Thursday 30 April 2015

Building permits still booming; infrastructure projects moving forward

With more than $40 million in building permits issued in March, Rapid City’s construction boom has continued, and infrastructure projects also burgeoned in the first three months of the year.

Mayor Sam Kooiker’ quarterly progress report Wednesday, delivered in the second-floor council chambers of the downtown City-School Administration Center, highlighted what he called “robust” construction activity.

In March, building permit valuations topped out at roughly $40.5 million, marking only the third month since 2000 that permit totals have exceeded the $40-million mark, Kooiker said.

He said more big-ticket permits are on the horizon, with the recent announcement of a new $70 million Black Hills Corporation headquarters being built on south side of town along Highway 16.

“We’ve seen a very robust building permit season so far, and we know that there are a number of other large permits coming later this year,” Kooiker said.

Major permit valuations in March included roughly $14 million for an assisted-living facility, Village at Skyline Pines, at 1050 Fairmont Blvd.; nearly $5 million for the Good Samaritan senior housing complex at 4243 Wisconsin Ave.; and about $4.6 million for two 18-unit apartment complexes at 405 Founders Park Drive.

With about $32 million budgeted for infrastructure projects this year, Public Works Director Terry Wolterstorff said his department has been busy lining out street, utility and drainage projects.

“Business is brisk in the Public Works Department and our Engineering Division this year,” Wolterstorff said. “We have a lot of projects that we are getting out to bid and under contract.”

He said major projects include roughly $2.7 million in reconstructions of East Signal and Crescent drives, southeast of downtown on the hilltop just west of the South Dakota School of Mines & Technology campus.

Work is underway on the reconstructions, which are expected to be completed by late fall, city spokesman Darrell Shoemaker said.

Wolterstorff said the city is set to spend $2 million for water, sewer and drainage improvements on Silver Street, just west of Central High School, as part of a more than $20 million reconstruction of the Interstate 190 interchange by the Department of Transportation.

Shoemaker said the interchange rebuild is expected to go out to bid mid-July, with actual construction expected to be underway by the fall, taking some two years to complete.

The city has also entered into a $1.85 million contract to complete the fourth and final phase of a project to extend the city’s water main to the Rapid City Regional Airport. The project is expected to be completed by late fall.

The main extension will bolster water resources for fires at the airport, while allowing added development opportunities in the eastern stretches of town and Rapid Valley, Wolterstorff said.

He said about $2 million has been set aside for chip-and-seal and other road rehabilitation projects throughout Rapid City.

Roadways in the southwest Red Rocks area will get attention as well as Kansas City and Quincy and West Main streets.

“We really get a big bang for our buck with that ($2 million). We can do a lot of streets with those rehabilitation projects,” Wolterstorff said. “A lot of these are under contract already. Some of them we will be opening bids within a month.”

Source: http://ift.tt/1zv5F6g



from critical infrastructure alliance http://ift.tt/1GJOyx7
via IFTTT

GALVESTON PARK TO GET $10.7M FOR RECOVERY FROM OIL SPILL

The Galveston County Daily News reports the aging building where administrators work is little more than a shed with a leaky ceiling and failing water pipes.
But park officials consider themselves lucky. Unlike other state parks in Texas, the park will receive $10.7 million for upgrades in late 2017 from BP’s restoration fund created in response to the 2010 Deepwater Horizon oil spill.
“Until then we are just waiting it out with limited resources,” park Superintendent Trey Goodman said. “There is a light at the end of the tunnel for us. A lot of parks don’t have that.”

As the Legislature debates funding for Texas’ more than 90 state parks, however, Goodman and other park officials know many future park decisions are at stake.
The Texas Parks & Wildlife Department has requested some $200 million in additional funds for the next two years, which officials say will address infrastructure projects that have been deferred for years, development of land and prevent park closures.
“We’re running from crisis to crisis in terms of trying to put duct tape and bailing wire on a problem that needs a whole lot more,” Carter Smith, executive director of the department said in February during a hearing before the House Culture, Recreation and Tourism Committee.
The funding decision will shape Galveston Island State Park’s ability to maintain staff and infrastructure until the 2017 renovations and may determine if the park will be able to maintain staff to manage the park after the expansion, Goodman said.

