{"id":4824,"date":"2013-08-20T14:18:47","date_gmt":"2013-08-20T14:18:47","guid":{"rendered":"http:\/\/blogs.edf.org\/energyexchange\/?p=4824"},"modified":"2015-12-21T12:45:17","modified_gmt":"2015-12-21T18:45:17","slug":"u-s-electric-grid-under-cyber-attack","status":"publish","type":"post","link":"https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/","title":{"rendered":"U.S. Electric Grid Under Cyber-Attack"},"content":{"rendered":"<p><a href=\"https:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/07\/John-Finnigan_jpg.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright  wp-image-4606\" src=\"https:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/07\/John-Finnigan_jpg-199x300.jpg\" alt=\"John Finnigan\" width=\"139\" height=\"210\" srcset=\"https:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/07\/John-Finnigan_jpg-199x300.jpg 199w, https:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/07\/John-Finnigan_jpg.jpg 425w\" sizes=\"auto, (max-width: 139px) 100vw, 139px\" \/><\/a>If Ben Franklin lived today, he might say that nothing is certain but death, taxes and cyber-attacks.\u00a0 Cyber-attacks occur when individuals or groups hack into another group\u2019s computer information systems to steal, alter or damage key infrastructure.\u00a0 Our nation\u2019s electric grid is under constant attack according to a <a href=\"http:\/\/democrats.energycommerce.house.gov\/sites\/default\/files\/documents\/Report-Electric-Grid-Vulnerability-2013-5-21.pdf\">survey<\/a> of electric utilities by U.S. House Representatives Henry Waxman and (now) Senator Edward Markey. \u00a0The grid was the <a href=\"http:\/\/www.greatachievements.org\/\">greatest engineering achievement of the 20<sup>th<\/sup> Century<\/a>, but cybersecurity was equally unknown to those grid engineers as it was to Ben Franklin.\u00a0 We need to do more to protect our energy infrastructure.<\/p>\n<p>The U.S. has finally called out China for repeated and pervasive cyber-attacks.\u00a0 Mandiant, a cybersecurity firm, released an alarming <a href=\"http:\/\/intelreport.mandiant.com\/Mandiant_APT1_Report.pdf\">report<\/a> in February 2013 regarding the ongoing cyber-attacks by the Chinese army.\u00a0 James Clapper, the Director of National Intelligence, described cyber-attacks as a soft war already underway and a dire global threat in his <a href=\"http:\/\/www.cfr.org\/intelligence\/worldwide-threat-assessment-us-intelligence-community-april-2013\/p30228\">April 2013 World Threat Assessment<\/a> to the U.S. House Permanent Select Committee on Intelligence.\u00a0 In May of this year, for the first time, the Pentagon\u2019s <a href=\"http:\/\/www.defense.gov\/pubs\/2013_china_report_final.pdf\">annual report to Congress on the Chinese military<\/a> openly accused China\u2019s military of repeated cyber-attacks on the U.S. government and defense contractors.<\/p>\n<p>Cyber-attacks are underway not only by China, but also by <a href=\"http:\/\/blog.heritage.org\/2013\/08\/07\/irans-covert-cyber-war\/\">Iran<\/a>, <a href=\"http:\/\/readwrite.com\/2013\/03\/18\/from-russia-with-bots-finding-the-source-of-cyber-attacks#awesm=~oepKxdWab2aq2F\">Russia<\/a>, <a href=\"http:\/\/abcnews.go.com\/Politics\/cyber-terrorism-al-qaeda-video-calls-electronic-jihad\/story?id=16407875\">Al-Queda<\/a>, <a href=\"http:\/\/midsizeinsider.com\/en-us\/article\/interpol-organized-crime-behind-cyber-a\">organized crime<\/a>, <a href=\"http:\/\/www.voanews.com\/content\/industrial_cyber_attacks_a_costly_spy_game\/180511.html\">industrial spies<\/a>, <a href=\"http:\/\/www.greentechmedia.com\/articles\/read\/hackers-claim-first-u.s.-utility-cyberattack\">ex-utility employees<\/a> and <a href=\"http:\/\/www.safetyissues.com\/site\/cyber_crime\/cia_reveals_hacker_attacks_on_utilities.html\">rogue hackers<\/a>.