menu

Topic:

Critical Infrastructure

U.S. nuclear safety agency unveils new data, physical security controls

U.S. nuclear safety agency unveils new data, physical security controls – Homeland Security Newswire
The agency that oversees the U.S.’s nuclear weapons stockpile announced last week the rollout of new information and physical security controls aimed at balancing efficiency and safety. Officials said, though, that the implementation of cybersecurity improvements is about a year behind the progress the agency has made on physical protection.

Is the NSA's "Perfect Citizen" Really Big Brother?

OK, let me get this straight: a private sector company INVITES the National Security Agency (NSA) to place sensors on its privately owned network to help the company protect itself from unauthorized and unwanted cyber intrusions. Perfect Citizen, as it is called, is a program to detect cyber assaults on critical infrastructure, be they publically or privately held. The NSA will deploy sensors in critical infrastructure computer networks to detect a cyber attack. Some have worried that Perfect Citizen constitutes too much government monitoring in the private sector, conjuring comparisons to George Orwell’s 1984. But how in the world does Perfect Citizen constitute “Big Brother?”

The Value of Aspen

As we continue to swelter in the ongoing summer heat wave, it is easy for me to reminisce about my recent visit to Aspen, Colo. Tucked amongst the Rockies with its clean air, fervent green and majestic views, a town known primarily for its skiing with the rich and famous was home to what was, simply put, the best conference program I have ever attended. The first annual Aspen Security Forum put forward a program that I can only describe as pleasant, informational waterboarding. By the time each of the presenters and panelists were done, my hand was dead from writing so much and my head hurt from being given the firehouse treatment of a candor and content overload. Here’s a rundown of some of the sessions.

Cyber Criminals May be Talented but they are not Superhuman

It is perhaps poetic that many of the “successful” cyber criminals can be and are being hacked in the same ways they attack their legitimate targets. We tend to attribute near god-like cyber powers to these miscreants, when in reality, they write into their software the same kind of weaknesses that they are so good at exploiting. One wonders why law enforcement is not doing more “reverse hacking.” In the same way cops “sting” drug dealers, unscrupulous government officials, and other criminals, they should be attacking cyber criminals.

Unnecessary "Jurisdictional Turf Battles" Threaten to Derail WMD Bill

Earlier this week, the House Homeland Security Committee marked up the WMD Prevention and Preparedness Act of 2010 in an effort to implement recommendations from the Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism (the so-called Graham-Talent WMD Commission). Despite the clearly recognized threat of another terrorist attack on U.S. soil, congressional leadership still had not recognized that its failure to defragment congressional oversight of homeland security matters is contributing to our lack of preparedness for when this attack occurs. Shame on them if they don’t pay attention to the warnings from Representatives Bill Pascrell (D-NJ) and Peter King (R-NY) at the time of the WMD bill markup.

"Flooded with Help – But Still Flailing"

In what I can only call a solid piece of researched commentary, Dan Kaniewski of GWU’s Homeland Security Policy Institute and Jim Carafano of the Heritage Foundation have put together a great article, “Flooded with Help – But Still Flailing” on the forgotten and unlearned lessons of Hurricane Katrina and how they are impacting the on-going Gulf Oil Spill. Give it read and I guarantee you that you’ll shake your head in frustration. But it’s truth that must be faced if we are ever going to improve how we deal with disasters when international assistance is offered to us.

Cyber Crime Continues to Grow Out of Control

Cyber Crime comes in lots of flavors. It is diverse, sophisticated and expanding everyday. It includes Internet fraud, online banking fraud, a highly developed cyber underground, a growing number of targeted areas, and the “advanced persistent threat,” a term that until recently was classified. It is almost impossible to accurately determine the “cost” of cyber crime, but if we do not get hold of this threat, we are in deep trouble.

Preparing for PS-Prep – Voluntary Private Sector Preparedness Certification

By Bob Connors
The 9/11 Commission found that the Private Sector wasn’t adequately prepared to respond to or recover from a catastrophic disaster, and DHS officially launched the Private Sector Preparedness Program. There are many opinions about whether a voluntary private sector preparedness certification is necessary. The thought of business continuity/crisis management (private sector preparedness) being “regulated” through standards makes practitioners shudder, but it’s been my experience that many companies believe they have adequate preparedness programs in place, but truly aren’t ready for a significant incident (and may not even know it).

Water Systems – A Rising Rate to Lift Our Nation?

Leaders at every level of government continue to ignore the obvious, and dare I say, “inconvenient” truth about water: We need to raise rates. Either that or get used to being thirsty, stock up on Pepto-Bismol, and get ready for a mean tutorial on what Cholera feels like. U.S. water systems are the best in the world, but the fight to maintain water quality may be lost if utilities remain hamstrung by requirements to under charge for services.

An Air Cargo Screening Roundtable – Not too little, hopefully not too late

A couple weeks ago, air cargo industry representatives came together in Washington, DC, to hold an informational roundtable on the upcoming Congressional deadline mandating that 100 percent of all cargo carried on passenger aircraft be screened for explosives. Talking with the aviation security leaders who participated in the roundtable, we delivered the message that time is of the essence, and over 10,000 people logged on to view the webcast. TSA has seen applications for CCSP quadruple over the last month, and industry participation will determine the viability of the voluntary CCSP. But if industry fails or refuses to participate, it can expect a boot on its throat in the not too distant future.