{"id":5265,"date":"2013-10-28T16:46:31","date_gmt":"2013-10-28T16:46:31","guid":{"rendered":"http:\/\/blogs.edf.org\/energyexchange\/?p=5265"},"modified":"2015-12-21T12:45:15","modified_gmt":"2015-12-21T18:45:15","slug":"the-u-s-power-grids-cyber-war-games","status":"publish","type":"post","link":"https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/","title":{"rendered":"The U.S. Power Grid\u2019s Cyber War Games"},"content":{"rendered":"<p><a href=\"https:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/10\/War_Games_poster.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright  wp-image-5266\" src=\"https:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/10\/War_Games_poster-669x1024.jpg\" alt=\"\" width=\"216\" height=\"295\" \/><\/a>In the 1983 thriller <em>WarGames, <\/em>Matthew Broderick plays a teen-age computer geek who unknowingly signs onto a Pentagon computer while hacking into a toy company\u2019s new computer game. Thinking that he\u2019s simply playing a game called <em>Global Thermonuclear Warfare,<\/em> Broderick launches the game and nearly starts a nuclear war.\u00a0 The <a href=\"http:\/\/www.nerc.com\/Pages\/default.aspx\" target=\"_blank\">North American Electric Reliability Council<\/a> (NERC) will hold its own war game next month with a simulated attack on the U.S. power grid.<\/p>\n<p>The drill, called <a href=\"http:\/\/www.spp.org\/publications\/13%20-%20CIPC%20Brief%20(Harrell%20Conway%20Mar%202013)%20V2.pdf\">GridEx II<\/a>, will take place on November 13-14 of this year. The participants will include 65 utilities and eight regional transmission organizations, representing most of the nation\u2019s electricity customers.\u00a0 The drill will test how well the electric utility industry and the grid itself respond to physical and cyber attacks.<\/p>\n<p>A NERC <a href=\"http:\/\/www.nerc.com\/comm\/CIPC\/Pages\/default.aspx\">Critical Infrastructure Protection Committee<\/a> (CIPC) working group will begin the drill by sending participants a series of simulated physical and cyber attacks, climaxing in a national security emergency.\u00a0 Participants will then respond and interact with each other, just as they would in a real emergency.\u00a0 The simulation will last 36 hours, and the CIPC working group will evaluate the participants\u2019 responses and provide feedback on how their actions impact the ongoing scenario.\u00a0 After the drill, the working group will analyze the results and prepare a report on lessons learned.<\/p>\n<p><!--more--><\/p>\n<p>The drill is timely.\u00a0 Our nation\u2019s power grid is <a href=\"https:\/\/blogs.edf.org\/energyexchange\/2013\/08\/20\/u-s-electric-grid-under-cyber-attack\/\">under constant cyber attack<\/a>, according to a <a href=\"http:\/\/democrats.energycommerce.house.gov\/sites\/default\/files\/documents\/Report-Electric-Grid-Vulnerability-2013-5-21.pdf\">survey of electric utilities<\/a> by U.S. House Representatives Henry Waxman and (now Senator) Edward Markey. James Clapper, the Director of National Intelligence, described cyber attacks as a soft war that is already underway and a dire global threat in his April 2013 <a href=\"http:\/\/www.dni.gov\/files\/documents\/Intelligence%20Reports\/2013%20WWTA%20US%20IC%20SFR%20%20HPSCI%2011%20Apr%202013.pdf\">World Threat Assessment of the US Intelligence Community<\/a>.\u00a0 The Department of Homeland Security investigated over 200 serious cyber attacks against critical facilities during the first half of 2013, and more than half of these targeted the grid.<\/p>\n<p><strong>Adequate Investment<\/strong><\/p>\n<p>The U.S. has developed a number of cyber security protections for the grid, but we must do more.\u00a0 Our country needs to make adequate investments in cyber security.\u00a0 With the huge budget deficits that the U.S. has incurred in recent years, the proper level of government spending is often at issue.\u00a0 Given the devastating consequences of a cyber attack on the grid, this is one area where we can\u2019t afford to cut corners.\u00a0 Our leaders must ensure that federal budget cuts do not impair the Department of Energy\u2019s and the Department of Homeland Security\u2019s means to protect our nation\u2019s critical energy infrastructure from cyber attacks.