR Newswire, July 21, 2004 Wednesday, FINANCIAL NEWS, 1097 words
145. Out of Control
CSO Magazine, August 1, 2004, FEATURE, 2862 words, Todd Datz
146. Mission: Critical
Information Security, September, 2004, SPECIAL REPORT; Pg. 26, 3188
words, By Stephen Barlas, Alan Earls, Michael Fitzgerald, Jerri
Ledford and Dennis McCafferty; This report was written by Information
Security contributing writers STEPHEN BARLAS (government), ALAN EARLS
(financial services), MICHAEL FITZGERALD (energy), JERRI LEDFORD
(telecommunications) and DENNIS McCAFFERTY (transportation).
147. PROTECTING FINANCIAL INFRASTRUCTURE
Federal Document Clearing House Congressional Testimony, September 8,
2004 Wednesday, CAPITOL HILL HEARING TESTIMONY, 5810 words
148. New and original study on industrial cyber security reveals
tenfold increase in number of successful attacks on process control
and SCADA systems since 2000
PR Newswire US, October 4, 2004 Monday, 876 words
149. New and original study on industrial cyber security reveals
tenfold increase in number of successful attacks on process control
and SCADA systems since 2000
Canada NewsWire, October 4, 2004, Monday, DOMESTIC NEWS, 776 words
150. Plant automation, IT dead center in cyber terrorism concerns
MSI, November 1, 2004, VIEWS FROM THE FRONT; Top of Mind at ISA; Pg.
10, 667 words, by Staff
151. Microsoft patch management a top-level plant-floor concern
MSI, November 1, 2004, VIEWS FROM THE FRONT; Plant-Floor Security;
Pg. 18, 293 words, by Staff
152. Industrial Net Security Found Lacking; Study sees tenfold spike
in attacks on systems running trains, factories
Investor's Business Daily, November 9, 2004 Tuesday, SECTION INTERNET
& TECHNOLOGY; Q & A; NATIONAL EDITION; Pg. A05, 884 words, BY DONNA
HOWELL
153. The battle against cyberterror; The race is on to harden the
nation's critical infrastructure before cyberterrorists gain enough
skills to launch attacks.
Network World, November 29, 2004, NEWS; Pg. 49, 822 words, JOHN BLAU
154. Cybersecurity: It Doesn't Come In A Box
The Metropolitan Corporate Counsel, December, 2004, KELLEY DRYE; Pg.
6, 2154 words, STEPHEN M. ARNER , KELLEY DRYE & WARREN LLP; Stephen M.
Arner is an attorney in the Tysons Corner office of Kelley Drye &
Warren LLP where his practice focuses on litigation and cybersecurity.
155. TDi Signs Cooperative Research and Development Agreement With INEEL
Business Wire, December 22, 2004 Wednesday 3:20 PM GMT, 555 words
156. analyzing cyber security
Electric Light & Power, January 2005 / February 2005, NEWS; Pg. 17,
952 words, Gary Sevounts, Symantec; As director of electric power
solutions for Symantec Corporation, Gary Sevounts is responsible for
the definition and introduction of enterprise security solutions in
the electric power industry.
157. Report warns of increased industrial security risk
CIO Canada, February 1, 2005, Pg. n/a, 252 words, Dubowski, Stefan
158. Control systems cyber security; Terrorist threats, hackers,
disgruntled employees, and vulnerable process control systems in
highly volatile industries give plenty of cause for concern. Should
voices calling for greater security be heeded, or are they just the
cries of modern-day Chicken Littles?
Control Engineering, February 1, 2005, FEATURES; Cover Story; Pg.
26, 2260 words, Bryan L. Singer, chairman ISA SP-99, and Joe Weiss,
KEMA. Bryan L. Singer is chairman of ISA SP-99 and works for Rockwell
Automation as a senior business consultant and leader for security
services. Joseph Weiss, PE, CISM, is executive consultant at KEMA and
chairman of the IEEE Power Engineering Society's task force reviewing
equipment standards for cyber security, a member of ISA's process
Control Systems Security Committee - SP99, and CIGRE's Task Force on
cyber security.
159. InfoSec Institute and Core Security Technologies Work Together to
Provide an Improved Ethical Hacking Course
Business Wire, February 22, 2005 Tuesday 11:56 PM GMT, 409 words
160. Plant-floor security, by the numbers; Count the ways to secure
your plant-floor data, networks, and operations
Manufacturing Business Technology, March 1, 2005, APPLICATIONS AND
SERVICES; Pg. 24, 2037 words, By Nancy Bartels, senior editor
161. Hackers Target U.S. Power Grid; Government Quietly Warns
Utilities To Beef Up Their Computer Security
The Washington Post, March 11, 2005 Friday, Financial; E01, 1502
words, Justin Blum, Washington Post Staff Writer
162. U. Illinois team works to secure data systems for homeland security
University Wire, March 15, 2005 Tuesday, 759 words, By Liz Deavila,
Daily Illini; SOURCE: U. Illinois
163. Industrial Ethernet: IEC, go back to the negotiation table;
Hubert Kirrmann, a member of the Swiss National Committee, tells why
he and his colleagues have voted against the IEC standardisation
proposals for Ethernet.
Control Engineering Europe, April 1, 2005, FEATURE ARTICLES; Pg. 26,
1893 words, Hubert Kirrmann
164. SPECIAL REPORT; ARE OUR CRITICAL SYSTEMS SAFE FROM CYBER ATTACK?
Computing, April 21, 2005, Pg.26, 2269 words
165. Three-zone security
Control Engineering, June 1, 2005, DEPARTMENTS; Insight; IT and
engineering; Pg. 22, 692 words, Dennis Brandl, BR&L Consulting.
Dennis Brandl, dbrandl@...consulting.com , is the president of BR&L
Consulting, a consulting firm focusing on manufacturing IT solutions,
based in Cary, N.C.
166. Many Facets, One Point; Safeguarding data in automation and
control systems boils down to risk assessment that emphasizes policies
and procedures as much as technology.
Control Engineering, July 1, 2005, FEATURES; HMI Security; Pg. 41,
2420 words, Jeanine Katzel, Control Engineering
167. Vendors Need to Present Convincing Business Plans to Justify
Investments on SCADA Systems
Business Wire, July 19, 2005 Tuesday 12:00 PM GMT, 889 words
168. SECURING CYBERSPACE
CQ Congressional Testimony, July 19, 2005 Tuesday, CAPITOL HILL
HEARING TESTIMONY, 5697 words
169. SCADA goes into outer space
PACE (Process & Control Engineering) (Australia), August 2005, 999 words
170. Al-Qaida Recruiting Target: Skilled Hackers; Cyberterrorism
Threat; Ex-Justice Dept. official says terror organizations seek
coordinated attacks
Investor's Business Daily, August 19, 2005 Friday, SECTION INTERNET &
TECHNOLOGY; Q & A; NATIONAL EDITION; Pg. A04, 942 words, BY DOUG
TSURUOKA
171. Networks still vulnerable
The Capital (Annapolis, MD), August 21, 2005 Sunday, BUSINESS; Pg.
B1, 778 words, DAVID E. LEIVA, Staff Writer
172. Internet Security Systems Protects SCADA Networks, Helps To
Ensure Stability of National Infrastructure; Company Adds Specialized
SCADA Protection to its Intrusion Prevention Technology
Business Wire, August 24, 2005 Wednesday 11:45 AM GMT, 771 words
173. Networks are 'potential for disaster'
The Maryland Gazette, August 24, 2005 Wednesday, BUSINESS; Pg. A6,
789 words, DAVID E. LEIVA, Staff Writer
174. Security Tips That Will Scare-And Help-You
InformationWeek, August 29, 2005, BUSINESS TECHNOLOGY; Pg. 76, 721
words, Bob Evans
175. Trusted Network Technologies' Utility IT Study Reveals
Expectations of Critical Energy Systems Breaches; Utilities Executives
Burdened by Compliance, but Optimistic Regarding Security and Identity
Management Efforts
Business Wire, August 29, 2005 Monday 11:01 AM GMT, 810 words
176. CYBERSECURITY VULNERABILITIES
CQ Congressional Testimony, September 15, 2005 Thursday, CAPITOL HILL
HEARING TESTIMONY, 2516 words
177. CYBERSECURITY VULNERABILITIES
CQ Congressional Testimony, September 15, 2005 Thursday, CAPITOL HILL
HEARING TESTIMONY, 6000 words
178. Terrorism's New Operating System
National Review, September 16, 2005, Friday, National Review Online,
1431 words, By Mansoor Ijaz
179. NEWS; BP LEADS SECURITY INITIATIVE.
Computing, September 22, 2005, Pg.1, 429 words, Daniel Thomas.
180. Crescent Tech Vent. Interim Results
London Stock Exchange Aggregated Regulatory News Service (ARNS),
September 30, 2005 Friday 2:00 AM GMT, 542 words
181. Securing the process industries; Everyone wants a secure plant
floor, but process manufacturers have special concerns that require
unique strategies
Manufacturing Business Technology, October 1, 2005, SECURITY AND
WIRELESS; Pg. 52, 2132 words, By Nancy Bartels, senior editor
182. SUPERVISORY CONTROL AND DATA ACQUISITION SYSTEMS
CQ Congressional Testimony, October 18, 2005 Tuesday, CAPITOL HILL
HEARING TESTIMONY, 3189 words
183. SUPERVISORY CONTROL AND DATA ACQUISITION SYSTEMS
CQ Congressional Testimony, October 18, 2005 Tuesday, CAPITOL HILL
HEARING TESTIMONY, 4053 words
184. SUPERVISORY CONTROL AND DATA ACQUISITION SYSTEMS
CQ Congressional Testimony, October 18, 2005 Tuesday, CAPITOL HILL
HEARING TESTIMONY, 5031 words
185. SUPERVISORY CONTROL AND DATA ACQUISITION SYSTEMS
CQ Congressional Testimony, October 18, 2005 Tuesday, CAPITOL HILL
HEARING TESTIMONY, 3972 words
186. HEARING OF THE ECONOMIC SECURITY, INFRASTRUCTURE PROTECTION, AND
CYBERSECURITY SUBCOMMITTEE AND THE EMERGENCY PREPAREDNESS, SCIENCE,
AND TECHNOLOGY SUBCOMMITTEE OF THE HOUSE HOMELAND SECURITY COMMITTEE
SUBJECT: SCADA AND THE TERRORIST THREAT: PROTECTING THE NATION'S
CRITICAL CONTROL SYSTEMS CHAIRED BY: REPRESENTATIVE DANIEL LUNGREN
(R-CA) WITNESSES: DONALD "ANDY" PURDY, ACTING DIRECTOR, NATIONAL
CYBER SECURITY DIVISION, DEPARTMENT OF HOMELAND SECURITY; DR. SAM
VARNADO, DIRECTOR OF INFORMATION OPERATIONS CENTER, SANDIA NATIONAL
LABORATORY; DR. WILLIAM RUSH, INSTITUTE PHYSICIST, GAS TECHNOLOGY
INSTITUTE; LARRY TODD, DIRECTOR, SECURITY, SAFETY AND LAW ENFORCEMENT,
BUREAU OF RECLAMATION, DEPARTMENT OF THE INTERIOR; DR. K. P. ANANTH,
ASSOCIATE LABORATORY DIRECTOR, NATIONAL AND HOMELAND SECURITY, IDAHO
NATIONAL LABORATORY; ALAN PALLER, DIRECTOR OF RESEARCH, THE SANS
INSTITUTE LOCATION: 311 CANNON HOUSE OFFICE BUILDING, WASHINGTON,
D.C.
Federal News Service, October 18, 2005 Tuesday, CAPITOL HILL
HEARING, 15371 words
187. Security update
Control Engineering, November 1, 2005, DEPARTMENTS; Editorial; Pg.
