InfoGram

This page may contain links to non-U.S. government websites. What this means to you »

August 9, 2001

NOTE: This InfoGram will be distributed weekly to provide members of the emergency services sector with news and information concerning the protection of their critical information systems. For further information please contact the U.S. Fire Administration's Critical Infrastructure Protection Information Center at (301) 447-1325 or email at usfacipc@fema.gov.

Reporting Cyber Incidents

Current surveys indicate that municipalities and their emergency response sectors have not made great strides in cyber security. In the past three months, several town, police, and fire websites were disrupted or defaced. Many more cyber incidents have not been reported. Throughout the United States these events have raised municipal consciousness regarding computer and network security. Nevertheless, a spokesperson from the National Infrastructure Protection Center (NIPC) said that leaders of the emergency response sectors are hesitant to report a disruption of service or defacement because of perceived embarrassment. Unfortunately, this denies the NIPC opportunities to investigate and prosecute the cyber offenders. Fire and emergency service departments are courteously reminded to report computer intrusions to the NIPC or USFACIPC given the information provided at the bottom of this document.

Wireless Security Vulnerabilities

Security researchers published details of the weaknesses in encryption techniques applied to secure wireless networks. The root cause of the gaping security holes is from a flaw in the key-scheduling algorithm used by the Wired Equivalent Privacy (WEP) protocol, which is part of the 802.11 wireless networking standard. According to an article in The Register, wireless security vulnerabilities have been widely publicized before, but the difference with this flaw is that it might be far easier to exploit. Industry groups involved in the promotion of wireless networking said the work of the researchers shows that the security measures in 802.11 alone are not enough. The Wireless Ethernet Compatibility Alliance advocated use of additional and stronger encryption tools.

Code Red II

The NIPC continues to work in close coordination with its public and private sector partners regarding what has been named Code Red II. The NIPC considers Code Red II to be a serious threat because it spreads rapidly and installs a backdoor that can be accessed by anyone familiar with the exploit. Any intruder can use the backdoor compromise to make other system modifications at will. As a result, repair of the infected system may require reinstallation of the operating system, data files, and the Microsoft patch. As in the case of Code Red last week, the Microsoft patches can be located at the following URLs:

For Windows NT 4 machines:
www.microsoft.com/downloads/release.asp?releaseid=30833

For Windows 2000 machines:
www.microsoft.com/downloads/release.asp?releaseid=30800

Electricity Supply Shortages

The drought-stricken Columbia River Basin currently remains so short of water to run hydroelectric dams that the Northwest may have to borrow power from California to keep the lights on this winter. But there's no guarantee that energy-strapped California will have power to share when the Northwest needs it. "We're in the red zone," said Ed Mosey, a spokesman for the Bonneville Power Administration. Acquiring energy from California to heat homes and conduct business may or may not happen, Mr. Mosey speculated. Also, soaring demand and problems at power plants cut deeply into the power supply grid causing New York City (NYC) to declare an energy emergency on 7 August. Although it is not the city's first energy emergency, it is the first time the NYC power system manager activated a new emergency demand reduction program calling on businesses, building managers, and residents to voluntarily throttle back their power usage.

Personal Infrastructure Protection

Critical infrastructure protection (CIP) is a high priority issue within government and business circles. Given the frequency of identity and identifier theft, more consideration should be given to CIP on a personal level as it is equally relevant and applicable. The Federal Computer Incident Response Center in its June issue of Bits and Bytes recommended the following three basic and necessary steps to protect bank/credit card accounts and credit status:

USFACIPC Weekly Lexicon: Hoax

(adapted from the Critical Infrastructure Glossary of Terms by the Critical Infrastructure Assurance Office)

In virus terms, an email that warns of an invalid viral infection or risk, causing more concern then necessary to the user.

Disclaimer of Endorsement

The U.S. Fire Administration/EMR-ISAC does not endorse the organizations sponsoring linked websites, and does not endorse the views they express or the products/services they offer.

Fair Use Notice

This INFOGRAM may contain copyrighted material that was not specifically authorized by the copyright owner. EMR-ISAC personnel believe this constitutes "fair use" of copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use copyrighted material contained within this document for your own purposes that go beyond "fair use," you must obtain permission from the copyright owner.

Reporting Notice

DHS and the FBI encourage recipients of this document to report information concerning suspicious or criminal activity to DHS and/or the FBI. The DHS National Operation Center (NOC) can be reached by telephone at 202-282-9685 or by email at NOC.Fusion@dhs.gov.

The FBI regional phone numbers can be found online at www.fbi.gov/contact/fo/fo.htm

For information affecting the private sector and critical infrastructure, contact the National Infrastructure Coordinating Center (NICC), a sub-element of the NOC. The NICC can be reached by telephone at 202-282-9201 or by email at NICC@dhs.gov.

When available, each report submitted should include the date, time, location, type of activity, number of people and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact.

RSS FeedWeekly INFOGRAM's are now available as an RSS Feed. More Information »