SAFECOM and NCSWIC Address Communications Dependencies on Non-Agency Infrastructure

The world of emergency communications can be astoundingly complex, especially as additional capabilities and services become necessary to successfully deploy, maintain, and protect communications systems. Many agencies rely on multiple third-party entities to provide these capabilities, including provisioning of critical system infrastructure, cybersecurity, and other services. For example, agencies readily rely on commercial vendors for subscriber units or on commercial utilities for power supply. An agency and its contracted non-agency entities alike are vulnerable to events that threaten the uptime, continuity of services, operations, or resiliency of communications. Regardless of how unpredictable these events may be, agencies can take steps to be prepared when those disruptive events occur.
Using the depth of experience among their members, SAFECOM and the National Council of Statewide Interoperability Coordinators (NCSWIC) have published a white paper―Public Safety Communications Dependencies on Non-Agency Infrastructure and Services—outlining several techniques to prepare throughout the communications system lifecycle for challenges associated with such dependencies, as shown in the graphic.
Given the potential for disruptive events impacting non-agency partners, public safety stakeholders—including system administrators, public administration officials and decision makers, and other communications personnel—might benefit from understanding the potential complications or obstacles they may face when depending on outside sources for infrastructure or services.
To learn more about this document and other helpful resources, visit cisa.gov/safecom/technology
Author: Ted Lawson, Cybersecurity and Infrastructure Security Agency (CISA), Joint SAFECOM and NCSWIC Technology Policy Committee Federal Lead

Ransomware Activity Targeting the Healthcare and Public Health Sector

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Department of Health and Human Services (HHS) have credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers.

CISA, FBI, and HHS have released AA20-302A Ransomware Activity Targeting the Healthcare and Public Health Sector that details both the threat and practices that healthcare organizations should continuously engage in to help manage the risk posed by ransomware and other cyber threats. The advisory references the joint CISA MS-ISAC Ransomware Guide that provides a ransomware response checklist that can serve as a ransomware-specific addendum to organization cyber incident response plans.

CISA, FBI, and HHS are sharing this information in order to provide a warning to healthcare providers to ensure that they take timely and reasonable precautions to protect their networks from these threats. CISA encourages users and administrators to review CISA’s Ransomware webpage for additional information.

How UN collaboration is shaping the concept of 'Circular Cities'

“Extending a lifespan or increasing utilization over that lifespan,” says Okan Geray, Strategic Planning Advisor for Smart Dubai. “These are the two key elements of circularity – create another life, or a life delivering more value.”
Applying this thinking to the workings of a city reveals a broad scope of opportunity to achieve ‘Circular Cities’, explains Geray.
Geray leads the Thematic Group on Circular Cities within the United for Smart Sustainable Cities Initiative (U4SSC), an initiative supported by 17 United Nations partners with the aim of achieving Sustainable Development Goal 11: ‘Make cities and human settlements inclusive, safe, resilient and sustainable’.
“The guide is a world first. Outlining the wealth of opportunity to build circularity into cities, the guide presents a more holistic view of circularity than the now well-established idea of Circular Economy,” says Geray.
“The resulting concept of Circular Cities offers a new way of thinking about not only economic aspects of cities but also their social and environmental dimensions.”
< Download the 'Guide to Circular Cities' free of charge >
Guiding cities from evaluation to action
The Guide provides a ‘circular city implementation framework’ for cities to define the best course of action to improve circularity.
It outlines a four-step methodology for cities to assess opportunities for circularity, prioritize the opportunities capable of delivering the most value, catalyze associated circular actions, and evaluate the impacts of these actions.
“The first stage is all about baselining, almost a checklist for cities to take stock of where they stand today and where they aim to go,” explains Geray.
The Guide begins by mapping all of the ‘assets and products’ found in a city to provide a high-level categorization of opportunities for circularity.
It proceeds by highlighting the ‘circular actions’ that cities could apply to these assets and products, actions including sharing, recycling, refurbishing, re-using, replacing, and digitizing.
It highlights the ‘outputs’ resulting from circular actions, outputs such as more energy-efficient buildings, a longer lifespan for water resources, or more inclusive uses of public spaces.
The Guide also highlights the wide range of ‘enablers’ that cities can apply to catalyze these actions.
“These enablers are potential policy tools to stimulate circular actions,” says Geray. “These enablers might include, among others, Key Performance Indicators, R&D programmes, public-private partnerships, training and capacity building, and financial incentives for circular actions.”