\u00a0 The U.S. Department of Homeland Security <a href=\"http:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/ICS-CERT_Monitor_April-June2013_3.pdf\">investigated<\/a> over 200 serious cyber-attacks against critical infrastructure during the first half of 2013.\u00a0 The electric grid was targeted in over half of these attacks. \u00a0At the recent <a href=\"https:\/\/www.blackhat.com\/\">Black Hat security conference<\/a> in Las Vegas, Cyrill Brunschwiler of Compass Security <a href=\"https:\/\/media.blackhat.com\/us-13\/US-13-Brunschwiler-Energy-Fraud-and-Orchestrated-Blackouts-Issues-with-Wireless-Metering-Protocols-Slides.pdf\">explained<\/a> how the smart grid\u2019s wireless network can be easily exploited to steal electricity and to cause massive blackouts.\u00a0 Though <a href=\"http:\/\/www.edf.org\/energy\/energy-innovation-series\">innovation and new clean energy technologies<\/a> are key to modernizing our antiquated energy system, <a href=\"http:\/\/smartgridsecurity.blogspot.com\/2010\/11\/enernexs-kevin-brown-on-smart-grid.html\">the electric grid is more vulnerable to cyber-attacks<\/a> with increased use of smartphones, tablets, mobile apps and electric vehicles to connect with our home electronic devices.\u00a0 A July 2012 <a href=\"http:\/\/www.gao.gov\/assets\/600\/592508.pdf\">report<\/a> by the Government Accountability Office (GAO) outlines the various threats to the electric grid.<\/p>\n<p><!--more--><\/p>\n<p>Have any of these grid cyber-attacks succeeded?\u00a0 Some <a href=\"http:\/\/www.nationaljournal.com\/magazine\/china-s-cyber-militia-20080531\">experts blame cyber-attacks<\/a> for the Northeast blackout of 2003 and a massive 2008 Florida blackout. \u00a0The Central Intelligence Agency (CIA) has <a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2008\/01\/18\/AR2008011803277_pf.html\">reported<\/a> that cyber-attacks against the electric grid have caused blackouts in several cities around the world.<\/p>\n<p><strong>Here are the key highlights of our country\u2019s efforts to protect the U.S. electric grid:<\/strong><\/p>\n<ul>\n<li>In 2002, the nuclear industry adopted cybersecurity standards; the Nuclear Regulatory Commission expanded these standards in 2009 with cybersecurity regulations for nuclear facilities.<\/li>\n<\/ul>\n<ul>\n<li>The <a href=\"http:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-109publ58\/pdf\/PLAW-109publ58.pdf\">Energy Policy Act of 2005<\/a> authorized the Federal Energy Regulatory Commission (FERC) to approve mandatory cybersecurity reliability standards for the grid. \u00a0FERC selected the North American Electric Reliability Corporation (NERC) to develop these standards.<\/li>\n<\/ul>\n<ul>\n<li>In 2006, NERC developed mandatory reliability standards for the grid.<\/li>\n<\/ul>\n<ul>\n<li>In 2007, FERC <a href=\"http:\/\/www.ferc.gov\/whats-new\/comm-meet\/2007\/071907\/E-6.pdf\">approved<\/a> NERC\u2019s Critical Infrastructure Protection (CIP) cybersecurity reliability standards.<\/li>\n<\/ul>\n<ul>\n<li>The <a href=\"http:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-110publ140\/pdf\/PLAW-110publ140.pdf\">Energy Independence and Security Act of 2007<\/a> authorized the National Institute of Standards (NIST) to develop technical standards for interoperability of smart grid equipment and software, including cybersecurity standards.\u00a0 In 2009, NIST formed the Smart Grid Interoperability Panel (SGIP), a public-private partnership, to develop these standards.\u00a0 In turn, SGIP formed the Cyber Security Working Group (CSWG).<\/li>\n<\/ul>\n<ul>\n<li>In 2010, NIST <a href=\"http:\/\/www.nist.gov\/public_affairs\/releases\/nist-finalizes-initial-set-of-smart-grid-cyber-security-guidelines.cfm\">issued<\/a> its initial cybersecurity standards for smart grid equipment and software, developed by the CSWG.<\/li>\n<\/ul>\n<ul>\n<li>In 2010, FERC issued <a href=\"http:\/\/www.ferc.gov\/whats-new\/comm-meet\/2010\/111810\/E-2.pdf\">Order 743<\/a>, directing NERC to revise its reliability standards to cover all electric facilities necessary to operate an interconnected grid.