Wednesday, September 2, 2009

The U.S. Cyber Challenge aims to identify 10,000 patriotic geeks and make them experts

By Joshua Kucera

The potential threats against the United States from malicious foreign hackers are as poorly understood as they are scary. China's military has trained more than 60,000 "information troops," and its official doctrine calls for pre-emptive strikes on networks of nations it sees as a threat.

Russian hackers -- probably with Kremlin support -- have attacked Internet sites in pro-Western Estonia and Georgia. And a mysterious "worm," Conficker, infects an estimated 5 million computers around the world. Authorities don't know who controls it; cyberintelligence expert Jeffrey Carr calls it "the equivalent of a nuclear bomb" that could shut down the entire Internet.

It's the kind of shadowy, nonstate threat that the U.S. defense and intelligence bureaucracies are traditionally ill equipped to fight, but a new initiative announced last week aims to try.

A consortium of government agencies and private organizations has set up a series of competitions, called the U.S. Cyber Challenge, to identify up to 10,000 patriotic geeks and then nurture them to become "top guns," as the Cyber Challenge organizers call them, at the Pentagon, the National Security Agency, and elsewhere. ....

EMPRIMUS WARNS OF INTENTIONAL ELECTROMAGNETIC ATTACKS

Emprimus, Minneapolis, Minn., the nation's leader in evaluating, testing and remediating against intentional electromagnetic attacks, has announced that it was asked to provide testimony before the Congressional Subcommittee on Emerging Threats, Cybersecurity, Science and Technology on Tuesday, July 21, about the present vulnerability of the U.S. electric grid and other critical civilian infrastructure Civilian infrastructure refers to hospitals, schools, places of worship, housings, utility facilities, or the like. It is a war crime to attack civilian infrastructure. to growing intentional electromagnetic threats, and its recommendations for steps toward remediation of these threats.

Every year, the modern infrastructure of the U.S. becomes increasingly dependent on integrated circuit-based electronic control systems, computers, and burgeoning masses of electronically-stored data. All are at risk from this emerging threat. Growing use of non-nuclear Electromagnetic Pulse/Intentional Electromagnetic Interference See EMI. (EMP/IEMI), including Radio Frequency (RF) weapons, poses grave dangers to all of our civilian infrastructure including our national electric grid, manufacturing control and distribution systems, corporate data and data assets, and emergency response operations. IEMI can damage electronic equipment and the associated data; rendering systems useless and potentially unrecoverable. In addition to these primary assets, vulnerable support systems at risk range from security systems and communication links to fire protection and HVAC (Heating Ventilation Air Conditioning) In the home or small office with a handful of computers, HVAC is more for human comfort than the machines. In large datacenters, a humidity-free room with a steady, cool temperature is essential for the trouble-free systems.


The U.S. Navy has tested and demonstrated the vulnerability of computer and SCADA (Supervisory Control And Data Acquisition) A process control application that collects data from sensors and machines on the shop floor or in remote locations and sends them to a central computer for management and control. systems and has demonstrated the fabrication fabrication (fab´rikā´shn),
n the construction or making of a restoration.
and use of a non-nuclear EMP EMP
abbr.
electromagnetic pulse
device. These person-portable or vehicle-borne weapons are becoming a modern tool of those wishing to conduct highly asymmetrical warfare, including disgruntled dis·grun·tle
tr.v. dis·grun·tled, dis·grun·tling, dis·grun·tles
To make discontented.



[dis- + gruntle, to grumble (from Middle English gruntelen; see
employees, criminals, extremists, and terrorists. The technology to create RF weapons is becoming widely available through courses at major universities and public conferences. Additionally, full devices, including parts and construction plans, are available on the Internet.

"An intentional or unintentional EMP attack on U.S. data centers, the electric grid or critical control systems and sensors, such as those found in water treatment facilities or the Alaskan oil pipeline could have catastrophic consequences for the U.S. and world economy," said Gale Nordling, president of Emprimus. Yvette Clarke, Subcommittee Chair, added, "For example, if the electric grid was attacked and a large sector of the country was affected, medicines and food would go bad, phone and radio communication would be non-existent, water treatment facilities would go down and critical data and infrastructure could be lost forever."

Members of the Congressional Subcommittee were both shocked and enraged en·rage
tr.v. en·raged, en·rag·ing, en·rag·es
To put into a rage; infuriate.



[Middle English *enragen, from Old French enrager : en-, causative pref.
upon learning that the major U.S. energy providers (as well as data centers, communication providers and hospitals) have known about this threat for more than 10 years, yet have taken no steps to protect critical infrastructure from EMP attacks. As a result of the committee's findings, Congress is contemplating broadening planned legislation to amend the Federal Power Act to include electromagnetic attacks and other cyber threats. This legislation will provide additional authority to adequately protect the critical electric infrastructure against IEMI attacks and other cyber attacks, as well as hardening the electric grid against high altitude Conventionally, an altitude above 10,000 meters (33,000 feet). See also altitude. EMP and severe geomagnetic storms.

