InfoGram

This page may contain links to non-U.S. government websites. What this means to you »

June 13, 2002

NOTE: This InfoGram will be distributed weekly to provide members of the emergency services sector with news and information concerning the protection of their critical infrastructures. For further information please contact the U.S. Fire Administration's Critical Infrastructure Protection Information Center at (301) 447-1325 or email at usfacipc@dhs.gov.

Colorado Wildfires Attack Critical Infrastructures

The 14 February InfoGram discussed how wildfires are a threat to critical infrastructures. The 28 February InfoGram specifically addressed how wildland fires threaten the family infrastructure. Unfortunately, the current massive "Hayman" forest fire in Colorado is an excellent example of both. This blaze has already consumed at least 65 structures, knocked out high-voltage power lines, burned several transmissions cables, forced a utility company to shut down lines to prevent more damage thus leaving many customers without power, and required the evacuation of the residents of two counties within the state.

As residential areas expand into relatively untouched wildlands, people living in these communities are increasingly threatened by wildfires. Protecting critical infrastructures in the wildland from fire poses special problems. It will always stretch firefighting resources to the limit; therefore, making it difficult if not impossible to respond to another major incident. Additionally, fire and EMS stations located nearby to serve these residential areas may also be at risk.

Wildland fires leave large amounts of scorched and barren land. If heavy rains follow a fire, other natural disasters can occur, including landslides, mudflows, and floods. Once ground cover has been burned away, little is left to hold soil in place on steep slopes and hillsides. The potential for nature attacks following wildfires is another matter for serious consideration when community leaders must decide where to permanently locate personnel, physical assets, and cyber systems (i.e., critical infrastructures).

If not already arranged, communities susceptible to wildfires and the possible natural disasters that may follow should negotiate mutual aid agreements with neighboring jurisdictions to bolster their protection and response capabilities. These agreements multiply the resources needed to protect critical infrastructures.

Dirty Bombs Versus Emergency Responders

"Dirty bombs" are a real threat in America, security experts say. They claim this because of the demonstrated determination of terrorists and the availability of radioactive materials. Records of the Nuclear Regulatory Commission (NRC) reveal there were 107 reports of lost or stolen radioactive sources in the United States alone during the six months ending March 31, 2002. In recent years, the annual rate of lost or stolen substances has been about 375 according to the NRC. The missing materials range from low-radioactivity debris stolen from hospitals to highly poisonous waste swiped from nuclear power plants or secretly extracted from dump sites.

No one can accurately predict how many people might be killed or injured in a radiological "dirty bomb" attack. The answer depends on a wide variety of factors ranging from the amount and type of radioactivity to the delivery means of dispersal. Given this uncertainty, researchers maintain that the most immediate threat may not be medical but psychological due in part to an overly dramatic fear of radiation that has crept into the national consciousness. Their point is that hysteria could achieve what radioisotopes might not. These scientists believe that a "dirty bomb" attack will cause a rapid and chaotic mass evacuation of people resulting in car accidents with deaths, fatal arguments, destruction of property, total disruption of all services, and much more.

The leadership of emergency first responders must realize that the terrorist's aim to induce fear and cause panic may adversely affect their personnel as well. It is probable that the psychological damage of a radiological detonation will trigger different professional and personal reactions than observed on 9/11. Concerns about being contaminated and the safety of family members could potentially generate uncooperative behaviors. Therefore, chief officers have to consider the possibility of a shortage of emergency workers willing to assist at the bomb site.

To overcome the ill effects on first responders of a "dirty bomb" explosion, the Emergency Response and Research Institute (ERRI) recommends quality training on the proper equipment. ERRI urges fire, police, and EMS departments, including hazardous materials response teams, to obtain, train with, and use the best available radiological survey equipment during any response to a known or suspected explosion. The equipment could then be reliably employed to determine what protective clothing, equipment, and special units must be required at the scene. The availability of appropriate training and equipment can yield significant benefits. Frequent rehearsals with quality equipment usually build survival confidence and the expectation of mission accomplishment.

Vulnerable Infrastructures: A Terrorist's Tool

"Change" is always present in those organizations seeking to excel. When implemented after an outstanding needs assessment followed by open-minded deliberation and effective decision-making, "organizational change" is normally desirable and advantageous. However, this "change" can also inadvertently create weaknesses that leave departments vulnerable to physical or cyber attacks by their adversaries.

A vulnerability is a weakness in a critical infrastructure that renders the infrastructure susceptible to degradation or destruction from deliberate attacks by human adversaries, natural disasters, or HazMat accidents. "One of the most formidable weapons in the terrorist arsenal is our own vulnerabilities," said Senator Bill Frist (R-TN).

It is inevitable that most federal, state, and local agencies will execute "organizational change" in the future. (For example, a large number of activities will eventually experience major changes with the development of the Department of Homeland Security.) While busy applying and adjusting to the required changes, it is too easy to be distracted from CIP and information security best practices. Hence, the plans and operations of the changing organizations become especially vulnerable to exploitation, disruption, or destruction.

In view of this reality, the CIPIC encourages senior leaders to consider their vulnerabilities during any "organizational changes." If necessary, eliminate the "terrorist's tool" by dedicating time and personnel to ensure the protection of critical infrastructures and information. Do not permit an "organizational change" to become a vulnerability in and of itself.

Bioterrorism Bill Signed

President Bush signed a bioterrorism bill into law, June 12th, providing $4.6 billion to improve American defenses against biological weapons. The new law will allocate $640 million to develop a U.S. smallpox vaccine stockpile and $1.6 billion in grants to states to improve hospital preparedness and to review the vulnerability of local water systems to attack. It will also enhance funding for the National Pharmacy Stockpile and makes potassium iodide more available near nuclear power plants to protect against radiation poisoning.

"Terrorist groups seek biological weapons. We know some rogue states already have them," President Bush said. "It is important that we confront these real threats to our country and prepare for future emergencies. Protecting our citizens against bioterrorism is an urgent duty of America."

Disclaimer of Endorsement

The U.S. Fire Administration/EMR-ISAC does not endorse the organizations sponsoring linked websites, and does not endorse the views they express or the products/services they offer.

Fair Use Notice

This INFOGRAM may contain copyrighted material that was not specifically authorized by the copyright owner. EMR-ISAC personnel believe this constitutes "fair use" of copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use copyrighted material contained within this document for your own purposes that go beyond "fair use," you must obtain permission from the copyright owner.

Reporting Notice

DHS and the FBI encourage recipients of this document to report information concerning suspicious or criminal activity to DHS and/or the FBI. The DHS National Operation Center (NOC) can be reached by telephone at 202-282-9685 or by email at NOC.Fusion@dhs.gov.

The FBI regional phone numbers can be found online at www.fbi.gov/contact/fo/fo.htm

For information affecting the private sector and critical infrastructure, contact the National Infrastructure Coordinating Center (NICC), a sub-element of the NOC. The NICC can be reached by telephone at 202-282-9201 or by email at NICC@dhs.gov.

When available, each report submitted should include the date, time, location, type of activity, number of people and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact.

RSS FeedWeekly INFOGRAM's are now available as an RSS Feed. More Information »