2, 482 words, By David Greenfield, Editorial Director
188. Verano Announces Second Generation Industrial Defender(R) SCADA
Cybersecurity Solution; Enhanced Scalability and Security Agents
Provide Comprehensive Protection, Enable Compliance With NERC CIP
Standards
PR Newswire, November 1, 2005 Tuesday 1:01 PM GMT, 1084 words
189. Black Hat Federal 2006 Briefings Begin on January 25th; Dr.
Linton Wells II, Principal Deputy Assistant Secretary of Defense,
Keynotes on Security Research and Vulnerability Disclosure; Simson
Garfinkel on Hard Drive Forensics, David Aitel and Billy Hoffmann on
Worm Writing, Joanna Rutkowska and John Heasman on Advanced Rootkits,
Robert Graham on SCADA Systems, Halvar Flake on Exploiting a New
Vulnerability Class, and David Litchfield on New Oracle
Vulnerabilities and Fixes
PR Newswire, January 18, 2006 Wednesday 11:31 PM GMT, 790 words
190. Key U.S. systems vulnerable to hacking, security firm says
Chattanooga Times Free Press (Tennessee), January 26, 2006 Thursday,
WIRE - GENERAL NEWS; Pg. A6, 794 words
191. Government lab keeps hackers away from control systems
Manufacturing Business Technology, February 1, 2006, VIEWS FROM THE
FRONT; Plant-Floor Security; Pg. 8, 453 words, By Staff
192. The Feds Step In
Government Security, February 1, 2006, Pg. 18, 2081 words, By Michael Fickes
193. SCADA systems at risk for attacks
Mobile Radio Technology, February 1, 2006, NEWS; Pg. 8, 785 words,
BY GLENN BISCHOFF
194. Confab to examine security of utility, other control systems
Network World, February 27, 2006, NEWS; Pg. 10, 423 words, Cara Garretson
195. REP. REICHERT RECEIVES SECURITY LEADERSHIP AWARD FOR HEARING RESULTS
US Fed News, March 8, 2006 Wednesday 5:31 AM EST, 442 words, US Fed News
196. Tier-3: Australian defence systems protected by Tier-3; Tier-3
launches Huntsman Threat Management Technology capable of managing
both known and unknown threats
M2 Presswire, April 24, 2006, 1093 words
197. Evaluation: Control System Security Software; Major
fossil-fueled power plant cannot afford control interruptions due to
security breaches or system glitches.
Control Engineering, May 1, 2006, FEATURES; Inside Process; Pg.
IP15, 780 words, Ron Derynck. Ron Derynck is director of product
strategies at Verano Inc.
198. Green Hills Software Announces Landmark POSIX Certification;
INTEGRITY Workstation First Desktop and Enterprise Class System to Be
Certified POSIX.1 Conformant Under the IEEE and The Open Group
POSIX(R) Certification Program
Market Wire, May 1, 2006 Monday 5:00 AM GMT, 1082 words
199. The future starts here ...
PACE (Process & Control Engineering) (Australia), May 2006, 5008 words
200. Science&Technology: The enemy within; Could a ruthless new breed
of cyber-terrorist cause meltdown at the click of a mouse? Jimmy Lee
Shreeve reports
The Independent (London), May 31, 2006 Wednesday, FEATURES; Pg. 8,
1632 words, Jimmy Lee Shreeve
201. TECHNOLOGY ENEMY WITHIN
The Statesman (India), June 5, 2006 Monday, 1480 words
202. Top Cyber Security Post Still Unfilled After a Year
TechNews, July 12, 2006 Wednesday 3:54 AM GMT, TECHNOLOGY; Special;
08, 1193 words, By Brian Krebs, washingtonpost.com Staff Writer
203. Top Cyber Security Post Still Unfilled After a Year
Washingtonpost.com, July 12, 2006 Wednesday 4:40 PM EST, TECHNOLOGY,
1193 words, Brian Krebs, washingtonpost.com Staff Writer,
washingtonpost.com
204. Top Cyber Security Post Still Unfilled After a Year
TechNews, 1216 words, Brian Krebs; washingtonpostcom Staff Writer
205. Scientists teaching power grid, dam operators how to thwart hackers
The Associated Press State & Local Wire, July 19, 2006 Wednesday
7:38 AM GMT, STATE AND REGIONAL, 335 words, By CHRISTOPHER SMITH,
Associated Press Writer
206. Agencies to Teach Cybersecurity Protection
Associated Press Online, July 19, 2006 Wednesday 9:57 PM GMT,
BUSINESS NEWS, 267 words, By CHRISTOPHER SMITH, Associated Press
Writer
207. Agencies to teach cybersecurity protection
AFX International Focus, July 19, 2006 Wednesday 11:13 PM GMT, 292 words
208. Agencies to teach cybersecurity protection
AFX.COM, July 19, 2006 Wednesday 11:13 PM GMT, 292 words
209. Agencies to teach cybersecurity protection
AFX - Asia, July 19, 2006 Wednesday 10:58 PM GMT, 292 words
210. TECHBITS: AI anniversary, Blog survey, Kids game, AIM for
business, Cybersecurity
The Associated Press, July 19, 2006 Wednesday 9:23 PM GMT, BUSINESS
NEWS, 1512 words, By The Associated Press
211. TECHBITS: AI anniversary, Blog survey, Kids game, AIM for
business, Cybersecurity
Associated Press Financial Wire, July 19, 2006 Wednesday 9:24 PM
GMT, BUSINESS NEWS, 1512 words, By The Associated Press
212. What happens when the Net is attacked?; That's the question an
obscure Homeland Security project is attempting to answer. So far, so
good.
Government Computer News, July 24, 2006 Monday, TECH-REPORT, 1856
words, William Jackson, GCN Staff
213. CYBER SECURITY ISSUES
CQ Congressional Testimony, July 28, 2006 Friday, CAPITOL HILL
HEARING TESTIMONY, 3289 words
214. CYBER SECURITY ISSUES
CQ Congressional Testimony, July 28, 2006 Friday, CAPITOL HILL
HEARING TESTIMONY, 3290 words
215. Is Your Cyberterrorism Prevention Effort Missing the Mark?
Security Director's Report, August 2006, CORPORATE SECURITY, 2136 words
216. Control Systems Can't Hide from Hackers, Don't Ruffle Researchers
WASHINGTON INTERNET DAILY, August 23, 2006 Wednesday, TODAY'S NEWS, 772 words
217. Paller: Government cybersecurity gets an F
InfoWorld, September 11, 2006 Monday, BREAKING NEWS, 692 words
218. FUTURE OF DHS CYBER AND TELECOMMUNICATIONS SECURITY
CQ Congressional Testimony, September 13, 2006 Wednesday, CAPITOL
HILL HEARING TESTIMONY, 3277 words
219. SECURITY LACKING IN NETWORKS CONTROLLING CRITICAL INFRASTRUCTURE
Cox News Service, September 28, 2006 Thursday, Financial Pages, 2133 words
220. IDAHO LAB A PRIME DEFENDER OF NATION'S SCADA NETWORKS
Cox News Service, September 28, 2006 Thursday, Financial Pages, 588 words
221. With SCADA. <PUB>Cox News Service</PUB>
Cox News Service, September 28, 2006 Thursday, Financial Pages, 157 words
222. With SCADA. <PUB>Cox News Service</PUB>
Cox News Service, September 28, 2006 Thursday, Financial Pages, 229 words
223. Federal security rules fueling energy company anxiety; SCADA
systems seen as vulnerable to cyberattack.
Network World, September 28, 2006, Pg. 1, 1121 words, Ellen Messmer
224. Eds: Corrects number in third section from 24 to 17 percent.
Cox News Service, September 29, 2006 Friday, Financial Pages, 157 words
225. Computer networks control America's electricity infrastructure,
its nuclear power plants, its pipelines and many other functions. But
because the networks have exposure to the Internet, it makes them ...
VULNERABLE TO HACKER ATTACKS
The Atlanta Journal-Constitution, October 1, 2006 Sunday, BUSINESS;
Pg. 1G, 1964 words, BOB KEEFE; Cox Washington Bureau
226. Cox News Service, October 1, 2006 Sunday, Domestic;
Non-Washington; General News Item, 1692 words, BOB KEEFE
227. Idaho lab in security race; Hardware suppliers can test the
safety of equipment
The Atlanta Journal-Constitution, October 1, 2006 Sunday, BUSINESS;
Pg. 5G, 497 words, BOB KEEFE; Cox Washington Bureau
228. Next attack could be silent, digital
Austin American-Statesman (Texas), October 2, 2006 Monday, NEWS; Pg.
A01, 2021 words, Bob Keefe WEST COAST BUREAU
229. Government offers companies expert hacker advice
Austin American-Statesman (Texas), October 2, 2006 Monday, NEWS; Pg.
A09, 574 words, Bob Keefe WEST COAST BUREAU
230. NUCLEAR SAFETY: U.S. plant computer systems vulnerable to
hackers, experts say
Greenwire, October 2, 2006 Monday, Security, 367 words
231. Workshops identify threats to process control systems
Oil & Gas Journal, October 9, 2006, PROCESSING; SPECIAL Report; Pg.
44, 4446 words, Annie McIntyre, Sandia National Laboratories
Albuquerque. Annie McIntyre is a senior member of the technical staff
at Sandia National Laboratories, Albuquerque. In the Networked Systems
Survivability organization, her primary areas of research include
threats, vulnerabilities, and protection of critical infrastructure
under the I3P program and leading security metrics efforts under the
National SCADA Test Bed. Previous to this, McIntyre worked extensively
in the defense sector on information warfare and survivability,
serving as IO Laboratory Chief and Information Warfare Lead for Future
Combat Systems Assessments at the Army Research Laboratory. She
previously served as New Mexico Regional Manager for Concurrent
Technologies Corp. and performed systems analysis and engineering
under the Human Genome Project. She holds a BS from New Mexico Tech,
an MS from Troy State University, and is a member of AAPG.; Jason
Stamp, Sandia National Laboratories Albuquerque. Jason Stamp is a
principal member of the technical staff at Sandia National
Laboratories, where he has more than 7 years' experience in the field
of information systems and national security. His research areas
include the development of improved tools for information security and
the integration of network technology into security architectures for
infrastructure, homeland security, and the military. Stamp holds a BS
(1995) in electrical engineering from the Rose-Hulman Institute of
Technology, Terre Haute, Ind., and a PhD (1998) in electrical
engineering from Clemson University. Jason is a member of the Power
Engineering Society of IEEE.; Ben Cook, Sandia National Laboratories
Albuquerque. Ben Cook is a principal member of the technical staff at
Sandia National Laboratories. He currently leads research efforts on
robust critical infrastructure systems and supports the management of
Sandia's process control research and development. Cook is the
technical project leader for the I3P's process control security
research program, and Sandia's project lead on the DHS LOGIIC project.
His technical background is in modeling and simulation with an
emphasis on large-scale natural and engineered systems. Cook holds a
ScD in information technology from the Massachusetts Institute of
Technology.; Andrew Lanzone, Sandia National Laboratories Albuquerque.
Andrew Lanzone is a senior member of the technical staff at Sandia
National Laboratories. He has several years experience in both
cryptographic research and applied cryptography with an emphasis on
algorithm development and software programming. Lanzone spent several
years designing and analyzing cryptographic protocols and digital
security systems. He holds a BS in electrical engineering from Grove
City College, Pa., and a Masters of computer science and engineering
from the University of Michigan.
232. LOGIIC HELPS KEEP OIL, GAS CONTROL SYSTEMS SAFE
US Fed News, October 9, 2006 Monday 3:44 AM EST, 642 words, US Fed News
233. Verano Expands Worldwide Distribution Network for Industrial Defender(R)
MediaNet Press Release Wire, October 17, 2006 Tuesday 10:02 PM AEST,
938 words
234. VERANO EXPANDS WORLDWIDE DISTRIBUTION NETWORK
Asia Pulse, October 18, 2006 Wednesday 1:39 PM EST, NATIONWIDE
INTERNATIONAL NEWS, 924 words
235. United Kingdom: Be Vigilant Against Identity Theft
Mondaq Business Briefing, November 22, 2006, 6307 words
236. Applied Watch Technologies - President & CEO Inter
Fox News Network, December 4, 2006 Monday, BUSINESS, 554 words, Neil Cavuto
237. DHS, industry use LOGIIC to combat cyberthreats; Joint exercise
focuses on protecting systems at oil and gas facilities
Government Computer News, December 11, 2006 Monday, NEWS, 966 words,
Kerri Hostetler, GCN Staff
238. Enterprise security measures may heighten vulnerability of
plant-floor solutions
Manufacturing Business Technology, January 1, 2007, INTEGRATION AND
INFRASTRUCTURE; Cyber Threat Management; Pg. 50, 646 words, By Staff
239. THREAT ASSESSMENT
CQ Congressional Testimony, January 11, 2007 Thursday, CAPITOL HILL
HEARING TESTIMONY, 3569 words
240. CYBER SECURITY - PLANT SAFETY; Beating the hackers
Process Engineering, February 5, 2007, Pg. 21, 1150 words
241. Pexx Brings a Heightened Level of Awareness With Wireless; A
Better "Sense" of the World Around Us
Market Wire, February 8, 2007 Thursday 6:00 AM GMT, 1624 words
242. Two new terror threats: Proposed Vancouver system puts city at
risk of attack, according to police
The Vancouver Sun (British Columbia), February 14, 2007 Wednesday,
NEWS; Pg. A1 , 1080 words, Randy Shore, Vancouver Sun; with a file
from CanWest News Service
243. Games wireless plan flawed
The Calgary Herald (Alberta), February 14, 2007 Wednesday, NEWS; Pg.