“As it is now, I don’t know if I will have to make cuts in staff from year-to-year,” Goodman said. “You never know if the funding is going to be up or down. It’s hard to plan.”
Texas’ state parks collect revenue from entrance and campsite fees, but state parks in Texas are largely dependent on state funding.

That funding, department officials say, has been unpredictable and insufficient for long-term planning and park maintenance.
The funding is tied to the state’s tax revenue from the sale of sporting goods. In 1993, a statute mandated that 94 percent of the sales tax revenue generated from the sale of sporting goods go to parks and wildlife, which runs the state parks.
The Legislature has the final say, however, on how much of that revenue it will appropriate each session. Since the measure passed, the state has appropriated only 36 percent of the more than $2 billon in sporting goods tax, according to TPWD.

Bills filed in the Legislature would mandate that the full 94 percent of the tax revenue go to state parks.
Park advocates are supporting a proposed amendment to the Texas Constitution that would permanently give 94 percent of the sporting goods tax to the parks. If approved, the amendment would go to a statewide public vote in November.

This session, TPWD has requested more than $200 million in additional funds, including more than $75 million for capital construction projects and modernization, $18 million for fishery management and $25 million for critical repairs to Battleship Texas in La Porte.

Goodman said locals should realize that the park’s impact goes beyond access to natural spaces.
The park also has an economic impact with 126,906 visitor days logged at the park in 2014, of which 114,374 were from outside Galveston County. The estimated economic impact for the county was $4,862,463 from visitor spending, employment and tax revenue.
“People have to realize – there is a lot of value here,” Goodman said. “Even if they never set foot in the park, it is important.

Source: http://ift.tt/1bH0TYi



from critical infrastructure alliance http://ift.tt/1QPQBoY
via IFTTT

Warnings of hackers on planes all too familiar to airline security researchers

Fresh government reports and alerts about the hacking threat to airplane avionics systems underscores the challenges facing industry and government as more critical infrastructure becomes Internet connected.

The warnings were certainly alarming: following fresh reports that airline navigation systems were vulnerable to digital attacks, federal agents warned flight crews to be on the lookout for hackers.

And in a sign of how edgy the airline industry and federal agents may be over hacking planes, earlier this month the FBI detained a security researcher after he tweeted about computers flaws within the Boeing 737 on which he was traveling.

But while breaking into aviation networks has become the latest cybersecurity risk grabbing headlines, government watchdogs along with the Federal Aviation Administration (FAA) and computer researchers have been warning for years that the software used in modern airplanes is vulnerable to attacks from criminal hackers. Yet, according to many researchers, despite these alarm bells, the industry as a whole does not appear to have taken the necessary steps to keep their systems secure.

Recommended: Passcode How well do you know hacker movies?

“We blew a lot of this stuff up four or five years ago at BSides,” said Chris Roberts, a noted researcher and principal at One World Labs, referring to the security conference where he presented evidence of airline security flaws.

In fact, over the past few years, researchers have demonstrated how attackers could take control of in-flight communication systems and avionics equipment that pilots rely on during flight.

The industry and law enforcement didn’t take kindly to Mr. Roberts’ latest comments regarding its systems. While he was traveling on a flight to Syracuse on April 15, Roberts tweeted about breaking into an airline computer system.

“Find myself on a 737/800, lets see Box-IFE-ICE-SATCOM, ? Shall we start playing with EICAS messages? “PASS OXYGEN ON” Anyone ? :)”. EICAS refers to the Engine Indicating and Crew Alerting System, which is critical in-flight systems.