NCSC Update Guidance on Principles for the design and build of in-house Public Key Infrastructure (PKI)

A private Public Key Infrastructure (PKI) is used to confirm the identity of users, devices and services hosted or connected to privately owned infrastructure.
This is an essential component of any system that uses a private PKI for authentication, as such it must be designed and built with great care.
This guidance provides a set of high level architectural design principles which can be used to design, scope or review a private PKI architecture.
Fur further details visit NCSC >> 

NCSC welcomes EU cyber sanctions against Russia following attack on Germany’s Parliament

The National Cyber Security Centre – a part of GCHQ – has welcomed EU cyber sanctions against Russia’s GRU following its cyber attack on Germany’s Parliament in 2015.
The sanctions are being brought against two Russian GRU officers and the GRU’s military intelligence unit 26165 – codenamed APT28 and Fancy Bear – who were responsible for the attacks.
The Foreign Secretary has confirmed the UK will enforce asset freezes and travel bans on those involved.
The NCSC, which supported the attribution of the attack to the GRU, welcomed the sanctions and the multinational and joint approach being taken with allies standing in solidarity against the attacks.
NCSC Director of Operations Paul Chichester said:
“We fully support these sanctions, which send a strong message that that there will be consequences for those who target us or our allies in cyberspace.
“We will continue to work closely with our allies to counter malicious cyber activity from the GRU and others who would seek to do us harm.”

November is CIPR Month in US

Under leadership from the U.S. Department of Homeland Security's National Protection & Programs Directorate (NPPD) and partnership with InfraGardNCR, November is designated as National Critical Infrastructure Security and Resilience Month.
NCISRM builds awareness and appreciation of the importance of critical infrastructure and reaffirms the nationwide commitment to keep our critical infrastructure and our communities safe and secure. Securing the nation's infrastructure, which includes both the physical facilities that supply our communities with goods and services, like water, transportation, and fuel, and the communication and cyber technology that connects people and supports the critical infrastructure systems we rely on daily, is a national priority that requires planning and coordination across the whole community.​
In November, NCISRM efforts will focus on bringing stakeholders together to foster trusted relationships, providing timely and relevant resources to mitigate vulnerabilities, and raise awareness around the role of our supply chain in protecting critical infrastructure.

NCSC CNI Hub goes live

Deborah Petterson, Deputy Director of the National Cyber Security Centre in the UK, has introduced a dedicated resource for UK Critical National Infrastructure.
Sometimes, Critical National Infrastructure (CNI) is taken for granted. The feeling seems to be that essential services, like telecoms, water, or energy 'just happen'. That's fine, but this isn't the way it works. It takes a huge effort to keep the water, electricity and information flowing.
The current pandemic has brought national infrastructure into focus.
The industry has been discussing supply chains, transport infrastructure, critical dependencies, and the unwanted attention from our adversaries, on the industries supporting our response to the COVID-19 pandemic.
The NCSC's new CNI Hub, will help support service providers in raising their resilience and defending against cyber attacks.
The new CNI Hub will provide several new features which will be of direct and immediate benefit to those involved with UK CNI:
- highlighted advice and guidance that is particularly relevant to the CNI
- events that will be of interest to CNI
- a new home for the NCSC’s Cyber Assessment Framework, which is a key tool for many UK CNI cyber security regulators
- a new way to view the NCSC’s assured products and services to support regulatory approaches

North Korean Malicious Cyber Activity

The Cybersecurity and Infrastructure Security Agency (CISA),  the Federal Bureau of Investigation (FBI), and the U.S. Cyber Command Cyber National Mission Force (CNMF) identified tactics, techniques, and procedures (TTPs) used by North Korean advanced persistent threat (APT) group Kimsuky to gain intelligence on various topics of interest to the North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.
Kimsuky is engaged in ongoing cyber operations against worldwide targets to gain intelligence for North Korea, specifically on foreign policy and national security issues related to the Korean peninsula, nuclear policy, and sanctions. CISA, FBI, and CNMF recommend individuals and organizations within commercial sector businesses increase their defenses and adopt a heightened state of awareness.
The information contained in the alerts and MARs listed below is the result of analytic efforts between the U.S. Department of Homeland Security, the U.S. Department of Defense, and the Federal Bureau of Investigation to provide technical details on the tools and infrastructure used by cyber actors of the North Korean government. Each MAR includes malware descriptions, suggested response actions, and recommended mitigation techniques.
Users or administrators should flag activity associated with the malware and report the activity to the Cybersecurity and Infrastructure Security Agency (CISA) or the FBI Cyber Watch (CyWatch), and give the activity the highest priority for enhanced mitigation. The U.S. Government refers to the malicious cyber activity by the North Korean government as HIDDEN COBRA.