<\/li>\n<\/ul>\n<ul>\n<li>In 2011, FERC <a href=\"http:\/\/www.ferc.gov\/whats-new\/comm-meet\/2011\/091511\/E-5.pdf\">clarified<\/a> the reliability standards regarding actions utilities can take to keep the grid running during electric emergency conditions.<\/li>\n<\/ul>\n<ul>\n<li>In 2012, FERC <a href=\"http:\/\/www.ferc.gov\/whats-new\/comm-meet\/2012\/122012\/E-5.pdf\">approved<\/a> NERC\u2019s revised reliability standards for the electric grid.\u00a0 In January 2013, NERC asked FERC to approve further revisions and FERC is reviewing these new revisions.<\/li>\n<\/ul>\n<figure id=\"attachment_4825\" aria-describedby=\"caption-attachment-4825\" style=\"width: 311px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/08\/Cybersecurity.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4825  \" src=\"https:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/08\/Cybersecurity.jpg\" alt=\"\" width=\"311\" height=\"234\" srcset=\"https:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/08\/Cybersecurity.jpg 749w, https:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/08\/Cybersecurity-300x225.jpg 300w\" sizes=\"auto, (max-width: 311px) 100vw, 311px\" \/><\/a><figcaption id=\"caption-attachment-4825\" class=\"wp-caption-text\">Source: iStockphoto, alengo<\/figcaption><\/figure>\n<ul>\n<li>In February 2013, President Obama issued <a href=\"http:\/\/www.gpo.gov\/fdsys\/pkg\/FR-2013-02-19\/pdf\/2013-03915.pdf\">Executive Order 13636<\/a>, which directs NIST to develop a Cybersecurity Framework with standards for the protection of critical infrastructure facilities, including the electric grid.<\/li>\n<\/ul>\n<ul>\n<li>In April 2013, the SGIP was formally established as an independent organization, known as SGIP 2.0, Inc.\u00a0 The organization will continue to function as a public-private partnership, and will be funded by industry and NIST.\u00a0 Cybersecurity standards will be developed by the Smart Grid Cybersecurity Committee of SGIP 2.0.\u00a0 This committee is developing a user\u2019s guide for the NIST cybersecurity standards.<\/li>\n<\/ul>\n<ul>\n<li>In July 2013, NIST released a preliminary version of its <a href=\"http:\/\/www.nist.gov\/itl\/cyberframework.cfm\">Cybersecurity Framework<\/a>.<\/li>\n<\/ul>\n<p><strong>Here\u2019s what our country still needs to do to protect the U.S. electric grid:<\/strong><\/p>\n<ul>\n<li>Our leaders must ensure that federal budget cuts do not impair the Department of Homeland Security\u2019s capability to protect our nation\u2019s critical infrastructure.<\/li>\n<\/ul>\n<ul>\n<li>Our leaders must develop a clear, overarching cybersecurity strategy, governance methods and cybersecurity response procedures, as the GAO recently <a href=\"http:\/\/www.gao.gov\/assets\/660\/652817.pdf\">recommended<\/a>.<\/li>\n<\/ul>\n<ul>\n<li>FERC and electric utilities must implement the GAO\u2019s recommendations, detailed in its July 2012 report <a href=\"http:\/\/www.gao.gov\/products\/GAO-12-926T\">Cybersecurity: Challenges in Securing the Electric Grid<\/a><em>.<\/em><\/li>\n<\/ul>\n<ul>\n<li>NIST must finish developing its Cybersecurity Framework and utilities must implement the standards.\u00a0 NIST is scheduled to release the Cybersecurity Framework for public comment in October 2013, and to finalize the standards by February 2014.<\/li>\n<\/ul>\n<ul>\n<li>Electric utilities should comply with NERC\u2019s voluntary cybersecurity recommendations.\u00a0 Currently <a href=\"http:\/\/democrats.energycommerce.house.gov\/sites\/default\/files\/documents\/Report-Electric-Grid-Vulnerability-2013-5-21.pdf\">only 20% of electric utilities follow these recommendations<\/a>.