After the flight, he was detained and questioned by federal agents for two hours. The FBI retained his laptop and other devices, saying it needed to do a forensic analysis of them to determine whether Roberts had, in fact, attempted to hack the Boeing jet. He was also later barred from boarding a separate flight on his way to the RSA Conference, a major security industry gathering last week in San Francisco.

“We knew these things were issues four or five years ago. So I wonder ‘is there a specific threat that they’re not telling us about,’ or are they just [upset] because I’m not shutting up?” Roberts said following the incident.

LATEST WARNINGS

The renewed attention to airline security – and what Roberts had been commenting about on Twitter – started when with a Government Accountability Office (GAO) report on April 14.

The report warned that the FAA lacked a systematic approach to assessing security risks in airplanes, relying instead on case-by-case “Special Conditions” rules to address risks in specific airplane models. The FAA’s Radio Technical Commission for Aeronautics (RTCA) has yet to design new regulations that could be used to certify cybersecurity assurance for avionics systems because those systems historically haven’t been accessible in a way that would permit cyberattacks, the GAO noted.

The reaction to the GAO report from lawmakers and law enforcement was swift and pronounced. Rep. Peter DeFazio (D) of Oregon, the ranking member of the House Transportation and Infrastructure Committee, told CNN that the report has exposed serious threats to aircraft in flight and urged the FAA to respond.

“I can’t believe this is just now becoming news,” says Joshua Corman, the chief technology officer at the firm Sonatype and a founding member of IAmTheCavalry, a grassroots organization of security experts who advocate for issues in which computer security intersects with public safety.

Mr. Corman said the failure to address cybersecurity risk by the FAA and airplane makers is symptomatic of what he calls a “cultural defect” in the information security sphere – and more generally in society – that focuses attention on threats but not the bigger questions of prevention.

“Our manner of digesting and discussing topics is biased toward waiting for some in the wild manifestation of an attack,” said Corman. “That really truncates conversations about secure architecture and secure design.”

The consequences of that is a lack of measurable progress in making systems and software more secure over time, as the GAO report suggests.

“That’s disappointing when the stakes are personally identifiable information or credit card numbers being stolen,” Corman said. “But now we’re talking about areas where the cost of failure is measured in human lives.”

AWARENESS IS GROWING

Even if the GAO report doesn’t break new ground, it was “necessary” and a “good idea,” said Ruben Santamarta from the firm IOActive, another noted airline security researcher. “It’s better to approach these kind of potential scenarios from a proactive manner, instead of waiting until something happens,” he said.

And Mr. Santamarta says that awareness is growing within the aerospace sector regarding cybersecurity risks. One bit of proof: in June he’ll be speaking about aircraft security at Aviation Festival Americas, a major conference for the world’s airlines.

The fallout from the GAO report underscores the difficulty that private firms, federal regulators, and lawmakers face as more and more critical infrastructure comes to rely on software and Internet connectivity, experts acknowledge.

After years of operating as little-explored technology islands, firms across the transportation industry are beginning to encounter many of the same issues that software firms such as Microsoft and Adobe Systems have long had to contend with, said Katie Moussouris, the chief policy officer of the firm HackerOne, which helps firms sponsor and run programs to find and fix software flaws.

“Critical infrastructure is not immune from security vulnerabilities,” said Ms. Moussouris. The good news is that firms such as Boeing and Airbus are in a position to learn the lessons of companies such as Microsoft, where she worked as a senior security analyst.

That company spent years battling with independent security researchers over protocol related to the discovery of vulnerabilities in its software. In the process, Microsoft came to be an industry leader, not only in secure software development, but also in its infrastructure for producing and distributing software patches to users, and in communicating with the public about the substance of those.

At a minimum, Moussouris said companies need to create a “front door” for researchers such as Roberts. That means creating something like a spot on their webpages that instructs independent researchers on how to report software vulnerabilities to the company.

