Yes, absolutely. There are a number of avenues to access that sort of information. The electric utilities in this country spend a significant amount of effort on the IT security side to do precisely that, both through the association itself, where they use it as an opportunity for information sharing, and also through a wide variety of other methods. They're seeking to access precisely that: what the leading edge is—and in some cases, as they say, the “bleeding edge”—of intrusion technology and hacking technology, and so on. There is a very significant focus on that from the utility companies, and as a result it continues to be a significant focus for our working group as well.
On October 26th, 2006. See this statement in context.