A3, 255 words, Randy Shore, CanWest News Service
244. WiFi could post threat during Vancouver Olympics: police expert
Prince Rupert Daily News (British Columbia), February 15, 2007
Thursday, NEWS; Pg. 7, 506 words, Randy Shore, CanWest News Service
245. 10 Control System Security Threats; Based on work done by the
North American Electric Reliability Corp., these control system
vulnerabilities are the place to start to prevent a security breach.
Control Engineering, April 1, 2007, FEATURES; Cover Story; Pg. 38,
3398 words, Peter Welander, Control Engineering. Peter Welander is
process industries editor. Reach him at
peter.welander@...dbusiness.com .
246. CYBER INSECURITY
CQ Congressional Testimony, April 19, 2007 Thursday, CAPITOL HILL
HEARING TESTIMONY, 3077 words
247. Convergence of physical and IT security is becoming a necessity
Government Computer News, May 9, 2007 Wednesday, DAILY-UPDATES, 481
words, William Jackson, GCN Daily Updates
248. Verano Relaunches as Industrial Defender Inc. to Fight Increasing
Global Security Threats to Critical Infrastructures; Company
Introduces World's First Integrated Industrial Cyber Security Solution
with the Launch of its Co-Managed Security Services (CMSS) Offering
PR Newswire US, May 15, 2007 Tuesday 12:00 PM GMT, 1053 words
249. FOREIGN OWNERSHIP OF INFRASTRUCTURE
CQ Congressional Testimony, May 16, 2007 Wednesday, CAPITOL HILL
HEARING TESTIMONY, 1819 words
250. Ten Control System security threats
PACE (Process & Control Engineering) (Australia), June 2007, Pg. 18,
3299 words
251. RWE boosts security on Scada networks
Computer Weekly, June 19, 2007, NEWS, 454 words
252. From ID To IP Theft
Industry Week, July 2007, INFORMATION TECHNOLOGY; Pg. 49, 434 words,
BY BRAD KENNEY
253. Hacker shows flaw in software that controls key infrastructure
Associated Press Financial Wire, August 5, 2007 Sunday 1:20 AM GMT,
BUSINESS NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer
254. Hacker shows flaw in software that controls key infrastructure
The Associated Press, August 5, 2007 Sunday 1:20 AM GMT, BUSINESS
NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer
255. Hacker shows flaw in software that controls key infrastructure
Associated Press Financial Wire, August 5, 2007 Sunday 12:22 AM GMT,
STATE AND REGIONAL, 681 words, By JORDAN ROBERTSON, AP Technology
Writer
256. Hacker shows flaw in software that controls key infrastructure
The Associated Press State & Local Wire, August 5, 2007 Sunday 12:22
AM GMT, STATE AND REGIONAL, 681 words, By JORDAN ROBERTSON, AP
Technology Writer
257. Researcher: Flaw Exposes Hack Threat
Associated Press Financial Wire, August 5, 2007 Sunday 8:01 AM GMT,
BUSINESS NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer
258. Researcher: Flaw Exposes Hack Threat
Associated Press Financial Wire, August 5, 2007 Sunday 8:01 AM GMT,
BUSINESS NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer
259. Flaw Shown in Infrastructure Software
Associated Press Financial Wire, August 5, 2007 Sunday 1:20 AM GMT,
BUSINESS NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer
260. Researcher: Flaw Exposes Hack Threat
Associated Press Online, August 5, 2007 Sunday 1:58 AM GMT, BUSINESS
NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer
261. Researcher: Flaw Exposes Hack Threat
Associated Press Online, August 5, 2007 Sunday 8:01 AM GMT, BUSINESS
NEWS, 586 words, By JORDAN ROBERTSON, AP Technology Writer
262. Fred Thompson Enters GOP Race; John Walsh Weighs in on Fight
Against Child Molesters; Hillary Clinton Blocking 9/11 DVD Release
CNN, September 6, 2007 Thursday, NEWS; Domestic, 7079 words, Glenn Beck
263. MULTIPLE EFFORTS TO SECURE CONTROL SYSTEMS ARE UNDER WAY, BUT
CHALLENGES REMAIN
GAO Reports, September 10, 2007, GAO REPORT, 8864 words
264. Authority eyes $320K in security improvements
Chambersburg Public Opinion (Pennsylvania), October 11, 2007
Thursday, LOCAL, 617 words, By ADAM KULIKOWSKI Staff writer
265. SECURITY OF THE ELECTRIC GRID
CQ Congressional Testimony, October 17, 2007 Wednesday, CAPITOL HILL
HEARING TESTIMONY, 3961 words
266. SECURITY OF THE ELECTRIC GRID
CQ Congressional Testimony, October 17, 2007 Wednesday, CAPITOL HILL
HEARING TESTIMONY, 7029 words
267. New U.S. tack to defend power grid
Christian Science Monitor, October 30, 2007, Tuesday, USA; Pg. 1,
1297 words, Mark Clayton Staff writer of The Christian Science Monitor
268. Security
Control Engineering, November 1, 2007, SUPPLEMENTS; The Risk That
Cannot Be Ignored; Pg. 1, 526 words, Staff
269. Taking steps to secure your process control system
Control Engineering, November 1, 2007, SUPPLEMENTS; The Risk That
Cannot Be Ignored; Pg. 1, 612 words, Staff
270. Cyber Risk Assessment; The process of plotting an appropriate
cyber security strategy must begin with an analysis of where you are
now.
Control Engineering, November 1, 2007, SUPPLEMENTS; Cyber Security;
Pg. 11, 972 words, Todd Nicholson, Industrial Defender. Todd
Nicholson is chief marketing officer, Industrial Defender Inc. Reach
him at tnicholson@...ustrialdefender.com .
271. Experts worry hackers will endanger economy
Newhouse News Service, December 26, 2007 Wednesday 3:09 PM EST,
DOMESTIC, 816 words, By GARRY LENTON
272. CYBERTERRORISM / COMPUTER HACKERS PUT THE NATION'S ECONOMY AT
RISK // GUARDING AGAINST HIGH-TECH TERRORISM
Patriot News (Harrisburg, Pennsylvania), December 26, 2007
Wednesday, A SECTION; Pg. A01, 844 words, GARRY LENTON, Of The
Patriot-News
273. Hackers may threaten economy; Without better security, nation's
industries could lose billions, experts warn
The Houston Chronicle, December 27, 2007 Thursday, A; Pg. 8, 804
words, GARRY LENTON, Newhouse News Service
274. LESSONS LEARNED: AURORA ATTACK; Test gets major media hype, but
SCADA vulnerabilities remain
PUBLIC UTILITIES FORTNIGHTLY, January, 2008, SECTION; Pg. 41, 1213
words, BY LORI A. BURKHART; Lori Burkhart is managing editor of Public
Utilities Fortnightly. Email her at lab@....com
275. SMART-GRID SECURITY; Intelligent power grids present vexing cyber
security problems
PUBLIC UTILITIES FORTNIGHTLY, January, 2008, SECTION; Pg. 43, 1238
words, BY MICHAEL T. BURR; Michael T. Burr is editor-in-chief of
Public Utilities Fortnightly. Email him at burr@....com
276. CIA says hackers brought down power grid
UPI Energy, January 18, 2008 Friday 7:58 PM EST, 393 words
277. Hackers Are Going After Power Grids [Outage]
Gizmodo, January 19, 2008 Saturday 5:30 PM EST, 198 words
278. Hackers Take Control of Your Electricity and Water [Hacking]
io9, January 22, 2008 Tuesday 8:00 PM EST, 260 words
279. Cyber extortionists switch off the lights
The Australian Financial Review, January 22, 2008 Tuesday, ABIX NEWS
SUMMARIES; Pg. 47, 130 words, Julian Bajkowski
280. Which Candidate Has Best Economic Plan?; Did Over-Medication
Cause Heath Ledger`s Death?; Author Says Looks Matter for Presidential
Candidates
CNN, January 23, 2008 Wednesday, NEWS; Domestic, 7626 words, Glenn Beck
281. Tier-3: Tier-3 says hackers hijacking power grids to extort
ransom is worrying trend
M2 Presswire, January 24, 2008, 486 words
282. Does Race Matter in `08?; Did Over-Medication Cause Heath
Ledger`s Death?; Sean Penn at Odds with San Francisco Paper
CNN, January 25, 2008 Friday, NEWS; Domestic, 7348 words, Glenn Beck
283. Computer Weekly, January 29, 2008, NEWS, 247 words, Ian Grant
284. Computer Weekly, January 29, 2008, NEWS, 248 words, Ian Grant
285. Security Experts Announce New East Coast Computer Security
Conference - SOURCE 2008; Famed L0pht hackers and top security
executives to discuss state of security industry and share best
practices in intimate setting
PR Newswire, January 31, 2008 Thursday 10:57 PM GMT, 620 words
286. Change default credentials
SC (Secure Computing) Magazine, February 1, 2008, Pg. 17, 686
words, Ken Munro
287. Cyber rules guard grid
ELECTRONIC ENGINEERING TIMES, February 4, 2008, BUSINESS; Pg. 25,
991 words, Sheila Riley
288. Quantifying Cyber Security Risk; Part 1: Basic risk analysis
techniques can help you understand the cyber threats to industrial
control systems and SCADA systems overseeing electric utility
distribution. This step will help as you begin planning a defensive
strategy.
Control Engineering, March 1, 2008, FEATURES; Inside Process; Pg.
IP12, 2000 words, Morgan Henrie, University of Alaska; Paul Liddell,
Alyeska Pipeline Service. M. Henrie is a research assistant professor
of logistics at the University of Alaska, Anchorage. Reach him at
afmeh1@....alaska.edu . P. Liddell is SCADA supervisor at Alyeska
Pipeline Service Co. Reach him at liddellp@...eska-pipeline.com .
289. Arab countries at threat from potential disruption to their
logistics, utility and oil and gas networks
Middle East Company News Wire, March 25, 2008 Tuesday 9:20 AM GMT, 669 words
290. Hydrocarbon Processing, April 2008 , HPINNOVATIONS, 4039 words
291. As Cellular Carriers Cap Unlimited Data Plans, Proxicast
Introduces Cell-Sentry Cost Control and Bandwidth Management
Capabilities for its 3G Cellular Routers
Product News Network, April 3, 2008 Thursday 7:36 AM GMT, 1196 words
292. Slaying the hackers; Columns
The Age (Melbourne, Australia), April 15, 2008 Tuesday, COMPUTERS;
Next; Pg. 7, 659 words, Penelope Debelle
293. Frost & Sullivan Acknowledges Industrial Defender as Market
Leader in Critical Infrastructure Cyber Security Protection;
Industrial Defender Selected as Frost & Sullivan Company of the Year
for Global Risk Management in Process Control and SCADA
Market Wire, April 16, 2008 Wednesday 5:30 AM GMT, 760 words
294. Homeland Security's Electric Grid Focus Could Drive NERC Revisions
EnergyWashington Week, April 16, 2008, 880 words
295. Frost & Sullivan Recognizes Industrial Defender's Leadership of
Critical Infrastructure Cyber Security Protection Markets
Business Wire, April 16, 2008 Wednesday 11:45 AM GMT, 1082 words
296. In cyberspace they can't hear you scream; The essay
Sydney Morning Herald (Australia), April 19, 2008 Saturday, NEWS AND
FEATURES; News Review; Pg. 29, 1836 words, Tom Allard
297. Terror's new frontier: cyberspace; SECURITY
The Age (Melbourne, Australia), April 19, 2008 Saturday, INSIGHT;
Pg. 4, 1662 words, Tom Allard - Tom Allard is a Fairfax reporter
298. Quantifying Cyber Security Risk; Part 2: Understanding cyber
incidents and their severity can help you plot a strategy to prevent
them.
