Saturday, February 23, 2013

Is your alumni on the list. Stats on Colleges & Universities with Homeland Security and Emergency Management Programs.


v     Hi Ed Statistical Update for February 2013:


·        Emergency Management Higher Education Programs – 265
o       67 - Certificate, Diploma, Focus-Area, Minor in EM Collegiate Programs
o       50 - Schools Offer Associate Degree Programs
o       51 - Schools Offer Bachelor Degree Programs
o       88 - Schools with Master-Level/Concentrations/Tracks/Specializations/Emphasis
 Areas/Degrees
o       9 - Schools Offer Doctoral-Level Programs
·        132 - U.S. Homeland Security/Defense and Terrorism Hi Ed Programs 
·        16 - U.S. International Disaster Relief/Humanitarian Assistance Programs 
·        31 - Public Health, Medical and Related Program 
·        29 - Listing of Related Programs

FEMA Student and Career Opportunities


Students: Review information regarding the new Pathways Program Internships, Recent Graduates and Presidential Management Fellows on OPM.gov at the following link: http://www.opm.gov/hiringreform/pathways/.

Call for Nominations. White House Champions of Change


U.S. Department of Homeland Security
                     Federal Emergency Management Agency

FEMA ANNOUNCES HURRICANE SANDY WHITE HOUSE CHAMPIONS OF CHANGE CALL FOR NOMINATIONS
WASHINGTON—Today the Federal Emergency Management Agency (FEMA), in partnership with the White House Office of Public Engagement, announced that the nomination period for the Hurricane Sandy White House Champions of Change is now open.

On April 24, 2013, the White House will host a Champions of Change event to recognize outstanding leaders and hidden heroes that contributed to the ongoing response and recovery of Hurricane Sandy.  The innovative, collaborative, and solutions-based work of local heroes has significantly contributed to response and recovery efforts.  FEMA is accepting nominations of individuals, community leaders, neighborhood groups, small businesses, and members of academia that implemented creative solutions to problems facing disaster survivors. Nominations will be accepted until Wednesday, March 6, 2013.

“While Superstorm Sandy devastated many communities along its path, it also brought out the best in us, as neighbors helped neighbors to survive and recover,” said FEMA Administrator Craig Fugate. “As we continue to rebuild after this storm, help us recognize Champions of Change who went above and beyond to help others.”

The White House’s Champions of Change is an initiative of the Obama Administration to honor ordinary Americans using innovative, creative solutions to address challenges in their community. The Champions of Change program highlights the stories and examples of citizens across the country who are “Winning the Future” with projects and initiatives that move their communities forward.  Each week, the White House Office of Public Engagement hosts an event to honor those who are working to empower and inspire other members of their communities.  Agency representatives and White House Policy Offices participate in the events, and host discussions on amplifying best practices learned in each area. 

Additional information on the Champions of Change program can be found at www.whitehouse.gov/champions. To submit a nomination, visit http://www.fema.gov/library/viewRecord.do?id=6995, download the nomination form and e-mail it to: FEMA-Sandy-Champions@fema.dhs.gov. Nominations will be accepted through March 6, 2013. 


An Afternoon with the NCR's Protective Security Advisors & Fusion Center representatives - 03/14/2013 from 1:00p - 3:00p



InfraGard National Capital Region monthly meeting - An Afternoon with the NCR's Protective Security Advisors & Fusion Center representatives - 03/14/2013 from 1:00p - 3:00p

InfraGard - National Capital Region Members Alliance

Thursday, March 14, 2013 from 1:00 PM to 3:00 PM (EDT)

Washington, DC



Who:  InfraGard Members and Guests (this meeting is open to the public)
What:  Updates from the NCR's Protective Security Advisors and DC's Fusion Center
When:  Thurs., 03/14/13 from 1:00p - 3:00p
Where:  Metropolitan Washington Council of Governments, 777 North Capitol Street, NE, Suite 300, Washington, DC 20002.  (Directions can be found here: 

http://www.mwcog.org/contact/directions/default.asp)

Why:  As the center of our military and government, the National Capital Region faces unique challenges in protecting its critical infrastructure.  Come hear the NCR's Protective Security Advisors (PSA) from DHS speak about the Office of Infrastructure Protection and their roles as PSAs, specifically within the NCR.  Additionally, we will hear from the Washington, DC fusion center - the Washington Regional Threat and Analysis Center (WRTAC) - as they discuss their mission and functions within the NCR.

