(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

US-CERT ALERT HEARTBLEED BUG: YOUR FAVORITE WEBSITES ARE SAFE

(HEARTBLEED BUG OPERATING SYSTEM, WEBSITE, AND SERVER VULNERABILITY)
PURPOSE:
This is a brief summary of results for a security check I conducted for the presents of the Heartbleed Bug vulnerability (the most popular websites were checked for the Heartbleed Bug ESPECIALLY FEMA=> and the websites important to this community).
-
SCAN RESULTS SUMMARY:
The websites listed below are safe!
-
WHAT WAS DONE:
I independently... more »

Voting

4 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

A New Approach to Emergency Operations Plan Partnerships

Produced By: ATL PREVENTION RESEARCH L.L.C.
Experimental Draft: Version1.1E
Origination: 07-12-2014 UTC 08:00
Last Updated: 07-20-2018 UTC 17:00
-
(POST 4 OF 5)
-
A New Approach to Emergency Operations Plan Partnerships: The Creation of National (Cloud-Based) Emergency Operations Plan (EOP) Repositories & Databases to Enhance Collaboration Opportunities, and More…
-
SUBJECT:
This thread briefly depicts the methods... more »

Voting

4 votes
Active
(@mjcyranwd6alm) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

Virtual Coordination in Supporting & Managing Incidents

Virtual coordination into incident support, coordination, and management in support of incident operations will tend to be unreliable during floods, earthquakes, and cyber-attacks. This appears to be a very risky approach during TYPE-1, 2, and TYPE-3 incidents especially where a local operating telephone company central office becomes damaged or destroyed during the incident. This was evidenced during 9-11 and KATRINA-2005.... more »

Voting

4 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

ISO9001 2015 NEW QMS Framework, Requirements, and Implications

(Please consider the following information carefully, as the new ISO9001:2015 Standard with the new Annex SL Framework implementation could easily take our Nation to a whole new and improved standard of Resilience).
-
Produced By: ATL PREVENTION RESEARCH L.L.C.
Experimental Draft: Version1.4E
Origination: 2015-01-05T06:00 UTC
Last Updated: 2015-10-10T17:00 UTC
-
SPONSOR: This document is a FREE product of ATL Prevention... more »

Voting

4 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

Immigration - Tag and Track Passports of Tourists

(IF) we desire to address the fraction of the immigration condition, whereby, tourists come to the U.S. and never leave, then why don't we just Tag and track the Passports of Tourists. A single page in the passport could be hole-punched, and a USPS mini package tracking device could be hooked through the hole.
-
We create the policy that they must keep the Passport on them at all times. We will then know where tourists... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

C3 AND SELF-HEALING SMART GRID TECHNOLOGY PPP MUTUAL INVESTMENTS

BACKGROUND: DHS NATIONAL PROTECTION AND PROGRAMS DIRECTORATE (CYBER), C3 program created in 2014 and associated NETGuard program should consider the newly evolving SELF-HEALING SMART GRID TECHNOLOGIES coming to market, and forge mutual investment paths as PPP agreements such that Private-sector companies can afford to upgrade to SELF-HEALING SMART GRID TECHNOLOGIES. The agreement must state that the Private-sector business... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

INFRASTRUCTURE-ICS-BlackEnergyMalware infected MSWord Attachment

TRENDING INFRASTRUCTURE CYBERATTACK VECTOR: BLACKENERGY MALWARE
LAST UPDATE: 02-03-2016
-
PLEASE BE ADVISED, email containing an infection vector as spear phishing via a malicious Microsoft Office (MS Word) attachment, which installs the BlackEnergy malware into Industrial Control Systems has been identified. There has also been identified mechanisms whereby systems attached to public networks are becoming infected as... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

THOUGHTS ON THE INFORMATION SHARING ENVIRONMENT

PURPOSE: I will share some select Open Source concepts that I perceive as relevant to advancement of the Information Sharing Environment below.
NOTE: Large pieces of the Information Sharing equation cannot be evaluated in an open forum (and I simply do not have specific data about the vast majority of risks involved in sharing certain types of information nor as relates to confidential/controlled information).
-
BASELINE:... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