More than 300 European data centers are protected and many national governments have protected portions of their critical infrastructures against these electromagnetic threats. The U.S. military and some critical government assets are protected as well. Emprimus was formed to protect U.S. civilian business along with state and local government operations This article aims to describe the financial expenditure associated with the operations and processes of world governments of all levels. Size of economic footprint

Main articles: Government ownership and Government spending
.

"Unlike traditional cyber threats to data security, IEMI is extremely covert and difficult to detect and trace, with no footprints readily amenable to forensics See computer forensics. , and with the ability to impede digital forensics See computer forensics. by corrupting the data," said Nordling. "Fortunately, there are remediation approaches to help diminish this threat class if appropriate steps are taken."

About Emprimus

Emprimus is a national leader providing protection services and products to mitigate intentional electromagnetic interference threats against civilian and non-military government facilities and data assets. With multi-disciplined expertise and threat testing programs, the company follows its moral and patriotic responsibility to protect our families and country against these threats.

For more information, visit http://www.emprimus.com or call 312/780-7223.

Obama hosts Ramadan dinner at White House

(Washington Times) Showcasing the contributions of American Muslims he said represent "extraordinary dynamism and diversity," President Obama hosted a White House dinner ...

Ahmadinejad's imam: Islam rewards raping prisoners



(IsraelNN.com) "If the judgment for the [female] prisoner is execution, then rape before execution brings the interrogator a spiritual reward equivalent to making the mandated Haj pilgrimage" to Mecca ...

.

Rangel: Punish tax slip-ups

(New York Post) Even as he fends off accusations about his own failure to pay taxes, Rangel had quietly slipped into the health-care bill broad new provisions cracking down on taxpayers ...

State preps to relocate quarantined H1N1 victims 'Your home and other less restrictive alternatives are not acceptable'

By Drew Zahn


Iowa's Facility Quarantine Order

DES MOINES, Iowa – A blank document from the Iowa Department of Public Health has been discovered online, designed to be filled in with the name of an H1N1 virus victim who is required to relocate from his or her home to a quarantine facility.

The form, which began appearing today in e-mails and on the Internet

, has concerned a confused public already swimming in conflicting reports about the severity of the swine flu and intrusive government measures that many fear may be taken if the disease becomes a pandemic.

The Iowa document, which WND confirmed with state officials is authentic, has done little to calm the public's fears.

"The Iowa Department of Public Health has determined that you have had contact with a person with Novel Influenza A H1N1," the form reads. "The Department has determined that it is necessary to quarantine your movement to a specific facility to prevent further spread of this disease.

"The Department has determined that quarantine in your home and other less restrictive alternatives are not acceptable," the document continues, before listing mandatory provisions of compliance with relocation to a quarantine facility.

The blank-form document, which has no name or case number listed, is titled a "Facility Quarantine Order," and though Iowa Department of Public Health Medical Director Patricia Quinlisk confirmed the state has the form, she told WND it's highly unlikely it will ever be used.

"We've had these kinds of template orders for years, but we hardly ever use them," Quinslick said. "I can count on two hands the number of times – in 20 years – that we've had to relocate a person because of quarantine."

Quinslick wasn't certain who released the blank document, or who signed her name to the bottom of some versions circulating on the Internet, but she wasn't concerned that it's been made public.

"We're not trying to hide anything," she said. "This is the kind of form we use." ....

.... Quinslick told WND it was doubly unlikely the state would use the form, since the swine flu has proven less dangerous than earlier estimates.

"I don't anticipate using [the form] for H1N1, since it's been shown to be a very mild disease," Quinslick said. "We found this spring it's not as serious as feared."

As for fears that Iowa is preparing detention centers for rounding up the people who refuse swine flu shots, Quinslick was quick to dismiss the idea.

"Iowa has no relocation facility currently," she said. "If we can't quarantine a person in their home, we usually use a hotel room. There's not a facility, no gymnasium or anything like that set up.

"And I've never been in on any discussion of forcing people to be vaccinated," she added. "If there's a highly contagious outbreak and a person refuses vaccination, that's fine, they don't need to be vaccinated, but they may need to stay home until we're certain the danger has passed."

Parents rebel against Obama TV speech to schools 'President doesn't get to speak to my children unchallenged'

By Bob Unruh

Parents across the country are rebelling against plans by President Barack Obama to speak directly to their children through the classrooms of the nation's public schools without their presence, participation and approval.

The plans announced by Obama also have been cited as raising the specter of the Civilian National Security Force, to which he's referred several times since his election campaign began, but never fully explained.

"He's recruiting his civilian army. His 'Hitler' youth brigade," wrote one participant in a forum at Free Republic.

"I am not going to compare President Obama to Hitler. We'll leave that to others and you can form your own opinions about them and their analogies. … However, we can learn a lot from the spread of propaganda in Europe that led to Hitler's power. A key ingredient in that spread of propaganda was through the youth," wrote a blogger at the AmericanElephant.com blog, where the subject of the day was a national "Keep-Your-Child-at-Home-Day."

"Totalitarian regimes around the world have sought to spread their propaganda and entrench their power by brainwashing the children. I guess it's easier to indoctrinate a six-year-old instead of fighting a 26-year-old or being challenged by a 46-year-old in the voting booth," the blogger wrote. ....