<\/li>\n<\/ul>\n<ul>\n<li>The public and private parties responsible for protecting our critical infrastructure facilities must adopt GAO\u2019s recent <a href=\"http:\/\/www.gao.gov\/products\/GAO-10-628\">recommendations<\/a> for implementing better communication protocols.<\/li>\n<\/ul>\n<ul>\n<li>The Department of Homeland Security and the Federal Communications Commission must develop performance standards for cybersecurity measures for the communications network and the internet in a timely manner, as recommended by a recent GAO <a href=\"http:\/\/www.gao.gov\/products\/GAO-13-275\">report<\/a>.<\/li>\n<\/ul>\n<ul>\n<li>The Department of Homeland Security must implement the GAO\u2019s recent<a href=\"http:\/\/www.gao.gov\/products\/GAO-13-616\"> recommendations<\/a> regarding the Regional Resiliency Assessment Program.<\/li>\n<\/ul>\n<ul>\n<li>The Senate should pass the <a href=\"http:\/\/intelligence.house.gov\/sites\/intelligence.house.gov\/files\/documents\/CISPAPassedApril2013.pdf\">Cyber Intelligence Sharing and Protection Act of 2013<\/a>, which better enables the government and companies to quickly share vital information needed to respond to a cyber-attack.\u00a0 The electric utility industry provided input for this bill and is a strong supporter.\u00a0 The bill passed the House on April 18, 2013 by a 288-127 vote.<\/li>\n<\/ul>\n<p>As the U.S. improves its preparedness, we must strike the appropriate balance between security and privacy. \u00a0Preparation and privacy rights can co-exist and are not mutually exclusive.\u00a0 This has been brought into critical focus by Edward Snowden\u2019s release of top-secret National Security Administration surveillance practices.<\/p>\n<p>We can and must improve the cybersecurity of our critical electric infrastructure.\u00a0 As Ben Franklin also said: \u201cBy failing to prepare, you are preparing to fail.\u201d\u00a0 Let\u2019s prepare to succeed in protecting the electric grid with effective cybersecurity measures.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If Ben Franklin lived today, he might say that nothing is certain but death, taxes and cyber-attacks.\u00a0 Cyber-attacks occur when individuals or groups hack into another group\u2019s computer information systems to steal, alter or damage key infrastructure.\u00a0 Our nation\u2019s electric grid is under constant attack according to a survey of electric utilities by U.S. House &#8230;<\/p>\n","protected":false},"author":12461,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[84830,27600],"tags":[52766,52541],"coauthors":[],"class_list":["post-4824","post","type-post","status-publish","format-standard","hentry","category-grid-modernization","category-utilities","tag-cybersecurity","tag-electric-grid"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>U.S. Electric Grid Under Cyber-Attack - Energy Exchange<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"U.S. Electric Grid Under Cyber-Attack - Energy Exchange\" \/>\n<meta property=\"og:description\" content=\"If Ben Franklin lived today, he might say that nothing is certain but death, taxes and cyber-attacks.\u00a0 Cyber-attacks occur when individuals or groups hack into another group\u2019s computer information systems to steal, alter or damage key infrastructure.\u00a0 Our nation\u2019s electric grid is under constant attack according to a survey of electric utilities by U.S. House ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Energy Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-20T14:18:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-12-21T18:45:17+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/07\/John-Finnigan_jpg-199x300.jpg\" \/>\n<meta name=\"author\" content=\"John Finnigan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Finnigan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/08\\\/20\\\/u-s-electric-grid-under-cyber-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/08\\\/20\\\/u-s-electric-grid-under-cyber-attack\\\/\"},\"author\":{\"name\":\"John