(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

Key Resource Protection Coordination and Collaboration Support for US Farmers

PURPOSE:
China is at war against our U.S. farmers, they have sabotaged them for decades, they have found puppets among us to e.g. steal their equipment, steal their bee hives, launder their fake honey (mixed with corn syrup) via transnational shipping tactics to our country, product dump garlic peeled by prisoners, and otherwise rig the system against them. Now (recently) China has placed tariffs as high as 40 percent... more »

Voting

2 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

GOOGLE FACIAL RECOGNITION ENHANCEMENT OF PUBLIC SAFETY AND IMPLICATIONS

PURPOSE:
Briefly discuss the new Google Facial Recognition capability in the context of enhancing public safety, and associated implications.
NOTE: ALSO SEE PRIORITY ELECTION SECURITY ENHANCEMENT BELOW (under capability augmentation).
-
BACKGROUND:
As some of you are aware, Google has databases filled with pictures of people from around the world that have been additionally scanned with their Facial Recognition software... more »

Voting

2 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

VOTER VALIDATION FINGERPRINT READER, IRIS SCAN, OR TAKE A PICTURE

PURPOSE: Consider biometric scanners in voting centers.
-
CAPABILITY:
DHS has an Office of Biometric Identity Management (since 2013) that could (potentially) be used for the purpose of validating voting.
-
PUBLIC WILLINGNESS:
I would be perfectly willing to have my fingerprint read prior to voting (or iris scanned or picture taken in the alternative). I cannot think of any reason to be adverse to this, unless you... more »

Voting

2 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

Computer CPU Vulnerabilities to Meltdown and Spectre Side-Channel Attacks

Last Update: 01-03-2018

THE FOLLOWING CPU'S MAY CONTAIN VULNERABILITIES KNOWN AS "MELTDOWN" AND "SPECTRE":
AMD Affected - 03 Jan 2018
Apple Affected - 03 Jan 2018
Arm Affected - 03 Jan 2018
Google Affected - 03 Jan 2018
Intel Affected - 03 Jan 2018
Linux Kernel Affected - 03 Jan 2018
Microsoft Affected - 03 Jan 2018
-
This DHS US-CERT vulnerability Alert posted today describes the condition in detail:
https://www.kb.cert.org/vuls/id/584653... more »

Voting

2 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

ALERT WPA2 WiFi Protocol is Compromised

WPA2 WIFI PROBLEM:
On October 16, 2017 (today) CERT Coordination Center (CERT/CC) has released information on Wi-Fi Protected Access II (WPA2) protocol vulnerabilities, and much of the content below is mirrored from their website. Exploitation of these vulnerabilities could allow an attacker to take control of an affected system. The vulnerabilities are in the WPA2 protocol, not within individual WPA2 implementations,... more »

Voting

2 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

Use SAFECOM Lessons Learned to enhance Emergency COMs-Response

IDEA:
Given the current demands for technological innovation, interoperability, and communications capacity building, DHS-OEC needs to develop a specific lessons learned database for SAFECOM.
-
PURPOSE:
Once SAFECOM lessons learned are consolidated and accessible, we need to then leverage lessons learned from SAFECOM, National Council of Statewide Interoperability Coordinators (NCSWIC), PSAC, NPSTC, and elsewhere to... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

AIRPORT FOREIGNER CELL PHONE TRACKING CAPABILITY

PURPOSE: DISCUSS A METHOD FOR TRACKING FOREIGN VISITORS USING THEIR CELL PHONES, AND INFORM U.S. SECURITY PERSONNEL OF WHO ELSE IS DOING IT, SO THAT THEY MIGHT MITIGATE THESE FORMS OF TRACKING.
-
CHINA EXAMPLE TECHNOLOGY OF INTEREST:
When any foreigner arrives in a Chinese Airport, China uses technologies to collect the foreigners cell phone number (AND MATCH THE FOREIGNERS NAME WITH THE PHONE NUMBER), then track the... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