Hurricane Zeta makes landfall on Louisiana Coast

Hurricane Zeta made landfall in southeastern Louisiana as a Category 2 storm, tearing into coastal communities with heavy rain and wind, and leaving hundreds of thousands without power, and threatening other critical infrastructure systems.
Almost 350,000 homes and businesses in Louisiana are already without power, with some coastal roads under water.
The number of people being left in the dark due to Zeta's strong winds continues to climb. More than 1.3 million customers are without power across Louisiana, Mississippi, Alabama and Georgia, according to PowerOutage.us. These numbers are likely to continue to climb as Zeta charges northeastward at a staggering 39 mph.
The most dangerous storm surge is expected to the east of New Orleans, with 6 to 9 feet (1.8 to 2.7 meters) of surge likely between the Pearl River on the Louisiana-Mississippi border and Dauphin Island, Alabama. The storm surge around New Orleans itself is forecast only 1 to 2 feet lower, and is still very dangerous. At least 1 to 3 feet (30 to 90 centimeters) of surge is likely across a region stretching from the central Louisiana coast to Yankeetown, Florida.
Zeta is expected to move fast across the U.S., bringing damaging wind, dumping rain and triggering floods across Mississippi, Alabama, northern Georgia, the Carolinas and southeastern Virginia. Powerful wind is likely across the southern Appalachians, the NHC wrote.
It's not yet November and Zeta is already the 27th Atlantic tropical cyclone of 2020, nearing the record of 28 set in 2005.

NSA Secures 5G Through Partnerships

NSA’s Cybersecurity mission includes working to secure future technologies. As imminently emerging technology, 5G will change the way both military and National Security Systems operate, and NSA is partnering across industry and government, along with standards bodies, to support the construction of a secure network.
5G, or fifth generation network, promises to be a major upgrade from previous generations. New 5G technologies will support many new and exciting use cases. The increase in speed will enable a new generation of innovation and business to flourish.
NSA has partnered with fellow government agencies to support the security of 5G. The Enduring Security Framework (ESF) team has been working with partners at the Department of Homeland Security, the Office of the Director of National Intelligence, the National Security Council, and more. They are partnering with industry to deep dive into threats, standards, cloud, and analytics. Each of these areas will have a dedicated public-private partnership effort to examine the risks associated with their subject matter and pursue technical solutions. The cumulative goal is to jointly improve the ability of the 5G infrastructure to identify and build threat models, detect threats in networks, recover from attacks, and securely leverage the benefits of virtualization.
To secure the full scope of 5G use cases, it is critical that strong cybersecurity practices are incorporated. The recently launched Center for Cybersecurity Standards (CCSS) looks at 5G from a viewpoint of securing NSS and contributing to working groups within standards bodies to secure 5G mobile infrastructure. Through engagements with 3GPP, ATIS, IETF and IEEE, CCSS is raising the bar for security in the 5G ecosystem and making sure secure options exist for use on NSS. As subject matter experts, NSA leverages our legacy in secure cryptography and network security to ensure 5G standards will protect NSS data by working with the carriers to ensure that they are requiring optional security settings.
The impact of 5G technologies will be felt well beyond NSS to include numerous IoT devices transforming our personal and professional lives. These devices are smarter and will use 5G to provide new edge computing capabilities, greatly impacting many parts of our society, including manufacturing (through its impact on robotics and Smart Warehouses), transportation (such as smart cars and the smart infrastructure they rely on), and healthcare (through impacts on tele-health and even remote surgery).
The full evolution to 5G will take time – time to develop the supporting standards, produce the technology, and upgrade the infrastructure across the U.S. and around the world to support the full extent of this technology. Since customers will be using 5G, strengthening U.S. infrastructure is vital to maintaining a military and economic edge.
1 44 45 46 47 48 53