InfoGram
June 21, 2001
NOTE: This InfoGram will be distributed weekly to provide members of the emergency services sector with news and information concerning the protection of their critical infrastructures. For further information please contact the U.S. Fire Administration's Critical Infrastructure Protection Information Center at (301) 447-1325 or email at usfacipc@dhs.gov.
Critical Infrastructure Protection Awareness Program
Fire and emergency service departments can initiate an effective Critical Infrastructure Protection (CIP) awareness program for their senior leaders by taking the following actions developed at the USFA CIPIC in consultation with other CIP and security managers:
- Obtain the support of all personnel in key department leadership positions and
orient the awareness program to these individuals.
- Firmly establish the relationship between the organization's mission and the CIP awareness effort.
- Develop a mixture of dynamic briefings and awareness actions regarding both the physical and cyber systems relevant to the department's mission.
- Begin the program with discussions about "why" CIP is necessary.
- Focus subsequent program instruction on "how" to perform CIP. (Recommend the CIP Process prepared by the USFA CIPIC.)
- Follow up by periodically reinforcing awareness with new national trends, methods, and conditions in CIP.
Vulnerability Advisory
The National Infrastructure Protection Center (NIPC) and the Federal Computer Incident Response Center (FedCIRC) jointly issued a 19 June advisory that hackers can remotely gain System Level Access (root) on any computer running Microsoft's Internet Information Services (IIS) web server software. The NIPC and FedCIRC consider this to be a significant threat due to the large installed base of IIS users, the potential for remote compromise, and the level of access granted by this vulnerability. System-level access allows a user full access to the server, so as to install malicious code, run programs, reconfigure, add, change, or delete files. The vulnerability is in the Internet services application programming interface (ISAPI) extension that is used to manage indexing services and custom searches. The attacker who successfully establishes a connection with an IIS web server could introduce malicious code by exploiting a buffer overflow vulnerability. Microsoft strongly recommends that all web server administrators mitigate this vulnerability immediately by applying the following patch: http://www.microsoft.com/technet/security/bulletin/MS01-003.asp
Oil, Gas, and Electricity Infrastructure Protection
Drilling for oil may seem protected from computer attacks, but nearly all aspects of the energy business are as dependent as any other sector on the Internet and computers to carry out routine operations, U.S. officials said. "Oil refineries, gas pipelines, power plants, and the electric transmission grid are all critical infrastructures vulnerable to cyber attacks." In the June issue of the Oil and Gas Journal, U.S. officials said they are working hard to make the Internet and government Web pages less open to electronic threats, regardless of whether they come from domestic or foreign sources. State and local governments should be petitioned to do same so as to protect critical infrastructures that emergency first responders require for successful rescue operations.
Wireless Devices Susceptible to Hackers
The wireless phone giant, NTT DoCoMo, warned its 24 million mobile Internet service subscribers that viruses and malicious electronic mail could be heading to their phones. If opened, the email will dial an emergency number, make calls to large numbers of people, or crash the consumer's cell phone. CNET News experts said this warning is another sign that hackers are turning their attention to wireless devices. An increasing number of phones can download software, which is one way of introducing a virus. Such phones are easy prey because currently there is no efficient anti-virus protection on the market for them. NIPC researchers indicate that viruses and malicious email will soon become a way of life for users of mobile phones, Palm devices (PDAs), wireless computers, etc.
Combating Cybercrime
Michael Chertoff, a newly confirmed assistant attorney at the U.S. Justice Department, told the House Judiciary Committee's Subcommittee on Crime that U.S. law enforcers need more resources to combat cybercrime and better laws to simplify the tracing of suspects over the Internet. He also testified that tougher penalties "commensurate with the harm caused" are required to adequately reflect the impact of crimes. Mr. Chertoff additionally said more money is desired so the Justice Department can work effectively to combat cybercrime with the adequate resources to hire, equip, and train investigators. The subcommittee hearings are expected to serve as a springboard for new crime legislation according to Patrick Thibodeau of Computerworld. The Justice Department, said Mr. Chertoff, is requesting changes in the procedural laws that clarify laws used to trace telephone calls so that they can also apply to electronic mail and telephony.
USFACIPC Weekly Lexicon: Denial of Service (DOS)
(adapted from the Critical Infrastructure Glossary of Terms by the Critical Infrastructure Assurance Office)
Any action or attack that prevents the use of a resource. DOS occurs when a piece of hardware or a website is inundated with requests. From a user perspective, it usually appears as a "page cannot be displayed" error.