Federal Aviation Administration restricts airspace. The federal government has decided to restrict airspace around the Statue of Liberty in New York, Mount Rushmore National Memorial in South Dakota, and the Gateway Arch in St. Louis for fear of possible attacks during the Fourth of July holiday. The "no-fly zone" around the Statue of Liberty was imposed on 25 June and bars flights within one nautical mile of the monument until September, said FAA spokesman William Shumann. The FAA also prohibits all flights within four nautical miles of Mount Rushmore from 3-5 July and within three nautical miles of the Gateway Arch on 3-4 July. (Reuters, 27 Jun) Cyber attacks by al Qaeda feared by US. (Reprinted from 27 June Daily Report) The potential exists for the compromise of digital devices that allow remote access of Distributed Control Systems (DCS) and Supervisory Control and Data Acquisition Systems (SCADA). Analysts believe the ability to disable or take command of these systems could have severe repercussions on the U.S infrastructure. (Washington Post, 26 Jun) WWU Comment: Many terrorists have become more sophisticated in their activities, more familiar with technology, and more innovative in their targeting. Although these groups have not yet conducted cyber attacks directly targeted at U.S. infrastructure, the trend indicates that attacks on cyber components of the infrastructure are the next logical step. Terrorists may engage in swarming attacks, which are coordinated attacks using different methods against a target and the surrounding infrastructure. The most likely form of a swarming attack is one in which an attacker uses cyber means to enhance the effects created by a traditional physical attack. Terrorists will likely use cyber attacks to complicate the response by authorities to the physical attack by delaying notification of emergency services and widening the physical and psychological effects of a physical attack by denying the local populace vital daily services such as electricity or water. A swarming attack will be difficult to recognize and interdict. The cyber portion of the attack may begin long before the physical attack takes place and culminate before, simultaneous with or even after the physical attack. The cyber portion of the attack can be launched and controlled from a location well removed from the site of the physical attack. Cyberwarfare test in works for state. Texas cities preparedness for cyberwarfare on computer-controlled systems that operate key structures and services such as water plants, power plants and 911 emergency response will be tested through what is described as the state's first cyberterrorism exercise, code-named Dark Hive. The Texas Department of Information Resources will conduct the exercise. Local officials from chosen cities will be told that a particular system - such as 911 - has been attacked and harmed and their response will be observed. (San Antonio Express-News, 27 Jun) NIPC and Financial Services ISAC agree to share security information. In an effort to enhance the security and readiness of the country's financial services industries to deal with potential terrorist threats, Mr. Stanley (Stash) R. Jarocki, Chairman, Financial Services Information Sharing and Analysis Center, LLC (FS/ISAC) signed an agreement with Ronald L. Dick, NIPC Director. The partnership between the FS/ISAC and the NIPC will allow vital security-related information to move more effectively between the multi-agency NIPC, based at FBI headquarters in Washington, DC, and financial services associations. (FBI, 25 Jun) ~rm
This archive was generated by hypermail 2b30 : Fri Jun 28 2002 - 10:15:11 PDT