InfoGram

This page may contain links to non-U.S. government websites. What this means to you »

June 28, 2001

NOTE: This InfoGram will be distributed weekly to provide members of the emergency services sector with news and information concerning the protection of their critical infrastructures. For further information please contact the U.S. Fire Administration's Critical Infrastructure Protection Information Center at (301) 447-1325 or email at usfacipc@dhs.gov.

Cyberterrorism

"In the near term, domestic and foreign terrorists are likely to stay focused on traditional attack methods - bombs still work better than bytes," according to Lawrence Gershwin, an intelligence officer at the CIA's National Intelligence Council. "But we anticipate more substantial cyber-threats in the future as a more technically competent generation enters the ranks," he told lawmakers at a recent Senate hearing. Mr. Gershwin also stated that the traditional adversaries of the United States are deliberately developing computer-based tools with the potential to do long-lasting harm to the critical infrastructures of this nation. At the same hearing, Duane Andrews, a former assistant secretary of defense reported that the United States has lost precious ground in dealing with cyber-based threats. To protect our economic security and the information infrastructure, a leading analyst from the Gartner Group testified that American governments and businesses must quickly spend ten times more on cyber security. The Gartner report said that "only 0.4 percent of a company's revenue is dedicated to information security even though nearly 80 percent depend on the Internet as an integral part of their business."

First Line of Defense

Special Agent Jim Christy from the Office of the Assistant Secretary of Defense stressed that American computer users can do simple things that make life harder for malicious hackers and not do other things that make their activities easier. Given that computer operators at fire and emergency service departments are the first line of defense for their respective organizations, SA Christy's do's and don'ts are listed here for consideration and application:

The Threat Within

Employees are responsible for the majority of electronic security breaches according to a new survey conducted by the market research firm Digital Research. However, most managers still believe that the only threat comes from faceless hackers and virus writers. Alan McGibbon of Network News wrote that employees understand in detail how their organization's systems work. "Those employees who are really computer literate can exploit software loopholes or weaknesses to introduce viruses, gain access, or use hacking tools to cause mayhem." Mr. McGibbon continued that employees can unwittingly expose a department's sensitive information through sheer carelessness (e.g., opening email attachments causing the spread of damaging viruses). He recommended intrusion detection, antivirus software, firewalls, network scanning, and encryption to provide an effective and coordinated set of defenses against the threat within.

A Layered Approach to Cyber Security

In a white paper by Tom Arnold, chief technical officer at CyberSource Corporation, Mr. Arnold advised to avoid the "eggshell security model" with its hard outer shell and soft center. He wrote that organizations following the "eggshell model" fortify the outer shell using filtering routers and firewalls. Their defense against internal attacks comes from simple user name and password logins. Though these are good, Mr. Arnold recommended an "electronic citadel" approach using layers of barriers to weaken and stop attackers in addition to an impenetrable fortress at the heart. He offered the following tips for those organizations having sensitive operational information to secure:

Emergency Preparedness Canada

Canadian Prime Minister, Jean Chretien, announced the creation of a new Office of Critical Infrastructure Protection and Emergency Preparedness. The office will be the Canadian federal government's primary agency for ensuring emergency preparedness of all kinds. The new organization is charged with developing and implementing a comprehensive strategy for protecting Canada's critical infrastructure and is committed to working actively with provinces, territories, and municipalities, as well as the private sector, other countries, and organizations. The contact information for this new office: Emergency Preparedness Canada, 122 Bank Street, Second Floor, Ottawa, Ontario, Canada K1A0W6. Phone number: (800) 830-3118. Web address: www.epc-pcc.gc.ca/whatsnew/index.html.

Web Pages Defaced

The National Infrastructure Protection Center (NIPC) reported (27 June) the defacement of web pages belonging to two American and two Canadian police departments. The defacing of police web pages is occurring at increasing frequency. If it has not already begun, then it should be expected that defacement of web pages belonging to fire and emergency service departments will eventually begin. As there are no sacrosanct web pages immune from hacker activities, it is prudent to be prepared with preventive and incident response measures.

USFACIPC Weekly Lexicon: Dictionary Attack

(adapted from the Critical Infrastructure Glossary of Terms by the Critical Infrastructure Assurance Office)

An attempt to gain access to an information system by guessing a user's password using software that systematically enters words in a dictionary as passwords until a match is found.

Disclaimer of Endorsement

The U.S. Fire Administration/EMR-ISAC does not endorse the organizations sponsoring linked websites, and does not endorse the views they express or the products/services they offer.

Fair Use Notice

This INFOGRAM may contain copyrighted material that was not specifically authorized by the copyright owner. EMR-ISAC personnel believe this constitutes "fair use" of copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use copyrighted material contained within this document for your own purposes that go beyond "fair use," you must obtain permission from the copyright owner.

Reporting Notice

DHS and the FBI encourage recipients of this document to report information concerning suspicious or criminal activity to DHS and/or the FBI. The DHS National Operation Center (NOC) can be reached by telephone at 202-282-9685 or by email at NOC.Fusion@dhs.gov.

The FBI regional phone numbers can be found online at www.fbi.gov/contact/fo/fo.htm

For information affecting the private sector and critical infrastructure, contact the National Infrastructure Coordinating Center (NICC), a sub-element of the NOC. The NICC can be reached by telephone at 202-282-9201 or by email at NICC@dhs.gov.

When available, each report submitted should include the date, time, location, type of activity, number of people and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact.

RSS FeedWeekly INFOGRAM's are now available as an RSS Feed. More Information »