Control Engineering, May 1, 2008, FEATURES; Inside Process; Pg. P12,
1393 words, Morgan Henrie, University of Alaska; Paul Liddell,
Alyeska Pipeline Service. Morgan Henrie is a research assistant
professor of logistics at the University of Alaska, Anchorage. Reach
him at afmeh1@....alaska.edu . Paul Liddell is SCADA supervisor at
Alyeska Pipeline Service Co. Reach him at
liddellp@...eska-pipeline.com .
299. Cyber Security: Are We Doing Enough?
Electric Light & Power, May 2008 - June 2008, INDUSTRY REPORT; Pg.
20, 2414 words, by Nancy Spring, managing editor
300. Power plants open to hacker attack; A software package widely
used to automate power stations and production lines has a serious
security vulnerability
New Scientist, May 17, 2008, TECHNOLOGY; News; Pg. 25, 126 words, Staff
301. PANEL III OF A HEARING OF THE U.S.-CHINA ECONOMIC AND SECURITY
REVIEW COMMISSION; SUBJECT: CHINA'S PROLIFERATION PRACTICES AND THE
DEVELOPMENT OF ITS CYBER AND SPACE WARFARE CAPABILITIES; CHAIRED BY:
COMMISSIONER PETER T.R. BROOKES, SENIOR FELLOW FOR NATIONAL SECURITY
AFFAIRS AND DIRECTOR, ASIAN STUDIES CENTER, THE HERITAGE FOUNDATION;
WITNESSES: COLONEL GARY D. MCALUM, DIRECTOR OF OPERATIONS, JOINT TASK
FORCE FOR GLOBAL NETWORK OPERATIONS, UNITED STATES STRATEGIC COMMAND;
TIMOTHY L. THOMAS, ANALYST, THE FOREIGN MILITARY STUDIES OFFICE;
LOCATION: 562 DIRKSEN SENATE OFFICE BUILDING, WASHINGTON, D.C.
Federal News Service, May 20, 2008 Tuesday, CAPITOL HILL HEARING, 15269 words
302. HEARING OF THE U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION
(AS RELEASED BY THE USCC); SUBJECT: CHINA'S PROLIFERATION PRACTICES,
AND THE DEVELOPMENT OF ITS CYBER AND SPACE WARFARE CAPABILITIES;
CHAIRED BY: COMMISSIONERS PETER T.R. BROOKES AND WILLIAM A. REINSCH
(HEARING COCHAIRS); WITNESSES: PANEL I: CONGRESSIONAL PERSPECTIVES
REPRESENTATIVE ZOE LOFGREN (D-CA) PANEL II: PRC CYBER SPACE
CAPABILITIES BRIGADIER GENERAL JEFFREY C. HORNE, USA; DEPUTY
COMMANDER, JOINT FUNCTIONAL COMPONENT COMMAND FOR SPACE, UNITED STATES
STRATEGIC COMMAND, VANDENBERG AIR FORCE BASE; ASHLEY J. TELLIS, SENIOR
ASSOCIATE, CARNEGIE ENDOWMENT FOR INTERNATIONAL PEACE; WILLIAM B.
SCOTT, FORMER BUREAU CHIEF, AVIATION WEEK & SPACE COAUTHOR: "SPACE
WARS: THE FIRST SIX HOURS OF WORLD WAR III" PANEL III: PRC CYBER SPACE
CAPABILITIES STATEMENT OF COLONEL GARY D. MCALUM, DIRECTOR OF
OPERATIONS, JOINT TASK FORCE FOR GLOBAL NETWORK OPERATIONS, UNITED
STATES STRATEGIC COMMAND; TIMOTHY L. THOMAS, ANALYST, FOREIGN MILITARY
STUDIES OFFICE; JAMES C. MULVENON, CENTER FOR INTELLIGENCE RESEARCH
AND ANALYSIS, DEFENSE GROUP, INC. PANEL IV: ADMINISTRATION
PERSPECTIVES STATEMENT OF MS. PATRICIA MCNERNEY, PRINCIPAL DEPUTY
ASSISTANT SECRETARY OF STATE FOR INTERNATIONAL SECURITY AND
NONPROLIFERATION PANEL IV: DISCUSSION, QUESTIONS AND
ANSWERS.................................... 94 PANEL V: CHINA'S
PROLIFERATION PRACTICES STEPHEN G. RADEMAKER, SENIOR COUNSEL, BGR
HOLDING, LLC; HENRY D. SOKOLSKI, EXECUTIVE DIRECTOR, THE
NONPROLIFERATION POLICY EDUCATION CENTER; LOCATION: 562 DIRKSEN
SENATE OFFICE BUILDING, WASHINGTON, D.C.
Federal News Service, May 20, 2008 Tuesday, PRESS CONFERENCE OR
SPEECH, 59704 words
303. TVA Power Plants Vulnerable to Cyber Attacks, GAO Finds;
Regulators Want Authority to Require Security Upgrades Industry-wide
Washingtonpost.com, May 21, 2008 Wednesday 12:01 AM EST, 1320 words,
Brian Krebs, washingtonpost.com Staff Writer, washingtonpost.com
304. Largest public power grid at cyber risk, feds say; The TVA lacks
basic security measures, U.S. Government Accountability Office says
Network World, May 21, 2008, 560 words, Tim Greene
305. TVA NEEDS TO ADDRESS WEAKNESSES IN CONTROL SYSTEMS AND NETWORKS
GAO Reports, May 21, 2008, GAO REPORT, 16267 words
306. TERRORISM Hi-tech threat close to home
The Advertiser (Australia), May 24, 2008 Saturday, MAGAZINE; Pg. 5,
629 words, Anthony Johnson, Miles Kemp
307. U.S. House Security Panel Frets Over Electric Grid; System Still
Vulnerable; Subcommittee chairman bothered that regulators have had
little progress
Investor's Business Daily, May 28, 2008 Wednesday, INTERNET &
TECHNOLOGY; Q & A; Pg. A04, 766 words, DONNA HOWELL
308. U.S. House Security Panel Frets Over Electric Grid System Still
Vulnerable Subcommittee chairman bothered that regulators have had
little progress
Investor's Business Daily, May 28, 2008 Wednesday, A; Q AND A; Pg.
A04, 766 words, DONNA HOWELL
309. Features
Power Magazine, June 2008, GRID SECURITY; Pg. 40, 2298 words, By
Andrew Bartels, Aegis Technologies Inc.
310. RISK ASSESSMENT: New Data Focuses on Handling Linked Security Breaches
Security Director's Report, June 2008, CORPORATE SECURITY, 1593 words
311. Cyber Incident Blamed for Nuclear Power Plant Shutdown
Washingtonpost.com, June 5, 2008 Thursday 1:46 PM EST, 1255 words,
Brian Krebs, washingtonpost.com Staff Writer, washingtonpost.com
312. Utilities vulnerable to hackers, experts say
CNN.com, June 11, 2008 Wednesday 10:36 AM EST, TECHNOLOGY, 581 words
313. Security hole exposes utilities to Internet attack
The Associated Press, June 11, 2008 Wednesday 8:32 AM GMT, BUSINESS
NEWS, 580 words, By JORDAN ROBERTSON, AP Technology Writer
314. Security hole exposes utilities to Internet attack
The Associated Press, June 11, 2008 Wednesday 11:48 AM GMT, BUSINESS
NEWS, 580 words, By JORDAN ROBERTSON, AP Technology Writer
315. Security hole exposes utilities to Internet attack
Associated Press Financial Wire, June 11, 2008 Wednesday 11:48 AM
GMT, BUSINESS NEWS, 580 words, By JORDAN ROBERTSON, AP Technology
Writer
316. Security hole exposes utilities to Internet attack
Associated Press Financial Wire, June 11, 2008 Wednesday 8:32 AM
GMT, BUSINESS NEWS, 580 words, By JORDAN ROBERTSON, AP Technology
Writer
317. Security hole exposes utilities to Internet attack
Associated Press Online, June 11, 2008 Wednesday 8:54 AM GMT,
BUSINESS NEWS, 580 words, By JORDAN ROBERTSON, AP Technology Writer
318. Security hole exposes utilities to Internet attack
Associated Press Online, June 11, 2008 Wednesday 11:48 AM GMT,
BUSINESS NEWS, 580 words, By JORDAN ROBERTSON, AP Technology Writer
319. Software security hole shows utilities and other infrastructure
vulnerable to hacking
Associated Press Worldstream, June 11, 2008 Wednesday 9:17 AM GMT,
INTERNATIONAL NEWS, 584 words, By JORDAN ROBERTSON, AP Technology
Writer
320. Better safe than sorry
Utility Week, June 13, 2008, EARLY SECTION, 1411 words
321. Top Layer TopResponse Research Team Delivers Protection against
Critical CitectSCADA Buffer Overflow Vulnerability; Protection Pack
with the Top Layer IPS 5500 Protects against Remote Attacks on SCADA
Systems
Business Wire, June 23, 2008 Monday 1:52 PM GMT, 649 words
322. FERC RECEIVES COMMENT OF KENNETH R BASS
US Fed News, June 23, 2008 Monday 6:22 AM EST, 723 words, US Fed News
323. Air Liquide Deploys Top Layer's IPS 5500 Across 100 Sites
Nationwide to Protect Industrial Network; Air Liquide Turns to IPS
5500 to Protect Industrial Network and SCADA Systems that It Relies on
for Operation of Plant Production Across the U.S.
Business Wire, June 23, 2008 Monday 1:00 PM GMT, 889 words
324. Nokia Plans Mobile Software Surge With Open-Source Symbian
TECHWEB, June 25, 2008 Wednesday 6:08 PM GMT, 2084 words
325. Top Layer TopResponse Research Team Unveils CitectSCADA Protection Pack
Wireless News, June 27, 2008 Friday, 232 words
326. Air Liquide Deploys Top Layer's IPS 5500 Across 100 Sites Nationwide
Wireless News, June 27, 2008 Friday, 323 words
327. Air Liquide to Utilize Top Layer's IPS 5500 Intrusion
Prevention Solutions
Health & Beauty Close-up, June 29, 2008 Sunday, 552 words
328. NAS Sees Aging Grid Crisis A Threat To U.S. Even Without Terrorism
EnergyWashington Week, July 8, 2008, 833 words
329. NAS SEES AGING GRID CRISIS AS THREAT TO U.S. EVEN WITHOUT TERRORISM
Defense Environment Alert, July 22, 2008, 836 words
330. Rapid7's Latest NeXpose Release Offers Breakthrough Performance,
Higher Productivity and Improved Compliance for Vulnerability
Assessment Scanning; Version 4.7 of NeXpose Unified Vulnerability
Management Features Critical Infrastructure Protection, High
Performance Scanning for Large Enterprise Environments and
Vulnerability Exception Reporting
Business Wire, July 31, 2008 Thursday 12:47 PM GMT, 930 words
331. Bit9 Announces Application Whitelisting Solution for
Point-of-Sale; Easiest, most effective way to control and secure POS
systems and kiosks
PR Newswire, August 6, 2008 Wednesday 6:08 PM GMT, 952 words
332. Bit9 Announces Application Whitelisting Solution for Point-of-Sale
Product News Network, August 18, 2008 Monday 7:38 AM GMT, 917 words
333. Georgia cyberwar overblown
Network World, August 19, 2008, Pg. 15, 539 words, Andreas M. Antonopoulos
334. SUBCOMMITTEE ON ENERGY AND AIR QUALITY HEARING, PROTECTING GRID
FROM CYBERSECURITY THREATS.