<\/p>\n<p><strong>Broader FERC Authority<\/strong><\/p>\n<p><a href=\"https:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/07\/John-Finnigan_jpg.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft  wp-image-4606\" src=\"https:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/07\/John-Finnigan_jpg-199x300.jpg\" alt=\"John Finnigan\" width=\"139\" height=\"210\" srcset=\"https:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/07\/John-Finnigan_jpg-199x300.jpg 199w, https:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/07\/John-Finnigan_jpg.jpg 425w\" sizes=\"auto, (max-width: 139px) 100vw, 139px\" \/><\/a>We also need legislation granting the <a href=\"https:\/\/www.ferc.gov\/\">Federal Energy Regulatory Commission<\/a> (FERC) broader authority to protect against cyber attacks.\u00a0\u00a0 FERC is charged with protecting the grid against cyber attacks, but it doesn\u2019t have the legal authority it needs to do so.\u00a0 <a href=\"http:\/\/www.ferc.gov\/EventCalendar\/Files\/20120912103413-Testimony-McClelland.pdf\">FERC has pleaded<\/a> with Congress to fix this oversight.<\/p>\n<p>The Federal Power Act grants FERC authority over the bulk power system, but most of the smart grid equipment that creates vulnerabilities is installed on local distribution systems beyond its jurisdiction.\u00a0 As a result, the <a href=\"http:\/\/www.nist.gov\/\">National Institute of Standards and Technology<\/a> (NIST) has put together a three-volume set of smart grid cyber security standards \u2013 but these standards are voluntary.\u00a0 FERC is working with the <a href=\"http:\/\/www.naruc.org\/\">National Association of Regulatory Utility Commissioners<\/a> to monitor whether utilities are following these voluntary standards, but this is not enough.\u00a0 The threat of grid cyber attacks is too real, and the potential consequences too dire.\u00a0 The NIST standards should be mandatory and FERC\u2019s authority should extend to critical distribution infrastructure that puts the bulk power system at risk.<\/p>\n<p>Any new legislation should empower FERC to act proactively.\u00a0 FERC should have the means to take timely actions to counter clear and present dangers as they arise.\u00a0 Unfortunately, NERC\u2019s process for adopting cyber standards is slow and unwieldy.\u00a0 Because FERC\u2019s present jurisdiction is passive in nature, it can only approve standards developed by NERC.\u00a0 Congress should expand FERC\u2019s authority to act in case of emergency.<\/p>\n<p><strong>Coordinated Enforcement<\/strong><\/p>\n<p>The appropriate boundary between federal and state control over electricity service has been disputed for over a century, since Thomas Edison\u2019s day.\u00a0 And, until recently, the manner of providing electric service had not changed much since Edison\u2019s era.\u00a0 The smart grid is beginning to modernize our energy infrastructure by marrying the Internet to the electric grid.\u00a0 Just as the Internet is a matter of interstate commerce, so are critical smart grid facilities that could disrupt the bulk power system.\u00a0 We can ease jurisdictional tensions by following an existing model that uses a federal-state partnership to enforce federal standards \u2013 interstate pipeline safety.<\/p>\n<p>Interstate pipeline safety standards are established by the <a href=\"http:\/\/www.phmsa.dot.gov\/\">Pipeline and Hazardous Materials Safety Administration<\/a> (PHMSA), a branch of the Department of Transportation.\u00a0 Although the PHMSA sets the standards, any state can assume responsibility for enforcing them within their borders.\u00a0 The state simply needs to follow the federal standards at a minimum and apply the same enforcement penalties.\u00a0 While not perfect, this federal-state partnership has generally succeeded in ensuring pipeline safety in a cost-effective manner.<\/p>\n<p><strong>Information Sharing<\/strong><\/p>\n<p>We also need legislation to enable better practices for sharing information about cyber threats.