InfoGram

This page may contain links to non-U.S. government websites. What this means to you »

June 12, 2003

NOTE: This InfoGram will be distributed weekly to provide members of the emergency management and response sector with information concerning the protection of their critical infrastructures. It has been prepared by NATEK Incorporated for the Emergency Preparedness and Response Directorate. For further information, contact the Emergency Management and Response - Information Sharing and Analysis Center (EMR-ISAC) at (301) 447-1325 or by email at emr-isac@fema.dhs.gov.

Interoperability and Continuity of Operations

Chief officers know that responding to major incidents requires effective planning, coordination, communication, and sharing of information among numerous first responder organizations. They recognize that improving interoperability is one of the most crucial steps local departments can take to ensure their response-ability. Frequently, interoperability refers to communication and computer links as the means of coordinating public safety operations across jurisdictions. However, in practice, interoperability is the ability of emergency personnel, their equipment, and systems to efficiently and consistently interface and operate with other agencies.

The CIPIC suggests that interoperability is all about seamless, coordinated, and integrated operations. In its relationship to critical infrastructure protection (CIP), interoperability specifically involves the following paramount actions:

While chief officers work to train and prepare their personnel to respond to a disaster, they must also assure their departments-as a whole-are ready. This means planning for the protection of personnel, physical assets, and communication systems (i.e., critical infrastructures) to guarantee continuity of operations. The CIPIC proposes that superb, sustained operations cannot be achieved without the 24/7 availability of department critical infrastructures.

Cyber-crime: A Threat to Critical Infrastructures

Although it may not create the same fear in people as the possibility of a chemical, biological, radiological, or nuclear attack, cyber-crime is a considerable threat to American communities and their critical infrastructures. In 2002, the number of domestic Internet criminal cases continued to dramatically increase, according to data released by the Cyber-Terror Response Center. With new types of cyber-crimes being invented everyday, according to the center, these crimes have the potential to seriously degrade or disrupt critical infrastructures (e.g., block emergency communications or cut off electricity and water).

In a related matter, the Department of Homeland Security (DHS) published an Information Bulletin, dated 6 June 2003, entitled: Mass Mailing Malicious Code-Worms and Viruses. In this bulletin, DHS reported an increase in the use of two mass mailing techniques to distribute malicious code via electronic mail (email). In the first, the virus/worm author sends emails with infected attachments to a relatively small number of email recipients, some who unwittingly click on the attachment and infect their machines, which begin to send the virus/worm to all of the addresses in the recipients' email address book.

In the second, the virus/worm author sends millions of emails with infected attachments to multiple "open proxy" machines on the Internet. The virus/worm author can hide the origin of the infected emails because they appear to originate from the many proxy machines that forwarded them. The threat posed by this technique is significant. Because the virus/worm is initially delivered simultaneously to millions of recipients, a large portion of the recipients' machines can be infected before anti-virus vendors can update users' anti-virus programs to block the virus/worm.

Organizations can protect against future email delivered malicious code by blocking all executable code at their email gateway. This simple countermeasure could substantially reduce the impact of malicious codes. For more information about cyber-crime, worms and viruses, or to report an incident, contact the DHS watch center at 1-888-585-9078 or at nipc.watch@fbi.gov.

What About Monkeypox?

Federal and state health workers continue to identify new cases of monkeypox virus infections in Midwesterners who came into contact with infected pet prairie dogs. Officials at the Centers for Disease Control and Prevention (CDC), as well as state health authorities in Illinois, Indiana, and Wisconsin, are aggressively attempting to contain the outbreak by tracing sales of possibly infected animals and the whereabouts of people who may have come in contact with them.

A CDC Fact Sheet explained that monkeypox is a rare viral disease that is found mostly in the rainforest countries of central and west Africa. "The disease is called 'monkeypox' because it was discovered in laboratory monkeys in 1958." In 1970, monkeypox was identified as the cause of a smallpox-like illness in humans living in remote African locations. The report of the disease in early June 2003 among several residents in the United States is the first evidence of community-acquired monkeypox virus infection in America.

The CDC Fact Sheet further revealed that the clinical features of monkeypox in humans begin with fever, headache, muscle aches, backache, swollen lymph nodes, a general feeling of discomfort, and exhaustion. "Within 1 to 3 days (sometimes longer) after onset of fever, the patient develops a papular rash (i.e., raised bumps). The lesions usually develop through several stages before crusting and falling off. The illness typically lasts for 2 to 4 weeks." It is important for emergency medical personnel to know the disease can be spread from person to person, but it is much less infectious than smallpox. Additional information can be obtained by visiting: www.cdc.gov/ncidod/monkeypox, or by calling the CDC public response hotline at 888-246-2675.

More Free Resources for Local Application

County Risk Management: Policy and Practice, is a training program for county officials and staff, and is designed for small and rural counties. The program is actually a course that discusses the basics of risk management, risk identification and assessment, risk analysis, and establishing a risk management program. The National Association of Counties (NACo) developed this course with the assistance of the Public Risk Management Association (PRIMA).

The National Center for Small Communities (NCSC) developed and published a new manual entitled: Limiting Small Town Liability: A Risk Management Primer. NCSC designed this user- friendly resource with the direct input of small community leaders of American towns, cities, and counties. The primer describes the risk management process and how it can be easily incorporated into current local government activities. It also introduces some risk management topics that are of particular interest to small communities. Furthermore, it provides planning and organizational tools to help small community leaders create a basic risk management plan.

Both of these resources are available for free download on the Public Entity Risk Institute (PERI) website at: www.riskinstitute.org/ptr.asp. To find each one, just click "choose a publication." Any difficulty accessing these free resources can be directed to PERI at 703-352-1846.

Disclaimer of Endorsement

The U.S. Fire Administration/EMR-ISAC does not endorse the organizations sponsoring linked websites, and does not endorse the views they express or the products/services they offer.

Fair Use Notice

This INFOGRAM may contain copyrighted material that was not specifically authorized by the copyright owner. EMR-ISAC personnel believe this constitutes "fair use" of copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use copyrighted material contained within this document for your own purposes that go beyond "fair use," you must obtain permission from the copyright owner.

Reporting Notice

DHS and the FBI encourage recipients of this document to report information concerning suspicious or criminal activity to DHS and/or the FBI. The DHS National Operation Center (NOC) can be reached by telephone at 202-282-9685 or by email at NOC.Fusion@dhs.gov.

The FBI regional phone numbers can be found online at www.fbi.gov/contact/fo/fo.htm

For information affecting the private sector and critical infrastructure, contact the National Infrastructure Coordinating Center (NICC), a sub-element of the NOC. The NICC can be reached by telephone at 202-282-9201 or by email at NICC@dhs.gov.

When available, each report submitted should include the date, time, location, type of activity, number of people and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact.

RSS FeedWeekly INFOGRAM's are now available as an RSS Feed. More Information »