InfoGram
May 24, 2001
NOTE: This InfoGram will be distributed weekly to provide members of the emergency services sector with news and information concerning the protection of their critical infrastructures. For further information please contact the U.S. Fire Administration's Critical Infrastructure Protection Information Center at (301) 447-1325 or email at usfacipc@dhs.gov.
Common Security Flaws
A computer crimes investigator, Jim Williams, said he sees evidence that the downturn in the economy may have led to cutbacks in cyber security. To reduce protection of cyber-based systems at a time of greatly increased attacks on those systems would be a big mistake, according to Mr. Williams. As a means to promote awareness and discourage any cutbacks, he cited the following hidden security traps:
- Excessive dependence on firewalls or
other products without monitoring the network for intrusions.
- Network administrators pulling double
duty as security managers when they do not have either the time or the
skills.
- The lack of department or organization
cyber security training for all involved personnel.
- Overlooking security on telephone
switches, voice mail, and modem banks.
Another New Wave of Attacks
United Press International reported that according to a 21 May foreign affairs letter, Chinese hackers are preparing a new wave of attacks against U.S. cyber systems for late May and June. This next round of cyber attacks is expected to move beyond the relatively benign defacements seen earlier this month. The "Red Hacker's" organization in the People's Republic of China announced that they plan to install "a variety of viruses, worms, automatic bombs, and cookies in their future attacks on American cyber systems." "Being forewarned is being forearmed." Fire and emergency services departments should check the health of their cyber systems (e.g., 911, CAD, radio, PC's, LAN's, etc.) and maintain accountability, awareness, and vigilance to avoid degradation of their operational effectiveness.
Staying Computer Security Healthy
Data collected by the research firm, Computer Economics, indicates that computer viruses have caused over $6.7 billion in damage since January 1, 2001. Considering the extent of this devastation and the potential for increased cyber attacks by more sophisticated electronic criminals, it would be prudent for the emergency first response community to check out the virus information libraries compiled by the security gurus of the major antivirus software vendors. While actual computer viruses can destroy computers, virus scares can also cause disruption-as employees send out panicked alerts about nonexistent bugs, according to Deirdre Lanning of ECompany. To maintain computer security health, she recommends using available glossaries to help decipher the technical jargon often found in computer virus alerts and lists of the most recent virus discoveries. Those emergency service departments who are particularly vulnerable can sign up for a free newsletter published by the major antivirus software vendors.
Infrastructure Versus
Reliability
Industry figures like to refer to the cyber systems medium as an "infrastructure." But before it can be considered as reliable as that word connotes, cyber systems protection has far to go, said Vint Cerf, the WorldCom senior vice president. In a recent interview, Mr. Cerf said it is very important to know that when something becomes an "infrastructure," people rely on it. "We use the term 'infrastructure' pretty lightly these days," he said. "When something becomes infrastructure'you don't think about it at all until it doesn't work." Referring to cyber systems as infrastructure, Mr. Cerf said, is of no use whatsoever unless the systems actually work. Cerf also said that the federal government's interest in critical infrastructure protection is a sure sign that cyber systems are on the way to being seen as an infrastructure-as essential to the American public as the telephone system and the power grid. He added, however, that as long as cyber systems remain subject to malicious attacks, "we are facing a very fragile future." In a related interview, John Sopko, acting chief of the Commerce Department's National Telecommunications and Information Administration, said that the Bush administration's commitment to critical infrastructure protection is paramount. Mr. Sopko said that infrastructure protection means protecting the economy as a whole in the 21st century.
Water Supply
California health officials published an advisory on 16 May directing the operators of the state's water systems to prepare for the definite rolling blackouts throughout the summer months. The Department of Health Services told the nearly 9,000 public water agencies in California that they should have backup electrical power and emergency sources of water as soon as possible. Water is one of several sectors that have been seeking exemptions from rolling blackouts because they provide vital services. The Health Services advisory followed a warning issued by the Association of California Water Agencies urging water systems be exempt from electrical power outages because they are essential to public health and safety. As rolling blackouts have already been predicted for various metropolitan areas of the nation, this certainly seems to be an important issue for many areas outside of California.
Electrical Power
California state utilities regulators announced on 21 May that they will exempt individual businesses from rolling blackouts this summer if the customers can prove the outages would present "a significant danger to public health and safety." Hundreds of nursing homes, organ donor labs, outpatient health clinics, water agencies, etc., are expected to apply. Although the deadline for all applications is 1 June, the utilities commission does not expect to finish its review of the applications until 2 August. Even though blackouts have already begun in California, the Public Utilities Commissioner said his commission will not be done before then because "this is a serious exercise aimed at protecting the well-being of the people in California and they can approve only a limited number of applications."
USFACIPC Weekly Lexicon: Compromise
(adapted from the Critical Infrastructure Glossary of Terms by the Critical Infrastructure Assurance Office)
An intrusion of established security policy and procedures, which has the potential of disclosing the department's critical cyber systems information to an unauthorized user.