\u00a0 At the moment, we have two venues where the government and utilities voluntarily share this information:<\/p>\n<ul>\n<li>the Department of Homeland Security National Cybersecurity and Communications Integration Center (NCCIC); and<\/li>\n<li>the NERC Electricity Sector \u2013 Information Sharing and Analysis Center (ES-ISAC).<\/li>\n<\/ul>\n<p>Perhaps a better approach would be to establish a new, independent organization to act as a single clearinghouse for cyber security threats.\u00a0 Today, government agencies share alerts and notifications about impending cyber threats.\u00a0 But the information often fails to provide sufficient detail for the private sector to take action.<\/p>\n<p>Government employees should be allowed to share sensitive details as necessary, to protect against a cyber attack.\u00a0 As a matter of security, the utility personnel who receive this information should be screened for the appropriate level of national security clearance.\u00a0 If electric utilities are required to share confidential information, it should not be disclosed beyond these groups.\u00a0 Many of these concerns are addressed in the <a href=\"http:\/\/intelligence.house.gov\/sites\/intelligence.house.gov\/files\/documents\/CISPAPassedApril2013.pdf\">Cyber Intelligence Sharing and Protection Act of 2013<\/a>. The House passed this bill on April 18, 2013 by a 288-127 vote.\u00a0 The Senate should pass this bill too.<\/p>\n<p><strong>Electric Utility Commitment<\/strong><\/p>\n<p>Finally, utilities should commit to following cyber security best practices, rather than doing the bare minimum.\u00a0 NERC publishes voluntary cyber security recommendations, but <a href=\"http:\/\/democrats.energycommerce.house.gov\/sites\/default\/files\/documents\/Report-Electric-Grid-Vulnerability-2013-5-21.pdf\">only 20%<\/a> of electric utilities follow these recommendations. Utilities seek to provide safe, adequate and reliable service in a cost-effective manner.\u00a0 They should add cyber security to this credo.\u00a0 To facilitate this, state utility commissions should allow timely recovery of cyber security costs.<\/p>\n<p>Hopefully, NERC\u2019s war game simulation will have a happy ending like<em> <\/em>the 1983 film.\u00a0 If we don\u2019t do more to strengthen our vulnerable grid\u2019s cyber security, we could be writing our own screenplay for a disaster movie.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the 1983 thriller WarGames, Matthew Broderick plays a teen-age computer geek who unknowingly signs onto a Pentagon computer while hacking into a toy company\u2019s new computer game. Thinking that he\u2019s simply playing a game called Global Thermonuclear Warfare, Broderick launches the game and nearly starts a nuclear war.\u00a0 The North American Electric Reliability Council &#8230;<\/p>\n","protected":false},"author":12461,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[84830,27600],"tags":[52766,53028,40255,52996],"coauthors":[],"class_list":["post-5265","post","type-post","status-publish","format-standard","hentry","category-grid-modernization","category-utilities","tag-cybersecurity","tag-ferc","tag-nerc","tag-power-grid"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The U.S. Power Grid\u2019s Cyber War Games - Energy Exchange<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The U.S. Power Grid\u2019s Cyber War Games - Energy Exchange\" \/>\n<meta property=\"og:description\" content=\"In the 1983 thriller WarGames, Matthew Broderick plays a teen-age computer geek who unknowingly signs onto a Pentagon computer while hacking into a toy company\u2019s new computer game. Thinking that he\u2019s simply playing a game called Global Thermonuclear Warfare, Broderick launches the game and nearly starts a nuclear war.