Saturday, May 30

LANGEVIN, ET AL.: Public-private collaboration

The Washington Times

Tuesday, May 26, 2009
James R. Langevin, Mark Gerencser and Charles G. Boyd

COMMENTARY:

Attacks against U.S. computer networks - most of them privately owned - are increasing in number and severity. Let's hope the new administration moves decisively to foster collaboration between the public and private sector so America can become cyberresilient.

The reasons for doing so are manifest. In 2007 alone (the last year for which records are fully tabulated), the Department of Homeland Security tracked more than 37,000 cyber-attacks - a more than 800 percent increase over 2005. The Defense Department's computers are probed hundreds of thousands of times every day, and in 2007, hackers believed to be backed by the Chinese military took down the unclassified e-mail system in the Office of the Secretary of Defense for more than a week.

Meanwhile, U.S. companies lost more than $1 trillion worth of intellectual property last year because of cyber-intrusions. The energy sector is particularly vulnerable, with global utility operations hit by an estimated 1,000 hackers annually. A major cyber-attack could result in weeks-long power outages or cause even more damage to the national economy - a prospect we can hardly afford.

In December, a cyber-attack simulation conducted by the nonpartisan Business Executives for National Security, headquartered in the District, highlighted America's vulnerability and the need for a comprehensive, national approach to cybersecurity. Over two days, more than 230 senior leaders from industry, government, Congress, academia and the military tried to respond to a simulated cyber-attack that decimated telecommunications in the Eastern United States and damaged financial institutions and other targets.

At nearly every turn, the participants encountered difficulty restoring normal operations. Their failure to plan for the attack - and the difficulty they experienced communicating with one another when the simulated attack was under way - prolonged recovery time to the point of major system failures.

The simulation revealed that while parts of the federal government and some private companies are doing a lot to strengthen their own cyberdefenses, the United States is only addressing pieces - and not the whole - of cybersecurity. This approach will fail because cybersecurity is, like a chain, only as strong as its weakest link.

Focusing cybersecurity efforts solely on one's own organization robs attention from the bigger picture. Whether they realize it or not, companies, government agencies and other organizations are part of an interconnected system that cannot absorb a major attack. Narrow-point solutions such as firewalls, anti-virus software and intrusion-detection technology help, but they don't suffice.

True protection requires cyberresilience. That can be achieved only through collective action and cooperation on a scale rarely witnessed before: a national effort involving business, government and society - similar to the way "Y2" - the apprehension about what would occur with the advent of the year 2000 - was approached, but designed for the long haul and not just one event.

No single organization has the capacity to build this resilience. We need to work as a large and inclusive community across government, industry and nonprofit organizations - a megacommunity of sorts.

Melissa Hathaway, recently named by President Obama to review the nation's cybersecurity policies, was chosen in part for her ability to foster collaboration within government to deal with cyberthreats. We hope her report urges collaboration beyond government - involving business and society as a whole - so America can become cyberresilient.

Resilience is different from risk avoidance (working to ensure nothing happens) or even risk management (choosing what to protect and what not to protect). Resilience assumes bad things will happen and requires advance planning and preparation. "We will need to end a culture where we ignore problems until they become full-blown crises," Mr. Obama said recently when discussing the economy. This is also true of cybersecurity.

A lot is at risk: financial systems, power grids, air traffic control and more. A major cyber-attack will happen, and it will affect more than we think. The question is: Will we be ready - and resilient?

Rep. James R. Langevin, Rhode Island Democrat, is co-chairman of the Center for Strategic and International Studies (CSIS) Commission on Cybersecurity for the 44th Presidency. Mark Gerencser is a senior vice president at Booz Allen Hamilton. Charles G. Boyd is president and chief executive officer of Business Executives for National Security.

Tuesday, May 26

FBI Explains Its CAIR Cut Off

Bureau says CAIR is not "an appropriate liaison partner"



The Council on American-Islamic Relations (CAIR) is not "an appropriate liaison partner" for the FBI because of evidence linking the organization and its founders to Hamas, an FBI assistant director said in a letter to a U.S. Senator. "In light of that evidence, the FBI suspended all formal contacts between CAIR and the FBI," Richard C. Powers, an assistant director in the FBI's office of Congressional Affairs, wrote in a letter to Sen. Jon Kyl (R-AZ). Today, the FBI is unsure whether the relationship between CAIR and Hamas ever was severed, Powers wrote. In February, Kyl was joined by fellow senators Charles Schumer (D-NY) and Tom Coburn (R-OK) in writing FBI Director Robert Mueller to praise the FBI's policy toward CAIR. IPT News, May 7, 2009
http://www.investigativeproject.org/1029/fbi-explains-its-cair-cut-off

Call the Terrorists What They Are

The foiled plot to bomb New York synagogues, disclosed today, highlights the absurdity, and danger, of Obama's avoiding the term "Islamic radicals."

There are several lessons that the U.S. government and public should learn from the foiled plot by four radical Muslims, disclosed today, to bomb synagogues in New York and shoot down a military plane using a Stinger missile.

For President Obama, the "enemy" can no longer be limited to just al Qaeda, as he has insisted in pre- and post- campaign interviews. When asked who the enemy is, he reflexively says "al Qaeda." He has categorically refused to use the term "radical Islam" or "Islamic extremism." But that is exactly what we are facing?and have been facing for the past three decades.
http://www.thedailybeast.com/blogs-and-stories/2009-05-21/call-the-terrorists-what-they-are/full/

Monday, May 25

Fox News covers the Explosion on 3rd & 92nd at 3:30am NYC


NEW YORK - Windows were shattered at a Starbucks on Manhattan's Upper East Side early Monday morning.

Police Commissioner Ray Kelly says an explosive-like device, possibly containing fireworks, went off outside the store at 3:30 a.m.

There are no injuries. Kelly says there are no witnesses to the blast.

The NYPD bomb squad is on the scene at 1642 Third Avenue at 92nd Street.

Speaking at the scene of the explosion Monday morning, Kelly told reporters there was no call to police before the explosion. Seven calls to 911 came in immediately following the explosion.

There is a history of low-order explosions outside Starbucks stores across the country, said Kelly.

The city has experienced other early morning explosions in recent years. Small explosions occurred at the British and Mexican consulates and at a military recruiting station in Times Square.

Police Commissioner Kelly says the only similarity between Monday morning's explosion and other small blasts in New York City is the time. All have occurred between 3:30 a.m. and 4:30 a.m.

Police investigators say no one was inside the shop at the time of the explosion. There is no damage inside the store.

The explosion left a gaping hole in the bench.

An apartment building above Starbucks was evacuated. Seven people were forced from their homes and returned hours later.

No one was injured in the blast.

Several lanes of Third Avenue near 92nd Street are closed due to a massive police investigation. Expect bus diversions in the area of the explosion. The M 98, M 101, M 102 and M 103 bues are re-reouted.

PartnerForSecurity