 “You need openness, transparency, and acceptance,” she said “That’s just a reality when software is running on things.”

Source: http://ift.tt/1biUwd9



from critical infrastructure alliance http://ift.tt/1biUwda
via IFTTT

CTA Is Seeing Red & Purple For Massive Rehab Project

It’s train-ing day for two lines of the CTA. Today the transportation authority announced that they plan to move full steam ahead with the Red and Purple Modernization (RPM) project that aims to rebuild and add more passenger capacity to the northern part of the popular train lines. The multi-phase work could begin as early as 2017 though no projected completion date has been announced.
Specifically targeted in the plan would be reconstructing the Lawrence, Argyle, Berwyn and Bryn Mawr stations and rehabbing more than a mile of track infrastructure in the Red Line and Purple Line zone north of Belmont. An additional proposal includes building a bypass north of the Belmont station where the Red, Brown and Purple lines meet.
As part of the project, new stations would be equipped with accessible elevators, wider and longer platforms, improved lighting and other security features, as well as added benches and real-time information screens. The track reconstruction would replace the old infrastructure with new tracks, support structures, bridges and viaducts for the entire section of the Red Line adjacent to the four stations and is needed to increase reliability speed and ensure faster, smoother rides with less crowding.
The CTA pointed out the following in a press release regarding the project:
“According to the Chicago Metropolitan Agency for Planning, 185,000 new residents are projected to move into Red and Brown Line service areas by 2040. To meet future demand, the CTA needs to increase service in this corridor to serve more riders during rush periods, yet with current infrastructure constraints it has reached capacity,” said a press release about the project that further notes that rush hour ridership has grown nearly 40 percent over five years. “If nothing is done, the CTA will be unable to add more trains to accommodate more riders, and trains will become more crowded and passengers will wait longer, with long-term quality of life impacts on Chicago.”
As it is the rails on these two service lines are 100 years old and “at the end of its useful lifespan,” according to the CTA. Soon-to-be outgoing CTA President Forrest Claypool also looped the project into the process of fulfilling Mayor Rahm Emanuel’s vision for a world-class transit system (it should be noted Claypool was just announced as Emanuel’s incoming chief of staff).
“This transformational, once-in-a-generation project will bring critical infrastructure and station improvements to the Red Line, which is Chicago’s backbone and our busiest line, and allow us to increase train service as ridership continues to grow,” said Claypool. “As part of Mayor Emanuel’s vision to create a world-class transit system, the Red and Purple Modernization Program will lead to tangible benefits for the entire region, with faster and more reliable service for generations to come.”

The CTA says that it plans to maintain service schedules during construction, though it does anticipate there will be temporary station closures. The Lawrence and Berwyn stations would be closed first for 18 months and the second phase would additionally restrict the Bryn Mawr station to southbound boarding only for up to two years, according to the Tribune that also says a temporary platform will be open at Foster and Winona during the second phase of work.
For now, the project is in the hands of the public. The CTA released its first Environmental Assessment report (EA) today (accessible here) that informs people of the proposal and seeks community feedback—an important step if the CTA wants to receive federal funding. Projected costs could mount $1.9 billion and so far the CTA has acquired $50 million in federal, state and local funds according to the Tribune.

Source: http://ift.tt/1GzF0lR



from critical infrastructure alliance http://ift.tt/1GKT29K
via IFTTT

Forest Service to pay $18 million to Montana counties

A long-awaited vote on Forest Service payments to counties passed the U.S. Congress two weeks ago, freeing up $285 million in support for local schools and projects across 41 states and Puerto Rico.

The reauthorization of the Secure Rural Schools and Community Self-Determination Act includes nearly $18 million in support for 34 Montana counties over the next two years. Had the bill failed, Montana’s share of Forest Service money would have stalled at $126,770; little more than seven-tenths of 1 percent of the two-year SRS payments total.

