Until recently, almost all of the hacking demonstrations were performed by the national laboratories implicitly indicating that vulnerabilities took a "rocket scientist" to understand and demonstrate. Lately, there have been a number of control system hacking demonstrations from commercial/vulnerability researchers. At the ACS Conference on the 20th, we will have a vulnerability researcher hack AMI infrastructure. We will also have an end-user demonstrate how easy it is to create a broadcast storm affecting legacy field control equipment which has ALREADY shutdown a nuclear plant and a number of process facilities.
Joe Weiss