Finnigan\",\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/#\\\/schema\\\/person\\\/e4e06d0ac3c4cbe9f823ba21e6ab8b23\"},\"headline\":\"U.S. Electric Grid Under Cyber-Attack\",\"datePublished\":\"2013-08-20T14:18:47+00:00\",\"dateModified\":\"2015-12-21T18:45:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/08\\\/20\\\/u-s-electric-grid-under-cyber-attack\\\/\"},\"wordCount\":1094,\"commentCount\":1,\"image\":{\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/08\\\/20\\\/u-s-electric-grid-under-cyber-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/wp-content\\\/blogs.dir\\\/38\\\/files\\\/2013\\\/07\\\/John-Finnigan_jpg-199x300.jpg\",\"keywords\":[\"Cybersecurity\",\"Electric Grid\"],\"articleSection\":[\"Grid Modernization\",\"Utility Business Models\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/08\\\/20\\\/u-s-electric-grid-under-cyber-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/08\\\/20\\\/u-s-electric-grid-under-cyber-attack\\\/\",\"url\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/08\\\/20\\\/u-s-electric-grid-under-cyber-attack\\\/\",\"name\":\"U.S. Electric Grid Under Cyber-Attack - Energy Exchange\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/08\\\/20\\\/u-s-electric-grid-under-cyber-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/08\\\/20\\\/u-s-electric-grid-under-cyber-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/wp-content\\\/blogs.dir\\\/38\\\/files\\\/2013\\\/07\\\/John-Finnigan_jpg-199x300.jpg\",\"datePublished\":\"2013-08-20T14:18:47+00:00\",\"dateModified\":\"2015-12-21T18:45:17+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/#\\\/schema\\\/person\\\/e4e06d0ac3c4cbe9f823ba21e6ab8b23\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/08\\\/20\\\/u-s-electric-grid-under-cyber-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/08\\\/20\\\/u-s-electric-grid-under-cyber-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/08\\\/20\\\/u-s-electric-grid-under-cyber-attack\\\/#primaryimage\",\"url\":\"http:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/wp-content\\\/blogs.dir\\\/38\\\/files\\\/2013\\\/07\\\/John-Finnigan_jpg-199x300.jpg\",\"contentUrl\":\"http:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/wp-content\\\/blogs.dir\\\/38\\\/files\\\/2013\\\/07\\\/John-Finnigan_jpg-199x300.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/08\\\/20\\\/u-s-electric-grid-under-cyber-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"U.S. Electric Grid Under Cyber-Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/#website\",\"url\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/\",\"name\":\"Energy Exchange\",\"description\":\"Accelerating the clean energy revolution\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/#\\\/schema\\\/person\\\/e4e06d0ac3c4cbe9f823ba21e6ab8b23\",\"name\":\"John Finnigan\",\"description\":\"Senior Regulatory Attorney John Finnigan is the senior regulatory attorney for EDF\u2019s US Climate and Energy Program, representing EDF before state public utility commissions on smart grid deployments and energy efficiency matters.\",\"sameAs\":[\"http:\\\/\\\/www.edf.org\\\/people\\\/john-finnigan\"],\"url\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/author\\\/jfinnigan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"U.S. Electric Grid Under Cyber-Attack - Energy Exchange","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/","og_locale":"en_US","og_type":"article","og_title":"U.S. Electric Grid Under Cyber-Attack - Energy Exchange","og_description":"If Ben Franklin lived today, he might say that nothing is certain but death, taxes and cyber-attacks.\u00a0 Cyber-attacks occur when individuals or groups hack into another group\u2019s computer information systems to steal, alter or damage key infrastructure.