\u00a0 The North American Electric Reliability Council ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/\" \/>\n<meta property=\"og:site_name\" content=\"Energy Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-28T16:46:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-12-21T18:45:15+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/10\/War_Games_poster-669x1024.jpg\" \/>\n<meta name=\"author\" content=\"John Finnigan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Finnigan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/10\\\/28\\\/the-u-s-power-grids-cyber-war-games\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/10\\\/28\\\/the-u-s-power-grids-cyber-war-games\\\/\"},\"author\":{\"name\":\"John Finnigan\",\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/#\\\/schema\\\/person\\\/e4e06d0ac3c4cbe9f823ba21e6ab8b23\"},\"headline\":\"The U.S. Power Grid\u2019s Cyber War Games\",\"datePublished\":\"2013-10-28T16:46:31+00:00\",\"dateModified\":\"2015-12-21T18:45:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/10\\\/28\\\/the-u-s-power-grids-cyber-war-games\\\/\"},\"wordCount\":1157,\"commentCount\":3,\"image\":{\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/10\\\/28\\\/the-u-s-power-grids-cyber-war-games\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/wp-content\\\/blogs.dir\\\/38\\\/files\\\/2013\\\/10\\\/War_Games_poster-669x1024.jpg\",\"keywords\":[\"Cybersecurity\",\"FERC\",\"NERC\",\"Power Grid\"],\"articleSection\":[\"Grid Modernization\",\"Utility Business Models\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/10\\\/28\\\/the-u-s-power-grids-cyber-war-games\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/10\\\/28\\\/the-u-s-power-grids-cyber-war-games\\\/\",\"url\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/10\\\/28\\\/the-u-s-power-grids-cyber-war-games\\\/\",\"name\":\"The U.S. Power Grid\u2019s Cyber War Games - Energy Exchange\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/10\\\/28\\\/the-u-s-power-grids-cyber-war-games\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/10\\\/28\\\/the-u-s-power-grids-cyber-war-games\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/wp-content\\\/blogs.dir\\\/38\\\/files\\\/2013\\\/10\\\/War_Games_poster-669x1024.jpg\",\"datePublished\":\"2013-10-28T16:46:31+00:00\",\"dateModified\":\"2015-12-21T18:45:15+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/#\\\/schema\\\/person\\\/e4e06d0ac3c4cbe9f823ba21e6ab8b23\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/10\\\/28\\\/the-u-s-power-grids-cyber-war-games\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/10\\\/28\\\/the-u-s-power-grids-cyber-war-games\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/10\\\/28\\\/the-u-s-power-grids-cyber-war-games\\\/#primaryimage\",\"url\":\"http:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/wp-content\\\/blogs.dir\\\/38\\\/files\\\/2013\\\/10\\\/War_Games_poster-669x1024.jpg\",\"contentUrl\":\"http:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/wp-content\\\/blogs.dir\\\/38\\\/files\\\/2013\\\/10\\\/War_Games_poster-669x1024.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/2013\\\/10\\\/28\\\/the-u-s-power-grids-cyber-war-games\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The U.S. Power Grid\u2019s Cyber War Games\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/#website\",\"url\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/\",\"name\":\"Energy Exchange\",\"description\":\"Accelerating the clean energy revolution\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/#\\\/schema\\\/person\\\/e4e06d0ac3c4cbe9f823ba21e6ab8b23\",\"name\":\"John Finnigan\",\"description\":\"Senior Regulatory Attorney John Finnigan is the senior regulatory attorney for EDF\u2019s US Climate and Energy Program, representing EDF before state public utility commissions on smart grid deployments and energy efficiency matters.\",\"sameAs\":[\"http:\\\/\\\/www.edf.org\\\/people\\\/john-finnigan\"],\"url\":\"https:\\\/\\\/blogs.edf.org\\\/energyexchange\\\/author\\\/jfinnigan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The U.S. Power Grid\u2019s Cyber War Games - Energy Exchange","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/","og_locale":"en_US","og_type":"article","og_title":"The U.S. Power Grid\u2019s Cyber War Games - Energy Exchange","og_description":"In the 1983 thriller WarGames, Matthew Broderick plays a teen-age computer geek who unknowingly signs onto a Pentagon computer while hacking into a toy company\u2019s new computer game. Thinking that he\u2019s simply playing a game called Global Thermonuclear Warfare, Broderick launches the game and nearly starts a nuclear war.