States News Service, September 11, 2008 Thursday, 649 words, States
News Service
335. REP. DINGELL ISSUES STATEMENT ON PROTECTING GRID FROM
CYBERSECURITY THREATS
US Fed News, September 11, 2008 Thursday 1:21 AM EST, 650 words, US Fed News
336. ELECTRIC GRID AND CYBER-SECURITY THREATS
CQ Congressional Testimony, September 11, 2008 Thursday, CAPITOL HILL
HEARING TESTIMONY, 670 words
337. ELECTRIC GRID AND CYBER-SECURITY THREATS
CQ Congressional Testimony, September 11, 2008 Thursday, CAPITOL HILL
HEARING TESTIMONY, 3584 words
338. WIRELESS; Attitudes to wireless
Process Engineering, September 15, 2008, Pg. 29, 1357 words
339. SCADA Security: Of "Paramount Importance"
MENA English (Middle East and North Africa Financial Network),
September 23, 2008 Tuesday, 696 words
340. Paramount launches new division for SCADA and Process Control Security
Middle East Company News Wire, September 24, 2008 Wednesday 10:20 AM
GMT, 666 words
341. PARAMOUNT LAUNCHES NEW DIVISION FOR SCADA AND PROCESS CONTROL SECURITY
AME Info - ME Company Newswire, September 24, 2008 Wednesday, 663 words
342. Paramount signs deal with Industrial Defender
The Nation (Pakistan), September 24, 2008 Wednesday, 279 words, OUR
STAFF REPORTER
343. Paramount signs deal with Industrial Defender
The Nation (Pakistan), September 24, 2008 Wednesday, NATIONWIDE
INTERNATIONAL NEWS, 279 words
344. Computer Weekly, October 7, 2008, NEWS, 657 words, Danny
Dresner, National Computing Centre
345. Supplies Important SCADA-Specific Security Signatures; Provides
Industry-Leading Protection for Critical Infrastructure Networks
Market News Publishing, October 13, 2008 Monday 5:28 AM PST, 1070 words
346. Secure Computing Supplies Important SCADA-Specific Security
Signatures; Provides Industry-Leading Protection for Critical
Infrastructure Networks; Secure Firewall Supplies Strongest Firewall
on the Market to Ensure That SCADA Control Networks Are Fully
Protected
Market Wire, October 13, 2008 Monday 6:00 AM GMT, 1021 words
347. Nation's Largest E-Discovery and Digital Forensics Conference to
Feature Speakers from the FBI, US Congress, Georgian Ambassador to the
US, Former KGB Major General, and Leading Government and Private
Sector Cyber Crime Experts
Business Wire, October 14, 2008 Tuesday 11:00 AM GMT, 652 words
348. Secure Computing supplies important SCADA-specific security signatures
Al-Bawaba, October 23, 2008 Thursday 4:57 AM EST, 469 words, By
Al-Bawaba Reporters
349. Secure Computing supplies important SCADA-specific security signatures
Albawaba.com, October 23, 2008 Thursday, 582 words
350. Secure Computing supplies important SCADA-specific security signatures
Middle East Company News Wire, October 27, 2008 Monday 10:23 AM GMT,
565 words
351. SECURE COMPUTING SUPPLIES IMPORTANT SCADA-SPECIFIC SECURITY SIGNATURES
AME Info - ME Company Newswire, October 27, 2008 Monday, 563 words
352. SECURE COMPUTING USES SCADA-SPECIFIC SECURITY SIGNATURES
COMPUTER SECURITY UPDATE, November 2008, 715 words
353. Hackers vs slackers [control security]
IEE Engineering & Technology, November 2008, Pg. 40, 107 words
354. No Respect
Information Security, November 2008, LAYER 8; Pg. 16, 597 words, BY
JAY G. HEISER. Jay G. Heiser is a London-based research vice
president at Gartner. Send your comments on this column to
feedback@...osecuritymag.com
355. PR Newswire Summary of Technology Copy, Nov. 3, 2008
PR Newswire, November 3, 2008 Monday 9:22 PM GMT, 6752 words
356. Domestic Infrastructure-Critical Vulnerabilities and Protection
discussed at TAG-College
Al-Bawaba, November 6, 2008 Thursday 8:04 AM EST, 415 words, By
Al-Bawaba Reporters
357. Domestic Infrastructure-Critical Vulnerabilities and Protection
discussed at TAG-College
Albawaba.com, November 6, 2008 Thursday, 467 words
358. DOMESTIC INFRASTRUCTURE-CRITICAL VULNERABILITIES AND PROTECTION
DISCUSSED AT TAG-COLLEGE
AME Info - ME Company Newswire, November 8, 2008 Saturday, 543 words
359. Domestic infrastructure-critical vulnerabilities and protection
discussed at TAG-College
Middle East Company News Wire, November 8, 2008 Saturday 1:51 PM
GMT, 546 words
360. Green Hills Software Announces Launch of INTEGRITY Global
Security, LLC; Delivering the World's Most Secure Technology
Solutions
Marketwire, November 17, 2008 Monday 5:00 AM GMT, 1090 words
361. Check Point Delivers Total Security for Branch Offices with
Upgrade to UTM-1 Edge Appliances; Extended Unified Threat Management
Capabilities with New Multi-Layer Messaging Security Deliver Best
All-Inclusive Security Solution
Business Wire, November 18, 2008 Tuesday 1:30 PM GMT, 967 words
362. Cyber Security Reaches "Tipping Point" in 2008; Attacks on
Critical Infrastructure Systems and Cyber Warfare Will Increase in
2009; New VeriSign iDefense Report Looks Back at 2008's Most Serious
Security Threats; Outlines New Trends and Security Disruptors to
Develop in 2009
Marketwire, December 16, 2008 Tuesday 9:17 AM GMT, 979 words
363. Associated Press Financial Wire, December 16, 2008 Tuesday 5:17
PM GMT, BUSINESS NEWS, 1041 words
364. VeriSign iDefense Report: Cyber Security Reaches "Tipping Point" in 2008
Entertainment Close-up, December 28, 2008 Sunday, 661 words
365. VeriSign iDefense Report: Cyber Security Reaches "Tipping Point" in 2008
Wireless News, December 29, 2008 Monday, 661 words
366. Cyber Security Hits Home; If you've been wondering if and when
you might be forced to address cyber security issues with your process
control or SCADA systems, watch efforts with electric utilities.
Implementations going on now could serve as models.
Control Engineering, January 1, 2009, FEATURES; Critical Systems;
Pg. 40, 2551 words, Peter Welander, Control Engineering. Peter
Welander is process industries editor. Reach him at
peter.welander@...dbusiness.com .
367. Cyber Security Hits Home.
Control Engineering, January 1, 2009, Pg. 40, 2663 words
368. Evolution or Revolution?
Transmission & Distribution World, January 1, 2009, Pg. 67, 2234
words, By Gene Wolf, Technical Writer
369. Who goes there?
Utility Week, January 30, 2009, FEATURES, 1645 words
370. Who goes there?
Utility Week, January 30, 2009, FEATURES, 1645 words
371. Who goes there?
Utility Week, January 30, 2009, FEATURES, 1645 words
372. HEARING OF THE SENATE SELECT COMMITTEE ON INTELLIGENCE; SUBJECT:
CURRENT AND PROJECTED NATIONAL SECURITY THREATS TO THE UNITED STATES;
WITNESS: ADMIRAL DENNIS BLAIR, DIRECTOR OF NATIONAL INTELLIGENCE;
CHAIRED BY: SENATOR DIANNE FEINSTEIN (D-CA); LOCATION: 216 HART
SENATE OFFICE BUILDING, WASHINGTON, D.C.
Federal News Service, February 12, 2009 Thursday, CAPITOL HILL
HEARING, 16970 words
373. SEN. DIANNE FEINSTEIN HOLDS A HEARING ON THE "WORLD THREAT"
CQ Transcriptions "All materials herein are protected by United
States copyright law and may not be reproduced, distributed,
transmitted, displayed, published or broadcast without the prior
written permission of CQ Transcriptions. You may not alter or remove
any trademark, copyright or other notice from copies of the content.",
February 12, 2009 Thursday, 17678 words
374. NEW DNI STRESSES THREAT TO POWER GRID FROM CYBERSPACE
Inside the Pentagon, February 19, 2009, 677 words
375. Fighting wars in cyber space; Cyber attacks are a cheap and easy
way to attack another country, but now the Pentagon is learning how to
fight back
New Scientist, March 14, 2009, TECHNOLOGY; Feature; Pg. 18-19, 1084
words, Paul Marks
376. IMPROVING CYBERSECURITY; COMMITTEE: SENATE COMMERCE, SCIENCE AND
TRANSPORTATION
CQ Congressional Testimony, March 19, 2009 Thursday, CAPITOL HILL
HEARING TESTIMONY, 6807 words
377. Fortify Software: Fortify says energy network hacks can be
avoided through the use of code auditing and analysis
M2 PressWIRE, March 26, 2009 Thursday, 488 words
378. Major Brands
Communications Today (Contify.com), March 28, 2009, 20298 words
379. United States: Government seizes opportunity to build security
into new critical infrastructure
TendersInfo, March 31, 2009 Tuesday, 427 words, prashant03
380. United States : Government seizes opportunity to build security
into new critical infrastructure
TendersInfo, March 31, 2009 Tuesday, 427 words, pinto03
381. The Transparency of Wireless; Wireless networking and device
manufacturers have gone to great lengths to create products that are
secure, easy to work with, and operationally indistinguishable from
wired equivalents.
Control Engineering, April 1, 2009, FEATURES; Cover Story; Pg. 32,
2674 words, Peter Welander, Control Engineering. Peter Welander is
process industries editor. Reach him at
peter.welander@...dbusiness.com .
382. Cyberspies have compromised U.S. power grid, newspaper reports;
The intrusions appear to be pervasive, government officials tell The
Wall Street Journal
Network World, April 8, 2009, 667 words, Grant Gross; Ellen Messmer
383. United States: The US electrical grid: How big of a cyber target is it?
TendersInfo, April 9, 2009 Thursday, 470 words, shiv03
384. How serious is threat to power grid? Depends who you ask.
Network World, April 9, 2009, 953 words, Ellen Messmer
385. Lawmakers Seek to Tighten Cyber Regulation on Power Grids
Washingtonpost.com, April 29, 2009 Wednesday 3:11 PM EST, 828 words,
Brian Krebs, washingtonpost.com Staff Writer, washingtonpost.com
386. House Energy and Commerce Subcommittee on Communications,
Technology, and the Internet Hearing; Cybersecurity: Network Threats
and Policy Challenges; Testimony by Rodney Joffe, Senior Vice
President and Senior Technologist, Neustar
Congressional Documents and Publications, May 1, 2009, U.S. HOUSE OF
REPRESENTATIVES DOCUMENTS, 3096 words
387. INFRASTRUCTURE Is U.S. vulnerable to a cyber attack? THE GRID:
Few facts available in talk of cyber attacks much rhetoric, fewer
facts in debate over likelihood of penetration of America's grid
The Houston Chronicle, May 3, 2009 Sunday, B; Pg. 10, 1013 words, By
CHRIS BRONK, KEN MEDLOCK and DAN WALLACH
388. HEARING OF THE SENATE COMMITTEE ON ENERGY AND NATURAL RESOURCES;
SUBJECT: CYBERSECURITY AND CRITICAL ELECTRICITY INFRASTRUCTURE;
CHAIRED BY: SENATOR JEFF BINGAMAN (D-NM); WITNESSES: MS. PATRICIA
HOFFMAN, ACTING DEPUTY ASSISTANT SECRETARY, OFFICE OF ENERGY, U.S.
DEPARTMENT OF ENERGY; MR. JOSEPH MCCLELLAND, FEDERAL ENERGY REGULATORY
COMMISSION; MR. RICK SERGEL, NORTH AMERICAN ELECTRIC RELIABILITY
COUNCIL; MR. ALLEN MOSHER, AMERICAN PUBLIC POWER ASSOCIATION; MR.
DAVID OWENS, EDISON ELECTRIC INSTITUTE;; LOCATION: 366 DIRKSEN SENATE
OFFICE BUILDING, WASHINGTON, D.C.
