InfoGram
July 24, 2003
NOTE: This InfoGram will be distributed weekly to provide members of the emergency management and response sector with information concerning the protection of their critical infrastructures. It has been prepared by NATEK Incorporated for the Emergency Preparedness and Response Directorate. For further information, contact the Emergency Management and Response - Information Sharing and Analysis Center (EMR-ISAC) at (301) 447-1325 or by email at emr-isac@fema.dhs.gov.
Licensed Amateur Radio Operators: CIP Multipliers
The importance of licensed amateur radio operators (who don't mind being called "hams") is re-emerging as part of the critical infrastructures of the emergency response community. There is sufficient evidence that "hams" are not an outmoded capability. In the last few weeks these amateur radio operators have been busy providing emergency communication support at various locations of the nation. For example, "hams" continue to function as critical infrastructure protection (CIP) multipliers at the ongoing wildfires in Arizona, and in the aftermath of Hurricane Claudette in Texas.
Those who had the good fortune to work with "hams" are enthusiastic about the communication support they provide to emergency first responders. Convinced that amateur radio capabilities are potentially applicable in an all hazards response, these officials offer the following minimum recommendations for initial consideration by American municipalities and their chief officers, particularly if the utilization of licensed amateur radio operators is a viable alternative within their specific jurisdiction:
Organizational Issues
- Arrange familiarization meetings with local "hams."
- Determine legal insurance, liability, and compensation requirements.
- Perform background checks for each "ham volunteer."
- Organize a local communications auxiliary consisting primarily of "hams."
- Affiliate the "hams" with the local Citizens Corp or its equivalent.
Procedural Issues
- Create an SOP for the use of licensed amateur radio operators.
- Develop a Memorandum of Understanding to formalize relationships.
- Finalize an emergency call list to activate "ham volunteers."
Training Issues
- Conduct training with local licensed amateur radio operators.
- Cross-train "hams" as EOC personnel.
- Involve the "hams" in future exercises.
Equipment Issues
- Agree that licensed amateur radio operators provide their own radios.
- Provide space in the EOC for designated "hams."
- Ensure access to dependable power sources for each radio.
- Ascertain antenna requirements to support an EOC presence.
Meeting Financial Challenges
Shrinking budgets continue to challenge many career and volunteer fire and emergency medical service departments throughout the United States. Those departments that have or will receive some federal assistance must apply the grant money as directed. Many still require more funding just to accommodate routine salaries and general operating expenses. Frequently, there is not enough funding to protect a department's critical infrastructures.
During the last century, thousands of fire/EMS departments learned to actively pursue the wide variety of funds available from private non-profit and for-profit organizations. Very few of these sources of money have been for the extended support of a fire/EMS department. However, long-term philanthropic subsidy is exactly what numerous departments really need.
It is helpful to remember that there are more than 25,000 American foundations that solicit donations specifically for supporting health, educational, and public service activities. A board of directors or trustees who decide how their money, materials, or services will be used usually governs these foundations. Consult the Foundation Center Library Services (FCLS) if interested in obtaining grants from one of these foundations. FCLS maintains information on grants and charitable giving and can be contacted at (800) 424-9836 or at www.fdncenter.org.
The opportunities for fire/EMS departments to tap into this funding have been expanding rapidly. Some departments capitalized on this source of financial support by establishing a foundation to receive donations where legally permitted. For more information about using foundations to meet financial challenges, including critical infrastructure protection, see the document entitled: Funding Alternatives for Fire and EMS Departments (FA-141) at the following URL: http://www.usfa.fema.gov/downloads/pdf/publications/fa-141.pdf (PDF, 1.0 Mb, Adobe Acrobat (PDF) Help).
Recommended Safe Computing Steps
Computerworld experts recommend organizations keep antivirus software current to ensure their computers and networks remain virus-free. Apart from using antivirus software, these specialists further recommend the following simple measures to protect from viruses and virus hoaxes:
- Do not use documents in .doc or .xls format.
- Do not launch unsolicited programs or documents.
- Forward warnings to one authorized person only.
- Turn off Windows Scripting Host if not needed.
- Follow security bulletins from software companies.
- Block unwanted file types at the email gateway.
- Change the computer's boot-up sequence.
- Write-protect floppies before giving to others.
- Subscribe to an email alert service.
- Back-up programs and data regularly.
Department of Homeland Security Advisory
The Department of Homeland Security (DHS) issued an advisory on 24 July entitled: Potential for Significant Impact on Internet Operations due to Vulnerability in Microsoft Operating Systems.
DHS published this advisory in consultation with the Microsoft Corporation to heighten awareness of potential Internet disruptions resulting from the possible spread of malicious software exploiting a vulnerability in the following popular Microsoft Windows operating systems: NT 4.0, NT 4.0 Terminal Services Edition, Windows 2000, Windows XP, and Windows Server 2003.
DHS expects that exploits are being developed for malicious use. Two additional factors are causing heightened interest in this situation: the affected operating systems are in wide spread use, and exploitation of the vulnerability could permit the execution of arbitrary code. DHS and Microsoft are concerned that a properly written exploit could rapidly spread on the Internet as a worm or virus in a fashion similar to Code Red or Slammer.
DHS and Microsoft encourage system administrators and computer owners and operators to make the time to update vulnerable versions of MS Windows operating systems listed above as soon as possible.