How:  Register at http://incrma031413.eventbrite.com.  There is a $10 fee to attend. Coffee will be provided.  **While there are no refunds, we welcome substitutions if the original registrant is unable to attend.**

**Please note there are new security procedures now in place at the MWCOG building.  When you arrive, you will go to a self-service security wall terminal in the lobby where you will be asked to scan your driver's license or other form of identification.  The terminal will print out a one day pass enabling you to pass the security officers and go to the elevator and to the 3rd floor.  If you park in the garage, you will need to get off the elevator at the lobby level and get your pass.  Building security officers in the lobby will verify your pass and assist if you have any questions.**

Agenda:
1:00 - 1:15  Welcome and Introductions
1:15 - 2:00  DHS Office of Infrastructure Protection overview and Protective Security Advisor program
2:00 - 2:30  Washington Regional Threat Assessment Center (WRTAC) Updates (DC's Fusion Center)
2:30 - 2:50  Q & A
2:50 - 3:00  Wrap-up & Adjournment
Our speakers for this program are:

WRTAC Representative (bio forthcoming)

NCR Protective Security Advisors

Kelly Wilson and Matthew Wombacher currently serve as the Protective Security Advisors (PSA) for the National Capital Region Region within DHS's Office of Infrastructure Protection. They support homeland security efforts, serving in an advising and reach-back capacity for State and District Homeland Security Advisors. They contribute to the development of the national risk picture by assisting with the identification, assessment, monitoring, and minimizing of risk to critical assets at the local level. As a PSA, Ms. Wilson and Mr. Wombacher facilitate, coordinate, and perform vulnerability assessments for local critical infrastructures and assets, and act as physical and technical security advisor to Federal, State, and local law enforcement agencies.

Ms. Wilson (additional bio forthcoming)

Mr. Wombacher served in the United States Secret Service for nine years prior to becoming a PSA. He served in the Technical Security Division, the component of the Office of Protective Research within the Secret Service which operates as the focal point regarding countermeasures for all environmental threats to Secret Service protected persons and facilities. Disciplines included in this field are counter-explosives and counter-IED measures, CBRN incident prevention and mitigation, Fire/Life/Safety and physical security planning, and continuity of operations planning among other countermeasures programs. This routinely involved domestic and worldwide travel as a member of Presidential Advance teams.

Mr. Wombacher brings extensive experience, comprehensive knowledge, in-depth training, and instructional aptitude with regard to the areas of security operations and planning. While assigned to the US Secret Service, Mr. Wombacher coordinated several key training programs for the Technical Security Division.
Prior to employment in the US Secret Service, Mr. Wombacher served eight years in the US Coast Guard performing a variety of assignments. Highlights include selection for duty assignment to the Presidential Honor Guard, and serving as Air Navigator onboard the HC-130H long range aircraft. Mr. Wombacher holds additional professional certification from the ASIS International organization as a Certified Protection Professional.

Newsletter: Multi-State Info Sharing & Analysis Center

MSISAC
Monthly Security Tips
NEWSLETTER

February 2013


Volume 8, Issue 2
How Do I Protect the Information on My Smartphone?

From the Desk of William F. Pelgrin, Chair

We’ve come to depend on our smartphones so heavily it is hard to remember what we did before we had them. If you have a smartphone, you now carry a fully functional computer in your pocket or purse. That’s a tremendous amount of information at your fingertips! Therefore, it is paramount that you safeguard the smartphone.

Common Risks for Smartphones

Take a moment to consider each of these areas:

  • Loss of device and information theft. Smartphones are small and can easily be lost or stolen. Unauthorized users may access your accounts, address lists, photos, and more to scam, harm or embarrass you or your friends; they may leverage stored passwords to access your bank and credit card accounts, steal your money or make credit card charges; gain access to sensitive material, and more.

  • Social Engineering. A common mobile threat is social engineering. Whether via text message, image, or application to download, an incoming communication may be an attempt to gain access to your information.  A current example consists of a text message that comes from an unknown number, telling you that if you click on the link provided, you’ll have access to thousands of free ringtones.  If this sounds too good to be true, that’s because it is.  The link is in fact a malicious link.  Clicking on it will compromise the security of your smartphone.

  • TMI (Too Much Information). Guidelines for protecting privacy, safety, and reputation when sharing via computers also apply when sharing via smartphones. Mobile devices enable instantaneous capturing, posting, and distribution of images, videos, and information. They may also broadcast location information.

  • Public Wi-Fi. Smartphones are susceptible to malware and hacking when leveraging unsecured public networks.

  • Bluetooth and Near Field Communications (NFC). Bluetooth is a wireless network technology that uses short-wave radio transmissions to transmit voice and data. NFC allows for smartphones to communicate with each other by simply touching another smartphone, or being in proximity to another smartphone with NFC capabilities or a NFC device.  Risks with using NFC and Bluetooth include eavesdropping, through which the cyber criminal can intercept data transmission, such as credit card numbers.  NFC also has the risk of transferring viruses or other malware from one NFC-enabled device to another.

Simple Steps to Protect Your Smartphone:

  1. Update the operating system. Smartphones are computing devices that need to be updated. Updates often provide you with enhanced functionality and enriched features, as well as fixes to critical security vulnerabilities. Your smartphone manufacturer should notify you whenever an update is available.

  1. Use of security software is a must.  As the smartphone market is increasing, so too is the amount of malware designed to attack smartphones. The software security solutions that are available for desktops and laptops are not as widely available for smartphones. A key protection is to use mobile security software and keep it up-to-date. Many of these programs can also locate a missing or stolen phone, will back up your data, and even remotely wipe all data from the phone if it is reported stolen.

  1. Password-protect your device. Enable strong password protection on your device and include a timeout requiring authentication after a period of inactivity. Secure the smartphone with a unique password – not the default one it came with. Do not share your password with others.

  1. Think before you click, download, forward, or open. Before responding, registering, downloading or providing information, get the facts. No matter how tempting the text, image, or application is, if the download isn’t from a legitimate app store or the site of a trusted company, don’t engage with the message.

  1. Understand the terms of use. Some applications claim extensive rights to accessing and leveraging your personal information.  If the app requires more access to your account and/or device than is needed to run the service, do not continue. In addition, be aware that terms can change over time.  Review your terms of use often.

  1. Be cautious with public Wi-Fi. Many smartphone users use free Wi-Fi hotspots to access data (and keep their phone plan costs down). There are numerous threats associated with Wi-Fi hotspots. To be safe, avoid logging into accounts, especially financial accounts, when using public wireless networks.

  1. Disable Bluetooth and Near Field Communication (NFC) capabilities when not in use. Capabilities such as Bluetooth and NFC can provide ease and convenience in using your smartphone. They can also provide an easy way for a nearby, unauthorized user to gain access to your data.  Turn these features off when they are not required.

  1. Enable encryption.  Enabling encryption on your smartphone is one of the best ways to safeguard information stored on the device, thwarting unauthorized access.

  1. Securely dispose of your device.  With the constant changes and upgrades in the smartphone market, many are upgrading their devices on a regular basis.  It is important that you wipe the information from your smartphone before disposal.  Additionally, make sure any SD cards are removed and erased. If you are not redeploying the SIM card to another device, then make sure your personal information stored on the SIM card is erased or destroyed.

For More Information:

For additional information about securing mobile devices, please utilize the following resources:
  
<!--[if !supportLists]-->·       <!--[endif]-->About.com 14 Ways to Find a Stolen or Lost iPhone: http://ipod.about.com/od/iphonetroubleshooting/tp/14-Ways-To-Find-A-Lost-Or-Stolen-Iphone.htm
<!--[if !supportLists]-->·       <!--[endif]-->FTC – How to Dispose Your Mobile Device Securely: http://www.consumer.ftc.gov/articles/0200-disposing-your-mobile-device
<!--[if !supportLists]-->·       <!--[endif]-->University of Northern Colorado:  http://www.unco.edu/cybersecurity/students/mobile.html
<!--[if !supportLists]-->·       <!--[endif]-->US-CERT – Cyber Threats to Mobile Phones: http://www.us-cert.gov/reading_room/cyber_threats_to_mobile_phones.pdf
<!--[if !supportLists]-->·       <!--[endif]-->Sophos – Android Tool:  http://www.sophos.com/androidsecurity
<!--[if !supportLists]-->·       <!--[endif]-->Microsoft – Secure Your Smartphone: http://www.microsoft.com/security/online-privacy/mobile-phone-safety.aspx

National Service Agency: 205 organizations receive Senior Corps grants through competitive process

National Service News (banner)
For Immediate Release   Friday, February 22, 2013
Samantha Jo Warfield 
sjwarfield@cns.gov; 202-606-6775  

National Service Agency Grants to Support 80,000 Senior Volunteers 

205 organizations receive Senior Corps grants through competitive process


WASHINGTON, DC – The Corporation for National and Community Service (CNCS) today announced more than $14 million in funding to support organizations and nonprofits across the country. The organizations will leverage the experience and talents of RSVP Senior Corps volunteers in schools, conservation projects, disaster response, veterans’ services, and other priorities.

Nearly 80,000 new senior volunteers will have the opportunity to serve through 205 organizations receiving awards in 35 states. These funds were awarded as part of the first grant competition since 1971 for RSVP, one of three Senior Corps programs administered by CNCS.  Grantees selected will address a wide range of community issues, from disaster response and early childhood education to veterans and military families and environmental stewardship.

A complete list of grants is available here.

“Today, more than ever, communities need the talents and skills of all citizens to help solve our most pressing challenges,” said Wendy Spencer, CEO of CNCS. “Americans age 55 and over are a powerful resource to help communities achieve real change. These new RSVP grants will provide the bridge to connect seniors to meaningful service opportunities, so that they may deliver the enormous social and economic benefits we know are good for our nation.”

Established in 1971, RSVP engages Americans age 55 and older in volunteer opportunities across the country, allowing citizens to be a part of the solution to community challenges. RSVP volunteers provide support to veterans and their families, help seniors to live independently in their homes, mentor at-risk youth, and provide critical support to communities recovering from disasters. While serving, RSVP volunteers also improve their own lives, by staying active and civically engaged.

In 2012, 320,000 RSVP volunteers delivered more than 47 million hours of service in their communities.  Through community and faith-based organizations, RSVP volunteers served more than 563,000 veterans, mentored more than 82,500 children, and provided independent living services to more than nearly 742,000 elderly adults. 

“Older Americans bring a lifetime of skills and experience as parents, workers, and citizens that can be tapped to meet challenges in our communities,” said Dr. Erwin Tan, Director of Senior Corps at CNCS. “Given the many social needs facing our communities – and the growing interest in service by 55+ American citizens – this is a moment of unprecedented need and opportunity for our programs to take advantage of an extraordinary wave of human capital that has the potential to transform our nation.”

As part of the agency’s focus on driving greater innovation and impact, organizations receiving 2013 RSVP grants will report their progress using the performance measures CNCS adopted as a result of the bipartisan 2009 Serve America Act.  CNCS has embraced competition and performance measurement for the RSVP as a way to achieve greater impact in communities and the nation and to encourage innovation through adoption of new ideas and services.

The next Senior Corps funding opportunity will open sometime mid-year. Americans who seek to volunteer with a Senior Corps program can search for local opportunities in their area at seniorcorps.gov.

Security Clearance: Watch your credit report

A study on credit report accuracy recently found that 1 in 5 of the participating consumers had an error on at least one of their three credit reports.

Why Do Credit Report Errors Matter?

Errors on your credit report can negatively affect your credit score, which is used to evaluate your applications for credit cards, loans, jobs, housing, insurance, and more.


What Can You Do?


Check Your Credit Report
Check your credit report with all three credit reporting agencies at least once a year (you are entitled to one FREE credit report annually from each agency (Experian, TransUnion, and Equifax)). Checking your report will help you 1) identify and correct errors that could be affecting your credit score, and 2) protect yourself from identity theft.


Dispute Errors

If you find an error on any of your credit reports, follow instructions on the report that explain how to dispute errors. If errors have not been corrected after you've disputed them with the credit reporting agency, you can file a complaint with the Consumer Financial Protection Bureau. Get more information about disputing errors on your credit report.




RECOMMENDED READING LIST

Search This Blog

ARCHIVE List 2011 - Present