Federal News Service, May 7, 2009 Thursday, CAPITOL HILL HEARING, 14314 words
389. Rep. Thompson Introduces Bill Concerning Federal Power Act to
Provide Additional Authorities to Adequately Protect Critical Electric
Infrastructure
US Fed News, May 8, 2009 Friday 11:14 AM EST, 2476 words
390. Defense Department developing portable hacking device for soldiers
Engadget, May 26, 2009 Tuesday 3:58 PM EST, 211 words,
PRODS@...LOGSINC.COM (Donald Melanson)
391. The Looming Cybersecurity Emergency Reaction
Pacific Free Press, May 26, 2009 Tuesday 11:18 AM EST, 2994 words,
Tom Burghardt antifa89202@...il.com
392. TIP SHEET: GEORGE MASON UNIVERSITY EXPERTS AVAILABLE TO DISCUSS
HEALTH DATA SECURITY/ELECTRONIC MEDICAL RECORDS
States News Service, June 3, 2009 Wednesday, 1761 words, States News Service
393. George Mason University Experts Available to Discuss Health Data
Security/Electronic Medical Records
Targeted News Service, June 3, 2009 Wednesday 8:28 AM EST, 1707 words
394. THE CONFLUENCE OF CYBER CRIME AND TERRORISM
States News Service, June 12, 2009 Friday, 4249 words, States News Service
395. House Science and Technology Subcommittee on Technology and
Innovation Hearing; Agency Response to Cyberspace Policy Review;
Testimony by Rep. Lipinski, Daniel - (D-IL); Agency Response to
Cyberspace Policy Review; Testimony by Cita Furlani, Director,
Information Technology Laboratory, National Institute of Standards and
Technology (NIST)
Congressional Documents and Publications, June 16, 2009, U.S. HOUSE
OF REPRESENTATIVES DOCUMENTS, 3877 words
396. Addressing SIS Cyber Security; Is it First or Last?; Part 2:
When considering integrated control and safety systems, building a
strong defense is an investment in ensuring business continuity. How
should you implement the concepts?
Control Engineering, July 1, 2009 Correction Appended, FEATURES;
Inside Process; Pg. P4, 1999 words, Bob Huba and Chuck Miller,
Emerson Process Management. Bob Huba is a senior product manager for
Emerson Process Management and coordinates security and cyber security
initiatives for DeltaV products. Chuck Miller is the business
development manager for safety instrumented systems for Emerson
Process Management.
397. Cyber Sentries to Guard Networks
Intelligence Online, July 2, 2009, GOVERNMENT INTELLIGENCE, 331 words
398. Cyber Sentries to Guard Networks
Intelligence Online, July 2, 2009, GOVERNMENT INTELLIGENCE, 331 words
399. Vital Infrastructure, But Not Hacker-Proof
Intelligence Online, July 16, 2009, CORPORATE
INTELLIGENCE/TERABYTES, 317 words
400. Vital Infrastructure, But Not Hacker-Proof
Intelligence Online, July 16, 2009, CORPORATE
INTELLIGENCE/TERABYTES, 318 words
401. House Homeland Security Subcommittee on Emerging Threats,
Cybersecurity, and Science and Technology Hearing; "Securing the
Modern Electric Grid from Physical and Cyber Attacks"; Testimony by
Sean McGurk, Director, Control Systems Security Program National Cyber
Security Division
Congressional Documents and Publications, July 21, 2009, U.S. HOUSE
OF REPRESENTATIVES DOCUMENTS, 2443 words
402. House Homeland Security Subcommittee on Emerging Threats,
Cybersecurity, and Science and Technology Hearing; "Securing the
Modern Electric Grid from Physical and Cyber Attacks"; Testimony by
Mark Fabro, Lofty Perch, Inc.
Congressional Documents and Publications, July 21, 2009, U.S. HOUSE
OF REPRESENTATIVES DOCUMENTS, 5510 words
403. REP. YVETTE D. CLARKE HOLDS A HEARING ON SECURING THE MODERN
ELECTRIC GRID FROM PHYSICAL AND CYBER ATTACKS
CQ Transcriptions "All materials herein are protected by United
States copyright law and may not be reproduced, distributed,
transmitted, displayed, published or broadcast without the prior
written permission of CQ Transcriptions. You may not alter or remove
any trademark, copyright or other notice from copies of the content.",
July 21, 2009 Tuesday, 23972 words
404. HEARING OF THE SUBCOMMITTEE ON EMERGING THREATS, CYBERSECURITY,
AND SCIENCE AND TECHNOLOGY OF THE HOUSE HOMELAND SECURITY COMMITTEE;
SUBJECT: SECURING THE MODERN ELECTRIC GRID FROM PHYSICAL AND CYBER
ATTACKS; CHAIRED BY: REPRESENTATIVE YVETTE D. CLARKE (D-NY) WITNESSES
PANEL I: WILLIAM GRAHAM, CHAIRMAN, COMMISSION TO ASSESS THE TREAT TO
THE UNITED STATES FROM ELECTROMAGNETIC PULSE; MARK FABRO, PRESIDENT
AND CHIEF SECURITY SCIENTIST, LOFTY PERCH; MICHAEL ASSANTE, CHIEF
SECURITY OFFICER, NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION;
STEVE NAUMANN, VICE PRESIDENT OF WHOLESALE MARKETS, REPRESENTING
EDISON ELECTRIC INSTITUTE, ELECTRIC POWER SUPPLY ASSOCIATION; PANEL
II: JOE MCCLELLAND, DIRECTOR OF RELIABILITY, FEDERAL ENERGY REGULATORY
COMMISSION; PATRICIA HOFFMAN, ACTING ASSISTANT SECRETARY, OFFICE OF
ELECTRICITY DELIVERY AND ENERGY RELIABILITY; SEAN MCGURK, DIRECTOR,
CONTROL SYSTEMS SECURITY PROGRAM, DEPARTMENT OF HOMELAND SECURITY;
CITA FURLANI, DIRECTOR, INFORMATION TECHNOLOGY LABORATORY, NATIONAL
INSTITUTE OF STANDARDS AND TECHNOLOGY; LOCATION: 311 CANNON HOUSE
OFFICE BUILDING, WASHINGTON, D.C.
Federal News Service, July 21, 2009 Tuesday, 23888 words
405. UNIVERSITY OF HOUSTON'S INFORMATION SECURITY PROGRAM EARNS
IMPORTANT DESIGNATION FROM NSA, DHS
US Fed News, July 31, 2009 Friday 4:33 PM EST, 1147 words
406. Codenomicon DEFENSICS for XML Finds Multiple Critical Security
Issues in XML Libraries
Business Wire, August 5, 2009 Wednesday 5:19 PM GMT, 861 words
407. CODENOMICON LTD; Codenomicon DEFENSICS for XML Finds Multiple
Critical Security Issues in XML Libraries
Network Business Weekly, August 17, 2009, EXPANDED REPORTING; Pg.
23, 925 words
408. CODENOMICON LTD; Codenomicon DEFENSICS for XML Finds Multiple
Critical Security Issues in XML Libraries
Network Weekly News, August 17, 2009, EXPANDED REPORTING; Pg. 37, 923 words
409. CODENOMICON LTD; Codenomicon DEFENSICS for XML Finds Multiple
Critical Security Issues in XML Libraries
Internet, Networks & Communications, August 17, 2009, EXPANDED
REPORTING; Pg. 25, 928 words
410. CODENOMICON LTD; Codenomicon DEFENSICS for XML Finds Multiple
Critical Security Issues in XML Libraries
Computers, Networks & Communications, August 20, 2009, EXPANDED
REPORTING; Pg. 172, 929 words
411. CODENOMICON LTD; Codenomicon DEFENSICS for XML Finds Multiple
Critical Security Issues in XML Libraries
Computer Weekly News, August 20, 2009, EXPANDED REPORTING; Pg. 96, 924 words
412. CODENOMICON LTD; Codenomicon DEFENSICS for XML Finds Multiple
Critical Security Issues in XML Libraries
Computer Business Week, August 20, 2009, EXPANDED REPORTING; Pg. 66,
924 words
413. CODENOMICON LTD; Codenomicon DEFENSICS for XML Finds Multiple
Critical Security Issues in XML Libraries
Computer Technology Journal, August 20, 2009, EXPANDED REPORTING;
Pg. 89, 926 words
414. Codenomicon Releases the First Security Testing Product for XML;
Hacker Halted Booth #308, Miami Hilton Downtown, September 20-25, 2009
Business Wire, September 22, 2009 Tuesday 4:31 PM GMT, 696 words
415. ADDRESS TO E-SECURITY FOR GOVERNMENT 2009 CONFERENCE
States News Service, September 23, 2009 Wednesday, 2069 words,
States News Service
416. Effective defense requires thorough risk assessment
Oil & Gas Journal, September 28, 2009, TRANSPORTATION; Pg. 62, 4363
words, Tim Shaw, Cyber SECurity Consulting, Monkton, Md.. William T.
(Tim) Shaw is senior consultant, Cyber SECurity Consulting. In
addition, he has held senior positions at Hathaway Corp., EMC
Controls, Texas Instruments, and Foxboro Corp. Shaw has more than 30
years' experience in industrial automation, including process-plant
automation (DCS and PLC systems), SCADA systems, electrical substation
automation, building automation, and factory automation. He holds a BS
in electrical and computer engineering from University of Michigan; an
MS in engineering science from Loyola College, Baltimore; a PhD in
computer science from Kennedy-Western University; and a CISSP
certification in cyber security from the IS(C)*. He is a senior member
of the Instrument Society of America (ISA) and is also a member of the
IEEE Computer Society.
417. SCADA system protection requires independent barriers
Oil & Gas Journal, October 5, 2009, TRANSPORTATION; Pg. 68, 2859
words, Tim Shaw, Cyber SECurity Consulting, Monkton, Md.
418. CODENOMICON LTD; Codenomicon Releases the First Security Testing
Product for XML
Telecommunications Weekly, October 7, 2009, EXPANDED REPORTING; Pg.
232, 745 words
419. CODENOMICON LTD; Codenomicon Releases the First Security Testing
Product for XML
Telecommunications Business, October 7, 2009, EXPANDED REPORTING;
Pg. 232, 746 words
420. CODENOMICON LTD; Codenomicon Releases the First Security Testing
Product for XML
Computer Business Week, October 8, 2009, EXPANDED REPORTING; Pg.
200, 744 words
421. CODENOMICON LTD; Codenomicon Releases the First Security Testing
Product for XML
Computer Technology Journal, October 8, 2009, EXPANDED REPORTING;
Pg. 303, 746 words
422. CODENOMICON LTD; Codenomicon Releases the First Security Testing
Product for XML
Computers, Networks & Communications, October 8, 2009, EXPANDED
REPORTING; Pg. 619, 749 words
423. CODENOMICON LTD; Codenomicon Releases the First Security Testing
Product for XML
Computer Weekly News, October 8, 2009, EXPANDED REPORTING; Pg. 199, 744 words
424. United States : Codenomicon Releases the First Security Testing
Product for XML
Tendersinfo News, October 9, 2009 Friday 6:30 PM EST, 411 words
425. United States : Codenomicon Releases the First Security Testing
Product for XML
TendersInfo, October 10, 2009 Saturday, 411 words
426. Ocala-bound tech company likely snags $750K grant
Ocala Star-Banner (Florida), October 12, 2009 Monday, STATE AND
REGIONAL NEWS, 949 words, Bill Thompson, Ocala Star-Banner, Fla.
427. IQPC's SCADA & Control Systems Security Summit to Feature
Speakers from NERC, U.S. Dept. of Homeland Security, Pepco Holdings,
Inc.
Business Wire, October 26, 2009 Monday 5:41 PM GMT, 322 words
428. New York Public Service Commission Chairman Gary Brown Testifies
Before House Energy and Commerce Subcommittee on Energy and
Environment - Final
FD (Fair Disclosure) Wire, October 27, 2009 Tuesday, 4984 words
429. NEW YORK PUBLIC SERVICE COMMISSION CHAIRMAN GARY A. BROWN
PREPARED TESTIMONY BEFORE THE HOUSE ENERGY AND COMMERCE SUBCOMMITTEE
ON ENERGY AND ENVIRONMENT HEARING ON PROTECTING THE ELECTRIC GRID:
H.R. 2165, THE BULK POWER SYSTEM PROTECTION ACT OF 2009, AND H.R.