129 STATUTE 470 - PUBLIC LAW 114–43 AUG 6 2015

(Overt impacts of a new law on DHS Information Technology)
-
ABOUT THIS LAW: (H.R. 1626) "An Act To reduce duplication of information technology at the Department of Homeland Security, and for other purposes."
-
DISCUSSION PURPOSE: I've posted this topic in a short/brief form to open a dialogue, and stimulate discussion about how this law may/could impact DHS (e.g. transitioning technologies, reserved capacity, and... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

ANALYTICS COLLECTION AND DATA SCIENCE USES IN RISK ASSESSMENTS

Experimental Draft: Version 0.9E
Origination: 06-28-2016 UTC 19:00
Last Updated: 06-28-2016 UTC 21:00
-
PURPOSE:
This topic was inspired by user MJC, whereby, he pointed out that we need as many tools and data as possible to achieve the most functional, comprehensive, and optimized THIRA possible (and associated EOP). But also, we in many cases may need training on how to optimize the use of tools and data. Of course,... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

CYBER INCIDENT REPORTING TO THE FEDERAL GOVERNMENT

PURPOSE: This webpage reflects recent statements made by the National Protection and Programs Directorate (NPPD), whereby they are encouraging stakeholders to learn more about “Cyber Incident Reporting” to the Federal Government, and stressing the importance of participating in this National Security mechanism as soon as possible post-incident.
-
CYBER INCIDENT REPORTING (official statements)
A Unified Message for... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

CYBER CRIME VICTIMS SHOULD REPORT COMPLAINTS TO IC3

PURPOSE:
U.S. citizens who are the victims of cyber-crime and cyber-scams should file a complaint with the Internet Crime Complaint Center (IC3), they are creating and enhancing new ways to manage these types of fraud and crimes. They may be able to catch the criminal, and/or help you and others like yourself through the incident, and/or prevent future incidents using the information you provide. The following information... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

AIRPORT FOREIGNER CELL PHONE TRACKING CAPABILITY

PURPOSE: DISCUSS A METHOD FOR TRACKING FOREIGN VISITORS USING THEIR CELL PHONES, AND INFORM U.S. SECURITY PERSONNEL OF WHO ELSE IS DOING IT, SO THAT THEY MIGHT MITIGATE THESE FORMS OF TRACKING.
-
CHINA EXAMPLE TECHNOLOGY OF INTEREST:
When any foreigner arrives in a Chinese Airport, China uses technologies to collect the foreigners cell phone number (AND MATCH THE FOREIGNERS NAME WITH THE PHONE NUMBER), then track the... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

Use SAFECOM Lessons Learned to enhance Emergency COMs-Response

IDEA:
Given the current demands for technological innovation, interoperability, and communications capacity building, DHS-OEC needs to develop a specific lessons learned database for SAFECOM.
-
PURPOSE:
Once SAFECOM lessons learned are consolidated and accessible, we need to then leverage lessons learned from SAFECOM, National Council of Statewide Interoperability Coordinators (NCSWIC), PSAC, NPSTC, and elsewhere to... more »

Voting

3 votes
Active
(@aaronlittlefield) kudos icon +

CAMPAIGN-5: Ideas to improve Cyberspace, Infrastructure, and the Grid

ALERT WPA2 WiFi Protocol is Compromised

WPA2 WIFI PROBLEM:
On October 16, 2017 (today) CERT Coordination Center (CERT/CC) has released information on Wi-Fi Protected Access II (WPA2) protocol vulnerabilities, and much of the content below is mirrored from their website. Exploitation of these vulnerabilities could allow an attacker to take control of an affected system. The vulnerabilities are in the WPA2 protocol, not within individual WPA2 implementations,... more »

Voting

2 votes
Active