InfoGram

This page may contain links to non-U.S. government websites. What this means to you »

July 12, 2001

NOTE: This InfoGram will be distributed weekly to provide members of the emergency services sector with news and information concerning the protection of their critical infrastructures. For further information please contact the U.S. Fire Administration's Critical Infrastructure Protection Information Center at (301) 447-1325 or email at usfacipc@dhs.gov.

Managing Firefighting Resources

The Federal Computer Week reported that an interagency wildfire management organization has begun deploying two of three major components in a software application designed to manage firefighting resources. The application will automate the ordering of firefighting resources such as crews and airplanes and provide decision-makers with real-time information on the status of those resources. The National Wildfire Coordinating Group (NWCG) is rolling out the administrative and status reporting pieces of its Resource Ordering and Status System (ROSS). A third resource ordering capability will be disseminated around December. NWCG is composed of several federal agencies including the Forest Service, the Bureau of Land Management, the Fish and Wildlife Service as well as many state forestry agencies. The group oversees wildfire management via more than 400 dispatch and coordination offices across the country. ROSS will be deployed to enable dispatch officials to see what firefighting personnel and equipment are available and to order them electronically. "By automating this, we are immediately able to see the available resources, and as things change, their status is automatically updated," said Jon Skeels, ROSS project team leader for NWCG. Mr. Skeels continued that "just knowing where resources are is a very important piece of information." Currently, such information is sent daily to the National Interagency Fire Center in Boise, Idaho, "but by the time it is compiled, it is old news," he said.

Era of Mass Victimization

The focus on routine security and privacy issues partially caused by denial-of-service attacks and site defacements has too many government, corporate, and information systems leaders distracted from the more serious consequences. According to Frank Lesiak, a German intelligence expert, there is high threat of hostile governments or terrorists taking a sophisticated, long-term approach to wreaking havoc on American and European critical infrastructures. "Imagine a society that breaks down because the entire information technology structure disintegrates," he said. "That kills a lot of people, not just bits and bytes." A related study just completed by American market researchers Frost & Sullivan concludes a growing number of domestic and foreign hackers are no longer concentrating on disrupting online service and implanting viruses. "They are also doing less noticeable, but potentially more damaging activities such as reading email and gathering restricted information for future catastrophic use." Recent research by Gartner Inc., shows that within a year there will be at least one incident of economic mass victimization in this country caused by domestic cyberterrorists. Their research also points to the high threat of a cyberattack on United States critical infrastructures by foreign terrorists or hostile nations.

Information Sharing and Analysis Centers

Rep. Tom Davis (R-VA) reintroduced a bill aimed at encouraging the private sector to share cybersecurity incidents with federal agencies so the government has a better picture of threats to national security, according to an article in the Federal Computer Week. Rep. Davis and co-sponsor, Rep. Jim Moran (D-VA), first introduced the bill last year after the formation of several private-sector information sharing and analysis centers (ISACs). ISACs were designed to share security incidents as part of Presidential Decision Directive 63 (PDD 63). PDD 63 requires the federal government to secure the systems that support the nation's critical infrastructures (i.e., telecommunications, energy, water, banking and finance, transportation, and emergency services). Banking and finance and the information technology sectors are among those that have already formed ISACs. "Although they are sharing information among themselves, private sector leaders will not pass cybersecurity information to government incident response organizations," said Diane Frank, the article's author. "Their refusal stems from fears that information held by federal agencies may be exposed through the Freedom of Information Act." Note: It is the goal of the Critical Infrastructure Protection Information Center (USFA CIPIC) to eventually become an ISAC for the fire and emergency services sector.

Computer Security Maladies

The following are the most common errors still committed by corporate and personal computer users as observed by the experts from Computerworld. They are modified for consideration by those accountable for cybersecurity within the fire and emergency services sector.

USFACIPC Weekly Lexicon: Execute

(adapted from the Critical Infrastructure Glossary of Terms by the Critical Infrastructure Assurance Office)

To carry out a task or set of tasks. To execute a program, for example, is to load it into memory and run it. An executable file is a program file. To execute code is to carry out the instructions described by the code.

Disclaimer of Endorsement

The U.S. Fire Administration/EMR-ISAC does not endorse the organizations sponsoring linked websites, and does not endorse the views they express or the products/services they offer.

Fair Use Notice

This INFOGRAM may contain copyrighted material that was not specifically authorized by the copyright owner. EMR-ISAC personnel believe this constitutes "fair use" of copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use copyrighted material contained within this document for your own purposes that go beyond "fair use," you must obtain permission from the copyright owner.

Reporting Notice

DHS and the FBI encourage recipients of this document to report information concerning suspicious or criminal activity to DHS and/or the FBI. The DHS National Operation Center (NOC) can be reached by telephone at 202-282-9685 or by email at NOC.Fusion@dhs.gov.

The FBI regional phone numbers can be found online at www.fbi.gov/contact/fo/fo.htm

For information affecting the private sector and critical infrastructure, contact the National Infrastructure Coordinating Center (NICC), a sub-element of the NOC. The NICC can be reached by telephone at 202-282-9201 or by email at NICC@dhs.gov.

When available, each report submitted should include the date, time, location, type of activity, number of people and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact.

RSS FeedWeekly INFOGRAM's are now available as an RSS Feed. More Information »