2195, AS RELEASED BY THE COMMITTEE, Financial Markets Regulatory Wire
, October 27, 2009 Tuesday, LOAD-DATE: October 27, 2009
430. House Energy and Commerce Committee, Energy and Environment
Subcommittee Holds a Hearing on Electric Grid Security - Final
FD (Fair Disclosure) Wire, October 27, 2009 Tuesday, 14718 words
431. REP. EDWARD J. MARKEY HOLDS A HEARING ON ELECTRIC GRID SECURITY,
CQ Transcriptions , October 27, 2009 Tuesday, COMMITTEE: HOUSE
COMMITTEE ON ENERGY AND COMMERCE, SUBCOMMITTEE ON ENERGY AND
ENVIRONMENT, LOAD-DATE: October 28, 2009
432. REP. EDWARD J. MARKEY HOLDS A HEARING ON ELECTRIC GRID SECURITY,
Financial Markets Regulatory Wire , October 27, 2009 Tuesday,
COMMITTEE: HOUSE COMMITTEE ON ENERGY AND COMMERCE, SUBCOMMITTEE ON
ENERGY AND ENVIRONMENT, LOAD-DATE: October 28, 2009
433. HEARING OF THE ENERGY AND THE ENVIRONMENT SUBCOMMITTEE OF THE
HOUSE ENERGY AND COMMERCE COMMITTEE; SUBJECT: PROTECTING THE ELECTRIC
GRID: H.R. 2165, THE BULK POWER SYSTEM PROTECTION ACT OF 2009, AND
H.R. 2195, A BILL TO AMEND THE FEDERAL POWER ACT TO PROVIDE ADDITIONAL
AUTHORITIES TO ADEQUATELY PROTECT THE CRITICAL ELECTRIC INFRASTRUCTURE
AGAINST CYBER ATTACK; CHAIRED BY: REPRESENTATIVE EDWARD MARKEY
(D-MA); WITNESSES: JOSEPH MCCLELLAND, DIRECTOR OF THE FEDERAL ENERGY
REGULATORY COMMISSION'S OFFICE OF ELECTRIC RELIABILITY; PATRICIA
HOFFMAN, PRINCIPAL DEPUTY ASSISTANT SECRETARY IN THE ENERGY
DEPARTMENT'S OFFICE OF ELECTRICITY; GARY BROWN, CHAIRMAN OF THE NEW
YORK PUBLIC SERVICE COMMISSION; DAVID COOK, VICE PRESIDENT AND GENERAL
COUNSEL OF THE NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION; JOHN
DISTASIO, GENERAL MANAGER AND CEO OF THE SACRAMENTO MUNICIPAL UTILITY
DISTRICT; LOCATION: 2123 RAYBURN HOUSE OFFICE BUILDING, WASHINGTON,
D.C.
Federal News Service, October 27, 2009 Tuesday, PRESS CONFERENCE OR
SPEECH, 19492 words
434. IQPC's SCADA & Control Systems Security Summit Details Updates on
Speaker Roster
Wireless News, October 29, 2009 Thursday, 259 words
435. Q&A: Why IP is the right choice for Smart Grid; NIST coordinator
Arnold explains pros, cons of using Internet standards to upgrade the
power grid
Network World, October 29, 2009, 1598 words, Carolyn Duffy Marsan
436. IQPC; IQPC's SCADA & Control Systems Security Summit to Feature
Speakers from NERC, U.S. Dept. of Homeland Security, Pepco Holdings,
Inc.
Bioterrorism Week, November 9, 2009, EXPANDED REPORTING; Pg. 28, 365 words
437. IQPC; IQPC's SCADA & Control Systems Security Summit to Feature
Speakers from NERC, U.S. Dept. of Homeland Security, Pepco Holdings,
Inc.
Bioterrorism Week, November 9, 2009, EXPANDED REPORTING; Pg. 28, 365 words
438. Did Hackers Black Out Entire Cities?
Intelligence Online, November 12, 2009, GOVERNMENT INTELLIGENCE, 92 words
439. IQPC; IQPC's SCADA & Control Systems Security Summit to Feature
Speakers from NERC, U.S. Dept. of Homeland Security, Pepco Holdings,
Inc.
Health Business Week, November 13, 2009, EXPANDED REPORTING; Pg.
724, 366 words
440. IQPC; IQPC's SCADA & Control Systems Security Summit to Feature
Speakers from NERC, U.S. Dept. of Homeland Security, Pepco Holdings,
Inc.
Law & Health Weekly, November 14, 2009, EXPANDED REPORTING; Pg. 862,
366 words
441. What's the Big Idea: O Canada: Quelling cybersecurity threats
The Washington Times, December 10, 2009 Thursday, A, NATION; Pg. 4,
820 words, By James Jay Carafano SPECIAL TO THE WASHINGTON TIMES
442. Siemens Teams With Materials Processing Corp. (MPC) for Secure,
Green Recycling of Control Systems; Partnership provides best
practice expertise for secure recycling in the United States
PR Newswire, December 14, 2009 Monday 11:45 AM EST, 687 words
443. United States : Siemens Teams With Materials Processing Corp.
(MPC) for Secure, Green Recycling of Control Systems
Tendersinfo News, December 15, 2009 Tuesday 6:30 PM EST, 498 words
444. Germany : Siemens Teams With Materials Processing Corp. (MPC) for
Secure, Green Recycling of Control Systems
Tendersinfo News, December 15, 2009 Tuesday 6:30 PM EST, 430 words
445. United States : Siemens Teams With Materials Processing Corp.
(MPC) for Secure, Green Recycling of Control Systems
TendersInfo, December 16, 2009 Wednesday, 477 words, prashant03
446. Germany : Siemens Teams With Materials Processing Corp. (MPC) for
Secure, Green Recycling of Control Systems
TendersInfo, December 16, 2009 Wednesday, 409 words, datta03
447. SIEMENS ENERGY, INC.; Siemens Teams With Materials Processing
Corp. MPC for Secure, Green Recycling of Control Systems
Electronics Newsweekly, December 30, 2009, EXPANDED REPORTING; Pg.
93, 708 words
448. SIEMENS ENERGY, INC.; Siemens Teams With Materials Processing
Corp. MPC for Secure, Green Recycling of Control Systems
Electronics Business Journal, December 30, 2009, EXPANDED REPORTING;
Pg. 61, 710 words
449. SIEMENS ENERGY, INC.; Siemens Teams With Materials Processing
Corp. MPC for Secure, Green Recycling of Control Systems
Electronics Business Journal, December 30, 2009, EXPANDED REPORTING;
Pg. 61, 710 words
450. SIEMENS ENERGY, INC.; Siemens Teams With Materials Processing
Corp. MPC for Secure, Green Recycling of Control Systems
Electronics Newsweekly, December 30, 2009, EXPANDED REPORTING; Pg.
93, 708 words
451. SIEMENS ENERGY, INC.; Siemens Teams With Materials Processing
Corp. MPC for Secure, Green Recycling of Control Systems
Journal of Technology & Science, January 3, 2010, EXPANDED
REPORTING; Pg. 273, 711 words
452. Government seizes opportunity to build security into new critical
infrastructure
Government Computer News, January 13, 2010 Wednesday, 627 words,
William Jackson, Government Computer News
453. United States : IT RealityString LLC Launches
Anti-Cyberterrorism Campaign
Tendersinfo News, January 27, 2010 Wednesday 6:30 PM EST, 328 words
454. United States : IT RealityString LLC Launches
Anti-Cyberterrorism Campaign
TendersInfo, January 28, 2010 Thursday, 306 words, Mamta03
455. DDoS attacks, network hacks rampant in oil and gas industry,
other infrastructure sectors; Oil and gas industry faces the highest
rates of victimization, according to Center for Strategic and
International Studies
Network World, January 28, 2010, 989 words, Ellen Messmer
456. Cyber spies and thugs attacking power-water plants
Agence France Presse -- English, January 29, 2010 Friday 4:11 AM
GMT, 668 words
457. Reportlinker Adds Smart Grid Cyber Security
PR Newswire, February 9, 2010 Tuesday 1:08 PM EST, 2293 words
458. Tip Sheet: George Mason University Experts Available to Discuss
Health Data Security/Electronic Medical Records
Targeted News Service, February 12, 2010 Friday 6:38 AM EST, 1707
words, Targeted News Service
459. SECURITY
WASHINGTON INTERNET DAILY, February 22, 2010 Monday, SECURITY, 283 words
460. Security
WASHINGTON INTERNET DAILY, February 22, 2010 Monday, , 283 words
461. HEARING OF THE SENATE COMMERCE, SCIENCE, AND TRANSPORTATION
COMMITTEE; SUBJECT: CYBERSECURITY; CHAIRED BY: SENATOR JAY
ROCKEFELLER (D-WV); WITNESSES: VICE ADMIRAL MICHAEL MCCONNELL, USN
(RET.), EXECUTIVE VICE PRESIDENT, NATIONAL SECURITY BUSINESS, BOOZ
ALLEN HAMILTON; JAMES A. LEWIS, DIRECTOR AND SENIOR FELLOW, TECHNOLOGY
AND PUBLIC POLICY PROGRAM, CENTER FOR STRATEGIC AND INTERNATIONAL
STUDIES; SCOTT BORG, DIRECTOR AND CHIEF ECONOMIST, U.S. CYBER
CONSEQUENCES UNIT; REAR ADMIRAL JAMES ARDEN BARNETT, JR., USN (RET.),
CHIEF, PUBLIC SAFETY AND HOMELAND SECURITY BUREAU, FEDERAL
COMMUNICATIONS COMMISSION (FCC); MARY ANN DAVIDSON, CHIEF SECURITY
OFFICER, ORACLE CORPORATION; LOCATION: 253 RUSSELL SENATE OFFICE
BUILDING, WASHINGTON, D.C.
Federal News Service, February 23, 2010 Tuesday, CAPITOL HILL
HEARING, 19227 words
462. Tech apocalypse: Five doomsday scenarios for IT
InfoWorld Daily News, March 15, 2010 Monday, 3974 words, By Dan
Tynan, InfoWorld.com
463. Enhancing SCADA and pipeline security
Pipeline and Gas Technology, April 1, 2010, OPERATIONS, 1118 words, blank
464. Money trumps security in smart meter rollouts, experts say
CNET.com, June 15, 2010 Tuesday 7:00 AM EST, 1877 words, Elinor Mills
465. Intentional EMI leapfrogs modern data center defenses: a look at
defenses against sabotage.
Mission Critical, July 2010, Pg. 32, 2337 words
466. Intentional EMI leapfrogs modern data center defenses: a look at
defenses against sabotage.
Mission Critical, July 2010, Pg. 32, 2337 words
467. War in the fifth domain; Cyberwar
The Economist, July 3, 2010, FRONT BRIEFING, 2888 words
468. Proof that other countries are planning cyberattacks on the power grid?
The Volokh Conspiracy, July 18, 2010 Sunday 12:15 PM EST, 827 words,
Stewart Baker
469. Virus targets Siemens industrial control systems
CIOL, July 20, 2010 Tuesday 5:05 AM EST, 376 words
470. Computer Weekly, July 20, 2010, NEWS, 236 words, Warwick Ashford
471. United States : Windows Exploit and Default Passwords Put
Critical Infrastructure at Risk
Tendersinfo News, July 20, 2010 Tuesday 6:30 PM EST, 456 words
472. Windows Exploit and Default Passwords Put Critical Infrastructure
at Risk; Sophos finds CPLINK Vulnerability "Trivial to Exploit" And
Easy to Adapt for Other Malicious Payloads; Critical Infrastructure
Caught Exposed by Widely Available Default Passwords and Questionable
Guidance;
Business Wire, July 20, 2010 Tuesday 5:43 PM GMT, 603 words
473. United States : Windows Exploit and Default Passwords Put
Critical Infrastructure at Risk
TendersInfo, July 21, 2010 Wednesday, 435 words, sonu03
474. United States : Flaw uses USB devices as vector to steal data
TendersInfo, July 21, 2010 Wednesday, 474 words, roshani03
475. Microsoft Windows flaw may put critical infrastructure at risk
Guardian Unlimited, July 22, 2010 Thursday, 459 words, Charles
Arthurguardian.co.uk
476. Stuxnet spyware targets industrial facilities, via USB memory
stick; Beware the USB memory stick. Infected sticks are the means by
which a mystery spyware, dubbed Stuxnet, is penetrating control
systems of industrial facilities and utilities around the globe, say
cybersecurity experts.