CYBER CRIME VICTIMS SHOULD REPORT COMPLAINTS TO IC3

PURPOSE:
U.S. citizens who are the victims of cyber-crime and cyber-scams should file a complaint with the Internet Crime Complaint Center (IC3), they are creating and enhancing new ways to manage these types of fraud and crimes. They may be able to catch the criminal, and/or help you and others like yourself through the incident, and/or prevent future incidents using the information you provide. The following information... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

CYBER INCIDENT REPORTING TO THE FEDERAL GOVERNMENT

PURPOSE: This webpage reflects recent statements made by the National Protection and Programs Directorate (NPPD), whereby they are encouraging stakeholders to learn more about “Cyber Incident Reporting” to the Federal Government, and stressing the importance of participating in this National Security mechanism as soon as possible post-incident.
-
CYBER INCIDENT REPORTING (official statements)
A Unified Message for... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

ANALYTICS COLLECTION AND DATA SCIENCE USES IN RISK ASSESSMENTS

Experimental Draft: Version 0.9E
Origination: 06-28-2016 UTC 19:00
Last Updated: 06-28-2016 UTC 21:00
-
PURPOSE:
This topic was inspired by user MJC, whereby, he pointed out that we need as many tools and data as possible to achieve the most functional, comprehensive, and optimized THIRA possible (and associated EOP). But also, we in many cases may need training on how to optimize the use of tools and data. Of course,... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

129 STATUTE 470 - PUBLIC LAW 114–43 AUG 6 2015

(Overt impacts of a new law on DHS Information Technology)
-
ABOUT THIS LAW: (H.R. 1626) "An Act To reduce duplication of information technology at the Department of Homeland Security, and for other purposes."
-
DISCUSSION PURPOSE: I've posted this topic in a short/brief form to open a dialogue, and stimulate discussion about how this law may/could impact DHS (e.g. transitioning technologies, reserved capacity, and... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

THOUGHTS ON THE INFORMATION SHARING ENVIRONMENT

PURPOSE: I will share some select Open Source concepts that I perceive as relevant to advancement of the Information Sharing Environment below.
NOTE: Large pieces of the Information Sharing equation cannot be evaluated in an open forum (and I simply do not have specific data about the vast majority of risks involved in sharing certain types of information nor as relates to confidential/controlled information).
-
BASELINE:... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

INFRASTRUCTURE-ICS-BlackEnergyMalware infected MSWord Attachment

TRENDING INFRASTRUCTURE CYBERATTACK VECTOR: BLACKENERGY MALWARE
LAST UPDATE: 02-03-2016
-
PLEASE BE ADVISED, email containing an infection vector as spear phishing via a malicious Microsoft Office (MS Word) attachment, which installs the BlackEnergy malware into Industrial Control Systems has been identified. There has also been identified mechanisms whereby systems attached to public networks are becoming infected as... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

C3 AND SELF-HEALING SMART GRID TECHNOLOGY PPP MUTUAL INVESTMENTS

BACKGROUND: DHS NATIONAL PROTECTION AND PROGRAMS DIRECTORATE (CYBER), C3 program created in 2014 and associated NETGuard program should consider the newly evolving SELF-HEALING SMART GRID TECHNOLOGIES coming to market, and forge mutual investment paths as PPP agreements such that Private-sector companies can afford to upgrade to SELF-HEALING SMART GRID TECHNOLOGIES. The agreement must state that the Private-sector business... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

Immigration - Tag and Track Passports of Tourists

(IF) we desire to address the fraction of the immigration condition, whereby, tourists come to the U.S. and never leave, then why don't we just Tag and track the Passports of Tourists. A single page in the passport could be hole-punched, and a USPS mini package tracking device could be hooked through the hole.
-
We create the policy that they must keep the Passport on them at all times. We will then know where tourists... more »

Voting

3 votes
Active