\u00a0 The North American Electric Reliability Council ...","og_url":"https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/","og_site_name":"Energy Exchange","article_published_time":"2013-10-28T16:46:31+00:00","article_modified_time":"2015-12-21T18:45:15+00:00","og_image":[{"url":"http:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/10\/War_Games_poster-669x1024.jpg","type":"","width":"","height":""}],"author":"John Finnigan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"John Finnigan","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/#article","isPartOf":{"@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/"},"author":{"name":"John Finnigan","@id":"https:\/\/blogs.edf.org\/energyexchange\/#\/schema\/person\/e4e06d0ac3c4cbe9f823ba21e6ab8b23"},"headline":"The U.S. Power Grid\u2019s Cyber War Games","datePublished":"2013-10-28T16:46:31+00:00","dateModified":"2015-12-21T18:45:15+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/"},"wordCount":1157,"commentCount":3,"image":{"@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/#primaryimage"},"thumbnailUrl":"http:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/10\/War_Games_poster-669x1024.jpg","keywords":["Cybersecurity","FERC","NERC","Power Grid"],"articleSection":["Grid Modernization","Utility Business Models"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/","url":"https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/","name":"The U.S. Power Grid\u2019s Cyber War Games - Energy Exchange","isPartOf":{"@id":"https:\/\/blogs.edf.org\/energyexchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/#primaryimage"},"image":{"@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/#primaryimage"},"thumbnailUrl":"http:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/10\/War_Games_poster-669x1024.jpg","datePublished":"2013-10-28T16:46:31+00:00","dateModified":"2015-12-21T18:45:15+00:00","author":{"@id":"https:\/\/blogs.edf.org\/energyexchange\/#\/schema\/person\/e4e06d0ac3c4cbe9f823ba21e6ab8b23"},"breadcrumb":{"@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/#primaryimage","url":"http:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/10\/War_Games_poster-669x1024.jpg","contentUrl":"http:\/\/blogs.edf.org\/energyexchange\/wp-content\/blogs.dir\/38\/files\/2013\/10\/War_Games_poster-669x1024.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.edf.org\/energyexchange\/2013\/10\/28\/the-u-s-power-grids-cyber-war-games\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.edf.org\/energyexchange\/"},{"@type":"ListItem","position":2,"name":"The U.S. Power Grid\u2019s Cyber War Games"}]},{"@type":"WebSite","@id":"https:\/\/blogs.edf.org\/energyexchange\/#website","url":"https:\/\/blogs.edf.org\/energyexchange\/","name":"Energy Exchange","description":"Accelerating the clean energy revolution","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.edf.org\/energyexchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blogs.edf.org\/energyexchange\/#\/schema\/person\/e4e06d0ac3c4cbe9f823ba21e6ab8b23","name":"John Finnigan","description":"Senior Regulatory Attorney John Finnigan is the senior regulatory attorney for EDF\u2019s US Climate and Energy Program, representing EDF before state public utility commissions on smart grid deployments and energy efficiency matters.","sameAs":["http:\/\/www.edf.org\/people\/john-finnigan"],"url":"https:\/\/blogs.edf.org\/energyexchange\/author\/jfinnigan\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/posts\/5265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/users\/12461"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/comments?post=5265"}],"version-history":[{"count":0,"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/posts\/5265\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/media?parent=5265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/categories?post=5265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/tags?post=5265"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.edf.org\/energyexchange\/wp-json\/wp\/v2\/coauthors?post=5265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}