The Christian Science Monitor, July 23, 2010 Friday, 1772 words,
Mark Clayton Staff writer
477. Friday Summary: July 23, 2010
Securosis, July 23, 2010 Friday 2:12 AM EST, 1422 words
478. Sophos Provides Free Tool to Protect Against Windows '.LNK'
Zero-Day Vulnerability
Business Wire, July 26, 2010 Monday 2:55 PM GMT, 545 words
479. Computer Weekly, July 27, 2010, NEWS, 321 words, Warwick Ashford
480. Sophos provides free tool against .LNK
CIOL, July 27, 2010 Tuesday 10:25 AM EST, 305 words
481. United States : Sophos Blocks Windows Shell Attacks
Tendersinfo News, July 27, 2010 Tuesday 6:30 PM EST, 400 words
482. Sophos Blocks Windows Shell Attacks
TECHWEB, July 27, 2010 Tuesday 1:08 PM GMT, 387 words
483. Sophos Offers Windows Protection For All But W2K
Lockergnome Blog Network, July 27, 2010 Tuesday 11:35 PM EST, 1334
words, the oracle
484. Consultant: Companies running critical infrastructure take months
to patch holes
FierceCIO, July 28, 2010 Wednesday 4:06 PM EST, 242 words, Caron Carlson
485. Sophos offers free tool for Windows Shortcut flaw
Government Computer News, July 28, 2010 Wednesday, 562 words, Kurt
Mackie, Government Computer News
486. United States : Sophos Blocks Windows Shell Attacks
TendersInfo, July 28, 2010 Wednesday, 378 words, roshani03
487. Black Hat shines light on security (roundup)
CNET.com, July 28, 2010 Wednesday 8:42 PM EST, 531 words, CNET News staff
488. Black Hat shines light on security (roundup)
CNET.com, July 29, 2010 Thursday 7:11 PM EST, 819 words, CNET News staff
489. Black Hat shines light on security (roundup)
CNET.com, July 29, 2010 Thursday 7:11 PM EST, 668 words, CNET News staff
490. Black Hat shines light on security (roundup)
CNET.com, July 29, 2010 Thursday 7:11 PM EST, 719 words, CNET News staff
491. 5 Takeaways From Black Hat 2010
PC Magazine.com, July 30, 2010 Friday 5:47 PM EST, SECURITY, 482
words, Larry Seltzer
492. DATA PROTECTION; Windows Exploit and Default Passwords Put
Critical Infrastructure at Risk
Information Technology Business, August 3, 2010, EXPANDED REPORTING;
Pg. 63, 625 words
493. DATA PROTECTION; Windows Exploit and Default Passwords Put
Critical Infrastructure at Risk
Information Technology Newsweekly, August 3, 2010, EXPANDED
REPORTING; Pg. 225, 625 words
494. DATA PROTECTION; Windows Exploit and Default Passwords Put
Critical Infrastructure at Risk
Computers, Networks & Communications, August 5, 2010, EXPANDED
REPORTING; Pg. 880, 626 words
495. Stuxnet 'Zero Day' Worm Not New
TECHWEB, August 5, 2010 Thursday 12:27 PM GMT, 420 words
496. Friday Summary: August 6th, 2010
Securosis, August 6, 2010 Friday 2:26 AM EST, 1612 words
497. DATA PROTECTION; Sophos Provides Free Tool to Protect Against
Windows '.LNK' Zero-Day Vulnerability
Information Technology Newsweekly, August 10, 2010, EXPANDED
REPORTING; Pg. 35, 577 words
498. DATA PROTECTION; Sophos Provides Free Tool to Protect Against
Windows '.LNK' Zero-Day Vulnerability
Information Technology Newsweekly, August 10, 2010, EXPANDED
REPORTING; Pg. 35, 577 words
499. Revere Security Executive to Speak at Smart Grid Cyber Security
Conference and Expo; Wireless Security Expert Examines Encryption,
Authentication Technologies
Business Wire, August 10, 2010 Tuesday 5:50 PM GMT, 581 words
500. Opinion: IT needs to help secure industrial control systems;
Stuxnet exploit exposed disconnect between IT and operators of
industrial control systems
Network World, August 13, 2010, 843 words
501. Dangerous Deals on Automation
Electrical Marketing, August 13, 2010, Pg. 2, 745 words, Frank Hurtte
502. Malware Threats Increasing Exponentially, McAfee Report Says
Defense Daily, August 13, 2010 Friday, 1128 words
503. Malware Threats Increasing Exponentially, McAfee Report Says
Terror Response Technology Report, August 18, 2010 Wednesday, 1032 words
504. REVERE SECURITY; Revere Security Executive to Speak at Smart
Grid Cyber Security Conference and Expo
Telecommunications Business, August 25, 2010, EXPANDED REPORTING;
Pg. 80, 609 words
505. REVERE SECURITY; Revere Security Executive to Speak at Smart
Grid Cyber Security Conference and Expo
Telecommunications Weekly, August 25, 2010, EXPANDED REPORTING; Pg.
143, 608 words
506. REVERE SECURITY; Revere Security Executive to Speak at Smart
Grid Cyber Security Conference and Expo
Computers, Networks & Communications, August 26, 2010, EXPANDED
REPORTING; Pg. 503, 612 words
507. REVERE SECURITY; Revere Security Executive to Speak at Smart
Grid Cyber Security Conference and Expo
Computers, Networks & Communications, August 26, 2010, EXPANDED
REPORTING; Pg. 503, 612 words
508. If this man wanted to blow up Dublin ... he could
Irish Independent, August 28, 2010 Saturday, ANALYSIS, 1116 words
509. If this man wanted to blow up Dublin ... he could
Irish Independent, August 28, 2010 Saturday, ANALYSIS, 1116 words
510. Work: Crash diet: A working life The computer virus expert: Every
day, Patrick Fitzgerald fights off internet infections, worms, malware
... or even spam zombies. He tells Mark King about the battle against
cyber crime.
The Guardian (London) - Final Edition, August 28, 2010 Saturday,
GUARDIAN WORK PAGES; Pg. 3, 1640 words, Mark King
511. Electric power industry as critical infrastructure
Network World, September 6, 2010, 1108 words, M. E. Kabay
512. Attacks on power systems: Data leakage, espionage, insider
threats, sabotage
Network World, September 8, 2010, 1554 words, M. E. Kabay
513. Questions & Answers Regarding New Echelon Control System Open
Software Platform, Edge Control Node Extensible Hardware, and Duke
Energy
Business Wire, September 8, 2010 Wednesday 2:15 PM GMT, 5364 words
514. Cyber security a growing concern in energy sector.
Canwest News Service, September 10, 2010 Friday 08:02 PM EST, 841
words, Lynn Moore, Postmedia News
515. Cyber security a growing concern in energy sector
Canwest News Service, September 10, 2010 Friday 08:02 PM EST, 834
words, Lynn Moore, Postmedia News
516. Grids under hack alert; As North America's electricity grid moves
toward a "smart grid" system, the cyber spies, thieves or terrorists
determined to attack that grid are sure to get smarter themselves,
industry experts warn
Canwest News Service, September 10, 2010 Friday 11:00 AM EST, 1144
words, Lynn Moore, Postmedia News
517. Grids under hack alert
National Post's Financial Post & FP Investing (Canada), September
11, 2010 Saturday, FINANCIAL POST INVESTING; Pg. FP12, 1138 words,
Lynn Moore, Postmedia News
518. Guarding the grid; Keeping electrical systems secure is a key
challenge of the energy industry
Canwest News Service, September 11, 2010 Saturday 10:01 AM EST, 1234
words, LYNN MOORE, Montreal Gazette; The Gazette
519. Guarding the grid; Keeping electrical systems secure is a key
challenge of the energy industry
The Gazette (Montreal), September 11, 2010 Saturday, BUSINESS: WORLD
ENERGY CONGRESS; Pg. C1, 1234 words, LYNN MOORE, The Gazette
520. Grids under hack alert; As North America's electricity grid moves
toward a "smart grid" system, the cyber spies, thieves or terrorists
determined to attack that grid are sure to get smarter themselves,
industry experts warn
Canwest News Service, September 12, 2010 Sunday 11:00 AM EST, 1146
words, Lynn Moore, Postmedia News
521. Grids under hack alert; As North America's electricity grid moves
toward a "smart grid" system, the cyber spies, thieves or terrorists
determined to attack that grid are sure to get smarter themselves,
industry experts warn
Canwest News Service, September 12, 2010 Sunday 11:00 AM EST, 1144
words, Lynn Moore, Postmedia News
522. Attacks on power systems: Hackers, malware
Network World, September 13, 2010, 1550 words, M. E. Kabay
523. Power plays; Cyber security a growing concern in energy sector
Prince George Citizen (British Columbia), September 13, 2010 Monday,
NEWS; Pg. 8, 839 words, Lynn Moore, Postmedia News
524. Attacks on power systems: Industry/government consensus
Network World, September 15, 2010, 1071 words, M. E. Kabay
525. Stuxnet worm wreaks havoc among industrial firms
vnunet.com, 18 September 2010 Saturday, 279 words, Phil Muncaster
526. Increasing security of SCADA systems in power industry
Network World, September 20, 2010, 1263 words, M. E. Kabay
527. OTN's solutions are reliable, secure and easy to use
Oil & Gas News, September 21, 2010, 1051 words
528. A laundry list of power industry incidents to learn from
Network World, September 22, 2010, 1628 words, M. E. Kabay
529. Software smart bomb fired at Iranian nuclear plant: experts
Agence France Presse -- English, September 24, 2010 Friday 1:51 AM
GMT, 639 words
530. A New Kind of Software Attack, A Whole New Ballgame
The Cutter Blog, September 24, 2010 Friday 1:46 PM EST, 608 words, Ken Orr
531. Stuxnet worm is the 'work of a national government agency'
Guardian Unlimited, September 24, 2010 Friday, 1223 words, Josh
Hallidayguardian.co.uk
532. Stuxnet computer worm takes its toll on Iran, where nuclear plant
may be target
VentureBeat, September 26, 2010 Sunday 1:32 AM EST, 322 words, Dean Takahashi
533. Virus Targets Industrial OS, Reaches Iran's Nuclear Plant
ReadWriteWeb, September 27, 2010 Monday 4:00 PM EST, 552 words, Curt Hopkins
534. Web 'superbug' threatens Chinese national security: report
The Press Trust of India, September 27, 2010 Monday, NATIONWIDE
INTERNATIONAL NEWS, 382 words
535. WEB 'SUPERBUG' THREATENS CHINESE NATIONAL SECURITY REPORT
The Statesman (India), September 27, 2010 Monday, 516 words
536. Stuxnet mutating, rampaging through Iran: IT official
Agence France Presse -- English, September 27, 2010 Monday 10:57 AM
GMT, 443 words
537. Stuxnet wreaking havoc on industrial equipment in Iran
Times of Oman, September 28, 2010 Tuesday, 383 words, AFP
538. Is cyberwarfare a genuine threat?
Guardian Unlimited, September 30, 2010 Thursday, 433 words, Charles
Arthurguardian.co.uk
539. PandaLabs Q3 Report: Trojans Constituted More Than Half of All
New Threats; 95 Percent of Email was Spam; - Email infections decline
as exploits propagated via social media increase
PR Newswire, September 30, 2010 Thursday 8:00 AM EST, 803 words
540. Cyber worm hits Chinese industry - Hong Kong paper
BBC Monitoring Asia Pacific - Political Supplied by BBC Worldwide
Monitoring, September 30, 2010 Thursday, 1104 words
541. Superbug that attacked 6 mn computers in China traced to US
The Press Trust of India, October 1, 2010 Friday, NATIONWIDE
INTERNATIONAL NEWS, 363 words
542. A worm in the centrifuge; The Stuxnet outbreak
The Economist, October 2, 2010, INTERNATIONAL, 953 words
543. Indian websites targeted by internet worms; China suspected;
Experts believe that Chinese hackers are most likely to have written
the worm which has terrorised the world since June
Accord Fintech, October 11, 2010 Monday 10:14 AM EST, 242 words
544. 2010 Institutional Investor Conference Webcast - Final
FD (Fair Disclosure) Wire, October 13, 2010 Wednesday, 30839 words
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists