Wednesday, April 11, 2012

2012 New Madrid Incident Management Peer Exchange. October 23-25, 2012


New Madrid Incident Management Peer Exchange Pre-Event Survey


The Kentucky Transportation Cabinet-Division of Incident Management along with the Kentucky Department of Environmental Protection-Emergency Response Team, Kentucky Office of Homeland Security-HSEEP, US Department of Transportation, US Environmental Protection Agency and Kentucky Emergency Management Agency are tentatively planning the “2012 New Madrid Incident Management Peer Exchange” Registration from 12:00 p.m. - 1:00 p.m. EDT, with opening session beginning at 1:00 p.m. EDT on Tuesday, October 23, 2012.  We will have full-day sessions from 8:30 a.m. – 5:00 p.m. on October 24.  On October 25, the sessions will begin at 8:30 a.m. to 12:00 noon EDT.  This inaugural conference will be held at the Kentucky Transportation Cabinet Office Building at 200 Mero Street, Frankfort, Kentucky 40601.

The Peer Exchange will focus on the key elements at play while planning the response to a catastrophic event in the New Madrid Seismic Fault Zone states.  The Peer Exchange tracks will include: a scenario based pre-planning response for Federal/State/Local and Private Transportation Partners (Freight “Air and ground, Evacuation “Air, Ground and Rail”, Navigation and Hazardous Materials”, Rail “Hazardous Materials and Infrastructure’ and Pipeline “Hazardous Liquids and Gas”.

Our goal is that as a participant you will experience a most beneficial and enjoyable knowledge-based return for being a part of our nation’s first Peer Exchange.  Please see and respond to the attached survey; this survey will take less than five minutes to complete.  Your responses will help us better determine what should be included so we can serve your agency or industry in the nation’s first such Peer Exchange for the transportation industry.  Please complete and submit this survey via link provided…


Antimalaria drug: Mefloquine


http://www.airforcetimes.com/news/2012/04/military-new-concerns-antimalaria-doxycycline-mefloquine-041112w/






New concerns rising over antimalaria drug


By Patricia Kime - Staff writer
Posted : Wednesday Apr 11, 2012 6:22:47 EDT
Navy Sonar Technician (Surface) Seaman Douglas Corrigan placed a Skype call to his wife March 25, 2011, from Rota, Spain, shortly after taking his first dose of the antimalaria medication mefloquine.
Preparing for a mission to a malaria-endemic region, his unit watched a video on the illness, and corpsmen dispensed two drugs: daily-dose doxycycline, and mefloquine, taken weekly.
Corrigan doesn’t remember getting a choice. He received a blister pack of mefloquine and was told it could cause nightmares.
“He told me he didn’t feel good,” recalled Nicki Corrigan, his wife of three years. “He said, ‘I don’t feel like myself anymore.’ It was a really weird thing for him to say.”
Corrigan’s personality changed radically, she said. The straight-laced husband and father began chewing tobacco, drinking and carousing. He climbed outside a three-story building to see whether he would feel fear.
Months later, at home, he was found tiptoeing around his basement, pursuing imagined intruders. He ranted psychotically and complained of daily headaches.
Medical tests showed no traumatic brain injury, nor did doctors believe he had post-traumatic stress disorder. They began suggesting he had a personality disorder or was a malingerer, faking his problems to get out of the military.
Finally, an ear, nose and throat doctor at National Naval Medical Center Bethesda, Md., offered another diagnosis: “multifocal brain stem injury” — brain damage — likely caused by mefloquine.
“He has a lesion. On his brain,” said Nicki, a registered nurse.

BACK IN THE SPOTLIGHT

Mefloquine has drawn attention since the Army’s former top psychiatrist, retired Col. Elspeth Cameron Ritchie, wrote a column in Time magazinelisting it among several drugs that may have induced psychoses in Army Staff Sgt. Robert Bales, charged in the shootings deaths of 17 Afghan civilians March 11.
But Defense Department concerns about mefloquine date back further — and some close to the issue say the most recent bout of scrutiny, which began with a meeting last Aug. 24-25 of DoD’s Joint Prevention Medicine Group to discuss mefloquine policy, stems from the Corrigan case.
“You have a sailor with permanent brain damage,” said an Army doctor familiar with the debate. “It’s very serious.”
The Navy would not confirm a link between Corrigan and the current DoD review, citing privacy laws. But on Jan. 17, two months before Bales’ alleged spree, the Pentagon’s top doctor, Jonathan Woodson, directed the Army, Navy and Air Force and the commander of Joint Task Force National Capital Region Medical to give him all data and policies related to mefloquine.
DoD “wants to ensure each service conducts proper screening, patient education and medical documentation,” said Cynthia Smith, a Pentagon spokeswoman.
Mefloquine was developed under the Army’s malaria drug discovery program, which ran from 1963 to 1976. The Food and Drug Administration approved it for preventive use in 1989 and it was marketed under the brand name Lariam.
But no safety and efficacy reviews were ever done on a normal civilian population. The Army performed tests on prisoners in Illinois and Maryland in 1975 and 1976.
Shortly after commercial use began, anecdotes surfaced about side effects including hallucinations, delirium and psychoses.
According to the FDA, the most common side effects are nausea and vomiting, seen in less than 3 percent of users. Side effects occurring in less than 1 percent include emotional disturbances, seizures, hair loss, headache, tinnitus, pain and fatigue.
A 2004 Veterans Affairs Department memo urged doctors to refrain from prescribing mefloquine, citing individual cases of hallucinations, paranoia, suicidal thoughts, psychoses and more.
That same year, then-Assistant Defense Secretary for Health Affairs Dr. William Winkenwerder ordered a study to assess the rate of adverse side effects associated with antimalaria medications.
He ordered the study after questions arose over its possible role in several murder-suicides at Fort Bragg, N.C., in 2002 and suicides in Iraq among deployed troops.
The Army in 2009 issued a policy listing mefloquine as a third choice behind doxycycline and another antimalarial, chloroquine. DoD followed with a memo later that year stating that doxycylcine and mefloquine may be used in areas where malaria is resistant to chloroquine, but doxycycline is the preferred choice.
The Air Force and the Navy have similar policies, officials said.
The DoD memo says troops given mefloquine must be counseled on its possible effects and must not be suspected of having any mental health concerns.
In 2011, U.S. Central Command and U.S. Africa Command issued memos barring mefloquine use except when doxycycline or another preventive drug called Malarone cannot be taken.
Roche, the manufacturer of Lariam, stopped marketing it in the U.S. in 2008, but it is still available in more than 50 countries. The mefloquine now taken by U.S. troops is a generic version.

OTHER DRUGS ALSO HAVE ISSUES

Doxycycline is not without its drawbacks. It can make patients photo-sensitive, causing debilitating sunburn; has a poor compliance rate, since it must be taken daily; and has side effects, including nausea and vomiting.
And Malarone costs much more than the other drugs — about $30 a week, compared with $3 a week for mefloquine and less than 25 cents a week for doxycycline.
Navy Cmdr. Bill Manofsky — who was medically retired in 2004 for PTSD and neurological problems, including loss of balance, that he said were documented in his medical records as mefloquine-related — said if cost concerns are an issue, they shouldn’t be.
He said if DoD wants to protect the troops from malaria as well as mefloquine’s potential side effects, it should ban mefloquine and pay the higher cost of Malarone.
“How much does a .50-caliber round cost? They’re worried about $4 a pill and they’re willing to spend $5 for a round?” he said.
There’s no question malaria poses a risk. In 2011, 124 service members contracted the potentially fatal disease — 91 in Afghanistan, 24 in Africa and nine elsewhere. The year before, 113 troops contracted malaria; one died.
But mefloquine continues to be used in part because it is taken weekly while the alternatives must be taken daily, and some physicians believe that troops are more likely to take a weekly dose.
The services have 90 days to respond to Woodson’s order for details of their mefloquine policies.
Nicki Corrigan and others have contacted lawmakers, including Sens. Dianne Feinstein, D-Calif., and Jim Webb, D-Va., to press for congressional hearings.
Douglas Corrigan is currently undergoing a Medical Evaluation Board to determine if he is still fit for military service.

Event: MEA Magazine recognizing 50 Women of Power in Business




April 9, 2012

Data Solutions & Technology Founder Among 50 Women of Power in Business
Awards Luncheon Theme: Celebrating Global Leadership & Excellence
(LANHAM, Md.)—MEA Magazine, in collaboration with the U.S. Department of Commerce Minority Business Development Agency, is hosting the U.S.-Africa Trade and Investment Conference 2012 at the Washington Hilton, located at 1919 Connecticut Avenue, NW, Washington, D.C. on Tuesday, May 15, 2012, from 8:30 a.m. to 5 p.m.
 
During this event there will be a 1 to 3:00 p.m. luncheon recognizing 50 Women of Power in Business.   This event will honor 50 women leaders who are doing business nationally or internationally; women empowering communities around the world; and women shaping our economic future. Data Solutions & Technology Incorporated (DST) President and CEO Deborah Scott Thomas is among the 50 women who will be honored at the luncheon.

Fernando Galaviz, President and CEO, The Centech Group, Inc. (www.centechgroup.com) is keynote speaker during the awards luncheon. Mr. Galaviz is an expert lecturer and advocate for small/minority businesses. He is also the founder and president of the National Federal Contractors Association (www.nafcausa.com).

Other confirmed speakers include John Bryson, U.S. Secretary of Commerce; David Hinson, National Director, Minority Business Development Agency, U.S. Department of Commerce; and Gloria Parker, CEO and Senior Partner of Parker Group Consulting.  Ms. Parker consults for fortune 500 companies on government and business strategies. She served on the Obama-Biden Transition team, served as CTO and CIO of HUD, and Deputy CIO of the U.S. Department of Education. Moderators are Yvonne Davis, COO/ Director of International Affairs, True North Bridged Composites, and Collins Spencer, former CNN anchor.

A partial list of honorees include: Tomi Bannister, CEO, ARMA, Inc.; Jetta Bates-Vasilatos, Twist; Diane Hahn Bellegarde, Soundway Consulting; Angela Bradley, BTI Security; Kenya Brooks, Bonaparte Corporation; Dee Daniels, Noir Woman; Dr. Shirley Davis, Society for Human Resources; Betty Hines, Chair, Women Presidents Organization; Annette Johnson,CMT Services, Inc.; Latonia Jones, Alabama A&M University Research Institute; Valarie King-Bailey, On Shore Technology; Angelle Brigitte Kwemo, Congressman Bobby Rush’s Office; Dr. Madeline Lewis, Deline Institute; Viola Llewellyn, Praxis Asset Management Africa LLC; Sonia Lo, Chalsys Partners Limited; Jacqueline Lopez, Open System Sciences; Marsha Malone, Lockheed Martin; Amicitia Maloon-Gibson, MGAA Professional Development Institute; Rosalind McLymont, The Network Journal; Dr. Tendai D. Ndoro, SLIPPA/EDCT Trainers, LLC; Tammy Owens, City of Virginia Beach Economic Development; Necole Parker, ELOCEN Group; Tanaia Parker, T. White Parker; Dr. Suzanne Penn, MFS WealthCare;  Shalon Simmons, Global ICT; Janet Simmons, GRS, Inc.; Jennifer Streaks, Financial Expert; Peggy Seats, Washington Interdependence Council; Elizabeth A. Vazquez, WEConnect International; Desiree Watson, Wellness Interactive; Rosa Whitaker, The Whitaker Group; Patricia Williams, Omega Security International.

For more information, including ticket details, call 703-730-4091 or email at vpwilliams@comcast.net or meamagazine@yahoo.com.Visit the website at www.meecouncil.com.

Contact
Tammi L. Thomas, Vice President for Strategic Management, tthomas@dstincorporated.com,  240-487-1479, www.dstincorporated.com

Training Opportunity: E101 Foundations of Emergency Management




http://training.fema.gov/EMI/

Thursday, March 29, 2012

Course: National Emergency Management (EM) Academy  E101 Foundations of Emergency Management

This is an update to the announcement dated March 8, 2012. Please note the change in dates for the offering of E101 which had originally been scheduled for May 07-18, 2012. The new dates are April 30-May 11, 2012.

Dates and Location

       April 30 – May 11, 2012   Emmitsburg, MD
       July 23 – August 3, 2012   Emmitsburg, MD
       August 20 – 31, 2012        Emmitsburg, MD

Course Description:

The Federal Emergency Management Agency (FEMA) recognizes the need to tie training programs to an established set of emergency management competencies and to a career development program through a progressive training and education system that includes the entry-level Academy. Training objectives are based on the newly established EM competencies that the National Emergency Management Association (NEMA), the International Association of Emergency Managers (IAEM), and local, State, territorial, and tribal emergency management professionals have established in coordination with the Emergency Management Institute (EMI).


The following topics in emergency management are covered in this course: legal issues, intergovernmental and interagency context, influencing, organizing, social vulnerability issues, managing stress, public information

Course Goal:

At completion of this course, students will have a basic knowledge of the history of doctrine and authorities of emergency management, the role of the emergency manager, and an overview of all hazards

Course Length:

Each Foundations course is 11 days in length with Sunday off after the sixth day of instruction. Class resumes on Monday through Friday for the final 5 days of instruction the second week. Travel days are Sunday of the first week, and Saturday of the second week.

Prerequisite:

The following courses are mandatory prerequisites to this course:


• IS 100 (any version) – Introduction to the Incident Command System (ICS)
• IS 700 (any version) – National Incident Management System (NIMS), An Introduction
• IS 800.b – National Response Framework, An Introduction
• IS 230.b – Fundamentals of Emergency Management

Continuing Education Units (CEU’s):

                  The Emergency Management Institute (EMI) awards 8.8 CEUs for completion of this course.


Target Audience:

This course is intended for newly appointed emergency managers from State, local, territorial, tribal, Federal emergency management agencies, and prospective professionals transferring from another discipline to emergency management. Veteran emergency managers willing to mentor are also welcome to apply.

Locations:

National Emergency Training Center
Emergency Management Institute
Emmitsburg, Maryland

To Apply:

Students attending any course(s) of the Academy are required to submit a FEMA Form 119-25-1, General Admissions Application to:


Admissions Office, Room I-216 National Emergency Training Center 16825 South Seton Avenue Emmitsburg, Maryland 21727-8998


Phone: (301) 447 - 1035 Fax: (301) 447 - 1658 


Email: netc-admissions@dhs.gov


For further information, please refer to the EMI website: http://training.fema.gov/Apply/.


Upon receipt of the FEMA Form 119-25-1, General Admissions Application, the Admissions Office will confirm acceptance into the course by providing students with an Acceptance Letter and packet. Acceptance into any of the Academy couses will be on a first come, first served basis
.

                              Screen Fillable (Acrobat 2.1 and above) ADOBE PDF plug-in 633 KB PDF


Student Stipends:


State, local, territorial, and tribal students taking classes at EMI will be eligible for stipends to cover costs of transportation. Their lodging at EMI is provided at no cost.

EMI Point of Contact:

For course information for the May 7 - 18, 2012 offering, contact Mark Claveloux at (301) 447-1628, or by email at mark.claveloux@fema.dhs.gov.


For course information for the July 23 – August 3, 2012 offering, contact Paul Benyeda at (301) 447-1326, or by email at paul.benyeda@fema.dhs.gov.


For course information for the August 20 – 31, 2012 offering, contact Tom Gilboy at (301) 447-1535, or by email at tom.gilboy@fema.dhs.gov.

DOJ NIJ OJJDP Reentry Program Projects Solicitation


Evaluation of the Office of Juvenile Justice and Delinquency Prevention FY 2010 Second Chance Act Juvenile Offender Reentry Demonstration Projects

The U.S. Department of Justice’s National Institute of Justice (NIJ) recently released a solicitation for the Evaluation of the Office of Justice and Delinquency Prevention (OJJDP) FY 2010 Second Chance Act Juvenile Offender Reentry Demonstration Projects. The solicitation will fund a comprehensive evaluation of up to five juvenile offender demonstration projects selected for funding by OJJDP in FY 2010 under the Second Chance Act. States, local governments, federally-recognized Indian tribes, nonprofit and for-profit organizations, institutions of higher education, and certain qualified individuals are eligible to apply. The deadline for submitting an application is May 31, 2012 at 11:59 p.m. ET.
To download this solicitation, click here.

Friday, April 6, 2012

InfraGard Nations Capital Members Alliance (INCMA) for the April session of the 2012 Lecture Series


Please join the InfraGard Nations Capital Members Alliance (INCMA) for the April session of the 2012 Lecture Series!

Who: InfraGard Nations Capital Members Alliance members and guests (this meeting is open to the public)

What: Anonymous Payment Systems, Virtual Worlds, and Cyber Crime

When: Wed., April 11th from 5:00pm - 8:00pm 

Light fare will be provided. The program will not start until 5:30pm, allowing for arrival, check-in, and refreshments.

Where: CSC, 15000 Conference Center Drive, Chantilly, VA 20151

Why: Anonymous payment systems and virtual worlds are providing a forum for cyber criminals to transact business outside the regulated banking system.  Come hear to experts, representing the perspectives of law enforcement and the private sector, as they discuss the proliferation of these tools by cyber criminals to stay outside the reach of the law!

How: Register at http://incma04112012.eventbrite.com. There is a $25 fee to attend.

Our speakers:
Scott Dueweke was appointed by President Reagan to the U.S. Agency for International Development at the U.S. Department of State.  He helped pioneer the field of ecommerce, specifically secure payments, presenting at the first Internet World Conference in 1994 on the topic.  Mr. Dueweke then led marketing for IBM’s Internet Payments group, and went on to develop P2P and non-traditional payment systems.  During this period he also created and led a humanitarian non-profit group called Freedom Flight International (FFI).  The organization flew small aircraft over the Florida Straits working with the U.S. Coast Guard to rescue Cuban rafters.  He now leads Virtual Identity efforts at Booz Allen Hamilton.  This role builds upon his decades of experience in the financial services industry, the Internet, and government, to examine identity holistically.  Virtual identity includes anonymity, pseudonymity, and the projection of identity in virtual worlds, online games, and social networking sites, as well as anonymous payment systems.


Catherine "Alden" Pelker is an intelligence analyst for the FBI, specializing in virtual currency and electronic payment processors.  She is currently assigned to the FBI's Cyber Intelligence Section through the FBI's Financial Crimes Section.  Prior to this assignment, Alden worked with the Asset Forfeiture/Money Laundering Unit on international money laundering investigations, identifying emerging tools, techniques, and methods used to evade law enforcement and formulating strategy to mitigate these threats.  Alden has served as the FBI liaison to the Global Illicit Financial Team and is spearheading an FBI Virtual Currency/Emerging Trends working group.  She graduated from Yale University with a degree in political science.
Directions:
CSC is located south of Dulles International Airport in Chantilly, VA. Directions are as follows:
Take I-66 west to exit 53, Route 28. Take Route 28 north for approximately 1 1/2 miles. Take exit for Westfields Blvd, heading west. Take the first right onto Stonecroft Blvd. Turn left onto Conference Center Drive. CSC (15000 Conference Center Drive) will be on your left. Large, red "CSC" letters are on the roof line of the building. The sign as you turn into the parking area reads "Washington Technology Park." Drive past the front of the building and follow signs for "Conference Center Visitor Parking." Proceed to the entrance marked "Washington Technology Park Conference Center."

There should be ample parking in the immediate area of the conference center. However, you may also park in the rear of the building or in the visitor spots (of which there are only a few) directly in front of the building.

FOIA, I hardly know ya! (Yearly Report Card on Federal Government’s efforts to track and manage Freedom of Information Act requests)


http://www.ostglobalsolutions.com/index.htm



The Freedom of Information Act (FOIA) requests are a critical element of business development and capture. This is how you learn about a pursuit’s history and your competition. The problem is – FOIA requests are tricky:
OST proposal management process: proposal kick-off (integration phase), pink team and proposal drafting (planning phase), red team and proposal writing (writing phase), proposal polishing and gold team (polishing phase), proposal editing, printing, and shipping (publication phase), and proposal debriefs and lessons learned (post-proposal phase)
  • They take forever to obtain – so someone needs to carefully track them and follow up relentlessly to get any results – sometimes taking months and rendering your requests useless for your capture effort.
  • They have a potential to tick off your competition as they will know who is requesting – and if you tend to team with this competitor on occasion, you may want to be strategic as to what you request.
  • Third-party FOIA requests through services such as GovWin IQ and Centurion are great. They are faster as these services have established contacts in FOIA offices and they have personnel to follow up. The party whose documents are subject to FOIA doesn’t know who is requesting the FOIA documents. The downside is, now that these services have gone through the effort of fetching the information for you, they may also reuse this information to provide it to your competitors. Brilliant move on your part to FOIA something. Now your competitors subscribing to these services will have a reason to thank you. This may or may not matter to you.
Now it promises to be even harder to get FOIA documents – the length of time is stretching to close to a year. On March 15th, 2012 the U.S. House of Representatives Committee on Oversight and Government Reform, released their yearly Report Card on Federal Government’s efforts to track and manage FOIA requests. This report is critical of the federal government’s tracking of how it processes and responds to FOIA requests. Agencies got anaverage grade of C-. FOIA logs were requested to be graded based on a few criteria: names of FOIA requesters on log, tracking numbers for requests, descriptions of material sought, and whether records were in fact released. There are now as many as 13-months delays in some requests.
There are two things to consider:
  1. These grades are an indication of a willingness and ability by certain agencies FOIA offices to show accountability and transparency. You should be concerned about how difficult it is to obtain the information needed to help us decide to pursue an opportunity, enrich our capture efforts, and produce a proposal.
  2. See if the agencies that received an F grade are part of your customer list. There were two reasons to receive this grade: either the agency did not respond to FOIA requests – which in itself is a bad sign – or failed to produce them in digital format (which is a FOIA rule). In this case, save yourself an effort and don’t count on FOIA information – try to find it in other ethical ways.
If you would like to see the report card, you can download it herehttp://bit.ly/HQfLx4
What does this report mean to you? Well, a couple of things. First, start waaaay early with your capture. If you feel that you need to FOIA documents, plan for months of waiting to get them. Second, use the resources available to you to their maximum, such as the paid services that can help you. However, be strategic about it, you may get the information faster and anonymously, but know that others may get it as well. There is no difference in the thought process when asking questions about an RFP in a public forum: is getting what you need worth making your competition better off?

Capture and Proposal Seminars
Don’t miss early bird registration pricing – it ends 3 weeks before each class. Register at www.ostglobalsolutions.com/training/schedule
Date, 2012Class Name
April 17-18 Foundations of Capture Management
April 19-20 Foundations of Proposal Management
April 23-24 Proposal Speed-Writing and Persuasion
May 14-15 Preparing Winning Multiple Award and Task Order Proposals
May 16 Cost Proposal Strategy for Proposal Managers
June 19-20 Advanced Capture Management
June 21-22 Advanced Proposal Management
July 19 Proposal Win Themes Development Workshop
July 20 Executive Summaries For Winning Proposals Workshop
If you don’t find a class that suits your schedule, consider us for on-site corporate training at your company, or for a webinar for your dispersed workforce if you have multiple locations.

Useful Proposal Resources

P.S.: As always – if you need business development, capture and proposal consulting or training support, contact us at 301-384-3350 or at service@ostglobalsolutions.com

P.P.S.: Feel free to forward this newsletter to others who may find it useful. If you have received this from a colleague and would like to sign up yourself, here is where you can do it: http://www.ostglobalsolutions.com/eZine-signup.htm.


Written by Olessia Smotrova-Taylor, President and CEO of OST Global Solutions, Inc. Olessia is a currently practicing capture and proposal manager who has won more than $17 Billion in new business. As one of the proposal industry leaders, she served on the Board of Directors of the Association of Proposal Management Professionals' (APMP) National Capital Area (NCA) chapter as the editor and chair of the APMP NCA Executive Summary eZine for 4 years since 2008, and as a president for 2012. She regularly presents at the APMP's international and other conferences, roundtables, and proposal boot camps, and runs popular training webinars on business development. She has 16 years of experience in proposal and capture management, marketing, and communications. She is a prolific author, speaker, trainer, and blogger, and is well-known in the global proposal community. Her self-study course, Executive Summary Secrets, sells worldwide. Prior to starting her own consulting company, she won business for Raytheon and Lockheed Martin, and wrote for the Financial Times of London. Olessia can be reached at otaylor@ostglobalsolutions.com or at 301-384-3350.

4th Law Enforcement IT Day 2012. April 18, 2012


4th Law Enforcement IT Day 2012
 

 
Law enforcement and national security depends on adaptation—adaptation to the economy, adaptation to technology and adaptation to criminal methodologies. As budgetary cutbacks become commonplace in the Federal government, creativity in new technology initiatives must take precedence as agencies are increasingly expected to do more with less. Law enforcement agencies and officers will need to use new tools, including, data analytics, secure mobility, biometrics and even social media to more effectively track, detain and prosecute criminals.

AFCEA Bethesda invites you to Law Enforcement IT Day 2012 for a look at how these new technologies and processes are redefining the way law enforcement agencies adapt to budgetary constraints and the evolution of criminal devices and tactics. The event will bring together more than 400 senior government leaders and IT professionals across industry and Federal agencies such as DOJ, DHS, State, Treasury and DOD to foster better communications, share lessons learned and best practices, and identify mission-critical IT issues. It will focus on federal initiatives and programs that harness current and emerging technologies to better protect and improve the safety and security of U.S. citizens.

 
Register today and benefit from:
  • Networking opportunities with more than 400 senior executives and IT professionals
  • Keynote presentations and panel discussions from key stakeholders at critical agencies such as DOJ, FBI, DHS, ICE, CBP, State, and Treasury, among others, responsible for achieving Federal law enforcement objectives through the use of IT
  • Federal roundtables allow Q&A opportunities to discuss challenges, trends and initiatives between government and industry that will lead to innovation and economic growth
    • Topics include: mobile force engagement, mobile security, data analytics, cloud computing, shared services, biometrics, information sharing, cyber defense, cyber incident response and social media as an investigative tool
  • Program updates from IT program and project managers and Department leaders
  • Small Business Innovation Luncheon featuring more than 125 small business representatives and systems integrators to look at real and planned set-aside programs throughout the health IT community
  • Meet one-on-one with Federal program offices such as FBI InfraGard, CJIS, LEO, NIEM PMO and NITAAC to discuss future law enforcement focused information technology opportunities and how the private sector can improve technology requirements
  • Receive continuing education credits from the Graduate School USA, an independent, educational, not-for-profit that prepares and advance your career in government, private sector and non-for-profit organizations
Wednesday, April 18, 2012 

Bethesda North Marriott and Conference Center –
5701 Marinelli Road, North Bethesda, MD 20852

Webinar: Societal security – Emergency management – Requirements for incident response. April 11, 2012.


BEMA is a partner organization of EIPP.