\u00a0 Our nation\u2019s electric grid is under constant attack according to a survey of electric utilities by U.S. House ...","og_url":"https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/","og_site_name":"Energy Exchange","article_published_time":"2013-08-20T14:18:47+00:00","article_modified_time":"2015-12-21T18:45:17+00:00","og_image":[{"url":"http:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/07\/John-Finnigan_jpg-199x300.jpg","type":"","width":"","height":""}],"author":"John Finnigan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"John Finnigan","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/#article","isPartOf":{"@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/"},"author":{"name":"John Finnigan","@id":"https:\/\/blogs.edf.org\/energyexchange\/#\/schema\/person\/e4e06d0ac3c4cbe9f823ba21e6ab8b23"},"headline":"U.S. Electric Grid Under Cyber-Attack","datePublished":"2013-08-20T14:18:47+00:00","dateModified":"2015-12-21T18:45:17+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/"},"wordCount":1094,"commentCount":1,"image":{"@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/#primaryimage"},"thumbnailUrl":"http:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/07\/John-Finnigan_jpg-199x300.jpg","keywords":["Cybersecurity","Electric Grid"],"articleSection":["Grid Modernization","Utility Business Models"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/","url":"https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/","name":"U.S. Electric Grid Under Cyber-Attack - Energy Exchange","isPartOf":{"@id":"https:\/\/blogs.edf.org\/energyexchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/#primaryimage"},"image":{"@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/#primaryimage"},"thumbnailUrl":"http:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/07\/John-Finnigan_jpg-199x300.jpg","datePublished":"2013-08-20T14:18:47+00:00","dateModified":"2015-12-21T18:45:17+00:00","author":{"@id":"https:\/\/blogs.edf.org\/energyexchange\/#\/schema\/person\/e4e06d0ac3c4cbe9f823ba21e6ab8b23"},"breadcrumb":{"@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/#primaryimage","url":"http:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/07\/John-Finnigan_jpg-199x300.jpg","contentUrl":"http:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/07\/John-Finnigan_jpg-199x300.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.edf.org\/energyexchange\/"},{"@type":"ListItem","position":2,"name":"U.S. Electric Grid Under Cyber-Attack"}]},{"@type":"WebSite","@id":"https:\/\/blogs.edf.org\/energyexchange\/#website","url":"https:\/\/blogs.edf.org\/energyexchange\/","name":"Energy Exchange","description":"Accelerating the clean energy revolution","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.edf.org\/energyexchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blogs.edf.org\/energyexchange\/#\/schema\/person\/e4e06d0ac3c4cbe9f823ba21e6ab8b23","name":"John Finnigan","description":"Senior Regulatory Attorney John Finnigan is the senior regulatory attorney for EDF\u2019s US Climate and Energy Program, representing EDF before state public utility commissions on smart grid deployments and energy efficiency matters.","sameAs":["http:\/\/www.edf.org\/people\/john-finnigan"],"url":"https:\/\/blogs.edf.org\/energyexchange\/author\/jfinnigan\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/posts\/4824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/users\/12461"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/comments?post=4824"}],"version-history":[{"count":0,"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/posts\/4824\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/media?parent=4824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/categories?post=4824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/tags?post=4824"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/coauthors?post=4824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}