ISO Technical Committee 223 on Societal Security Update

April 11, 2012 -- 12:00 Noon Eastern

In follow up to our last program on emergency management standards, EMForum.org is pleased to host a one hour presentation and interactive discussion Wednesday, April 11, 2012, beginning at 12:00 Noon Eastern time (please convert to your local time). Our topic will be an update on the activities of ISO Technical Committee 223 since our last program during 2008. This past December, ISO announced the publication of a new standard, ISO 22320:2011, Societal security – Emergency management – Requirements for incident response.


Photo of Dr. Dean LarsonOur guests will include Dean Larson, Ph.D., CEM®, Chair of the U.S. Technical Advisory Group and Head of Delegation to Technical Committee 223. Dr. Larson also serves as a Commissioner on the Indiana Emergency Response Commission and chairs the Certified Emergency Manager (CEM®) USA Commission. He is project lead for the development of the first ISO Standard on exercises and testing. Additional certifications include Safety Professional (CSP) and Business Continuity Lead Auditor (CBCLA).


Photo of Orlando HernandezAlso joining us will be Orlando P. Hernandez, Senior Specialist with the National Fire Protection Association. Mr. Hernandez has over 20 years of experience conducting and administering Fire and Life Safety Inspection Programs for the State of Texas Fire Marshal's Office and Bexar County. He also has over 16 years of Fire Investigation experience and 6 years of experience as an Emergency Management Coordinator and Incident Management Team responder.


Photo of Brian ZawadaOur final presenter will be Brian Zawada, Co-founder and Director of Consulting for Avalution Consulting, a global firm specializing in business continuity solution design, development, implementation and long-term program maintenance. Mr. Zawada previously served on the ASIS International Technical Committee that authored the new American National Standard on business continuity and currently serves on the US Technical Advisory Group charged with authoring the new family of ISO Societal Security standards, including ISO 22301.
Please make plans to join us, and see the Background Page for links to related resources and the new Instructions. If this will be your first time to participate, you may set up WebEx in advance. On the day of the program you may use the Webinar Login link not more than 30 minutes before the scheduled time.


As always, please feel free to extend this invitation to your colleagues.

EIIP and Jacksonville State University are now partnering to offer CEUs for attending EMForum.org Webinars.  See http://www.emforum.org/CEUs.htm for details.

Is your organization interested in becoming an EIIP Partner? Click here to review our Mission, Vision, and Guiding Principles and access the Memorandum of Partnership.

Cybersecurity: Interesting reading. Kingpin

http://kingpin.cc/



KINGPIN: How One Hacker Took Over the Billion-Dollar Cybercrime Underground, by Kevin Poulsen
Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat.  In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first century’s signature form of organized crime.
The word spread through the hacking underground like some unstoppable new virus:  Someone—some brilliant, audacious crook—had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.
The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin; other agencies around the world deployed dozens of moles and double agents.  Together, the cybercops lured numerous unsuspecting hackers into their clutches…yet at every turn, their main quarry displayed a seemingly uncanny ability to sniff out their snitches and see through their plots.
The culprit they sought was the most unlikely of criminals, a brilliant programmer with a hippie ethic and a supervillain’s double identity.  As prominent ‘white hat’ hacker Max ‘Vision’ Butler, he was a celebrity throughout the programming world, even served as a consultant for the FBI.  But as the black-hat ‘Iceman,’ he found in the world of data theft an irresistible opportunity to test his outsized abilities.  He infiltrated thousands of computers around the country, sucking down millions of credit card numbers at will.  He effortlessly hacked his fellow hackers, stealing their ill-gotten gains from under their noses.  Together with a smooth-talking con artist, he ran a massive real-world crime ring.
And for years, he did it all with seeming impunity, even as countless rivals fell afoul of police.
Yet as he watched the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient…he began to see in their dysfunction the ultimate challenge.  He would stage his coup and fix what was broken, run things as they should be run—even if it meant painting a bullseye on his forehead.
Through the story of this criminal’s remarkable rise, and of law enforcement’s quest to track him down,Kingpin lays bare the workings of a silent crime wave still affecting millions of Americans.  In these pages, we watch as a new generation of for-profit hackers cobbles together a criminal network that today stretches from Seattle to St. Petersburg to Shanghai. We are ushered into vast online-fraud supermarkets stocked with credit card numbers, counterfeit checks, hacked bank accounts, dead drops, and fake passports. We learn the workings of the numerous hacks—browser exploits, phishing attacks, Trojan horses, and much more—these fraudsters use to ply their trade, and trace the complex routes by which they turn stolen data into millions of dollars.  And, thanks to Poulsen’s remarkable access to both cops and criminals, we step inside the quiet, desperate arms-race law enforcement continues to fight with these scammers today.
Ultimately, Kingpin is a journey into an underworld of startling scope and power, one in which ordinary American teenagers work hand-in-hand with murderous Russian mobsters, in which a simple wi-fi connection can unleash a torrent of gold worth millions.

Article: Critical Infrastructure. Researchers Release New Exploits to Hijack Critical Infrastructure


  • http://www.wired.com/threatlevel/2012/04/exploit-for-quantum-plc/

  • By  
  •  
    •  

    The Modicon Quantum programmable logic controller, which is used in critical infrastructure systems, contains common security vulnerabilities that would allow attackers to upload rogue commands to it. Photo: Reid Wightman/Digital Bond
    Researchers have released two new exploits that attack common design vulnerabilities in a computer component used to control critical infrastructure, such as refineries and factories.
    The exploits would allow someone to hack the system in a manner similar to how the Stuxnet worm attacked nuclear centrifuges in Iran, a hack that stunned the security world with its sophistication and ability to use digital code to create damage in the physical world.
    The exploits attack the Modicon Quantum programmable logic controller made by Schneider-Electric, which is a key component used to control functions in critical infrastructures around the world, including manufacturing facilities, water and wastewater management plants, oil and gas refineries and pipelines, and chemical production plants. The Schneider PLC is an expensive system that costs about $10,000.
    One of the exploits allows an attacker to simply send a “stop” command to the PLC.
    The other exploit replaces the ladder logic in a Modicon Quantum PLC so that an attacker can take control of the PLC.
    The module first downloads the current ladder logic on the PLC so that the attacker can understand what the PLC is doing. It then uploads a substitute ladder logic to the PLC, which automatically overwrites the ladder logic on the PLC. The module in this case only overwrites the legitimate ladder logic with blank ladder logic, to provide a proof of concept demonstration of how an attacker could easily replace the legitimate ladder logic with malicious commands without actually sabotaging the device.
    The exploits take advantage of the fact that the Modicon Quantum PLC doesn’t require a computer that is communicating with it to authenticate itself or any commands it sends to the PLC – essentially trusting any computer that can talk to the PLC. Without such protection, an unauthorized party with network access can send the device malicious commands to seize control of it, or simply send a “stop” command to halt the system from operating.
    The attack code was created by Reid Wightman, an ICS security researcher with Digital Bond, a computer security consultancy that specializes in the security of industrial control systems. The company said it released the exploits to demonstrate to owners and operators of critical infrastructures that “they need to demand secure PLC’s from vendors and develop a near-term plan to upgrade or replace their PLCs.”
    The exploits were released as modules in Metasploit, a penetration testing tool owned by Rapid 7 that is used by computer security professionals to quickly and easily test their networks for specific security holes that could make them vulnerable to attack.
    The exploits were designed to demonstrate the “ease of compromise and potential catastrophic impact” of vulnerabilities and make it possible for owners and operators of critical infrastructure to “see and know beyond any doubt the fragility and insecurity of these devices,” said Digital Bond CEO Dale Peterson in a statement.
    But Metasploit is also used by hackers to quickly find and gain access to vulnerable systems. Peterson has defended his company’s release of exploits in the past as a means of pressuring companies like Schneider into fixing serious design flaws and vulnerabilities they’ve long known about and neglected to address.
    Peterson and other security researchers have been warning for years that industrial control systems contain security issues that make them vulnerable to hacking. But it wasn’t until the Stuxnet worm hit Iran’s nuclear facilities in 2010 that industrial control systems got widespread attention. The makers of PLCs, however, have still taken few steps to secure their systems.
    “[M]ore than 500 days after Stuxnet the Siemens S7 has not been fixed, and Schneider and many other ICS vendors have ignored the issues as well,” Peterson said.
    Stuxnet, which attacked a PLC model made by Siemens in order to sabotage centrifuges used in Iran’s uranium enrichment program, exploited the fact that the Siemens PLC, like the Schneider PLC, does not require any authentication to upload rogue ladder logic to it, making it easy for the attackers to inject their malicious code into the system.
    Peterson launched a research project last year dubbed Project Basecamp, to uncover security vulnerabilities in widely used PLCs made by multiple manufacturers.
    In January, the team disclosed several vulnerabilities they found in the Modicon Quantum system, including the lack of authentication and the presence of about 12 backdoor accounts that were hard coded into the system and that have read/write capability. The system also has a web server password that is stored in plaintext and is retrievable via an FTP backdoor.
    At the time of their January announcement, the group released exploit modules that attacked vulnerabilities in some of the other products, and have gradually been releasing exploits for other products since then.

    RECOMMENDED READING LIST

    Search This Blog

    ARCHIVE List 2011 - Present