“The Secure Rural Schools program is a lifeline for Montana’s rural counties — many of which have suffered from severe economic challenges in the wake of declining timber harvests and natural resource production,” Sen. Steve Daines, R-Mont., said in a news release Tuesday. “These payments are welcome news for the dozens of Montana counties that are already stretching their budgets to support local schools, infrastructure maintenance and critical community services.”

Daines, Sen. Jon Tester, D-Mont., and Montana Republican Rep. Ryan Zinke all voted for reauthorization of SRS payments.

“For Montana’s forested counties, SRS helps communities maintain quality schools, roads and bridges,” Tester said in a news release. “As we work to improve economic opportunities in rural Montana, SRS provides necessary support to county budgets.”

SRS payments evolved as a way of offsetting declining timber harvest receipts in the 1980s. In 2000, Congress passed SRS as a way to provide stabilized payments to states with tracts of National Forest Service land within their boundaries. The payments are similar to Payments in Lieu of Taxes, by which the Department of the Interior offers payments to local governments to help offset losses in property taxes on non-taxable federal lands within their boundaries.

“These are communities that were once thriving and now they’ve come to rely on the SRS program to fund their critical infrastructure programs,” said Heather Swift, communications director for Zinke. “Everything that tax revenues go to support in these communities is now relying on SRS funding.”

In 2012, Congress declined to renew SRS appropriations for the next biennial. Funding for the most recent SRS program ended in October 2014. The U.S. House reauthorized SRS funding last March; however, a vote in the Senate was delayed until April 14. President Obama signed the bill into law that same day.

Payments to individual counties are calculated based upon a complex formula that incorporates the percentage of Forest Service and Bureau of Land Management timberland in the county, regional National Forest revenues, and the county’s per capita income.

Of the states scheduled to receive SRS payments, California will be the greatest recipient with nearly $31 million in total allocations. North Dakota will see the lowest payment. With only 740 acres of qualifying Forest Service land, the “Peace Garden State” will see just $507.36 over the next two years.

Four Montana counties will each receive more than $1 million in SRS payments, including Beaverhead ($1.03 million), Flathead ($1.46 million) and Mineral ($1.08 million). Lincoln County will gain the most through SRS passage. The far northwestern corner of Montana will get $4.14 million for schools, roads and forest conservation projects over the next two years. Golden Valley (Ryegate) by comparison, which encompasses a small corner of the Lewis and Clark National Forest, will get $12,197.

The National Forest Service has until May 29 to deliver SRS payments to the counties.

What local Montana counties will get in SRS payments

Cascade — $132,124.85

Chouteau — $26,850.28

Fergus — $78,386.35

Glacier — $33,934.49

Judith Basin — $164,546.99

Lewis and Clark — $624,216.11

Meagher — $458,863.35

Pondera — $83,789.16

Teton — $110,333.29

Source: http://ift.tt/1EGfkak



from critical infrastructure alliance http://ift.tt/1DF3mZb
via IFTTT

U.S.-Japan pact bolsters ties in cyber, space and ISR

While the United States and Japan have enjoyed a strong post-World War II relationship, the two nations deepened their ties this week, signing on to both a military agreement and a similar diplomatic agreement that, among other economic and defensive parameters, call for greater cooperation in space, cyber and intelligence, surveillance and reconnaissance (ISR).

The comes as the United States and its allies are looking for ways to deal with China’s military modernization and its aggressive recent behavior in the South and East China seas.

Cyber  

It seems fitting to enter into a new cybersecurity partnership following the Defense Department’s recently released cyber security strategy, which includes better collaboration with allies among its goals. The guidelines for U.S.-Japan defense cooperation call for “timely and routine” information sharing on matters of cyber threats and vulnerabilities, as appropriate. The agreement extends to the private sector as well, since information sharing is seen as one of the key aspects of ensuring greater situational awareness in cyberspace to respond to threats.

Two bills are currently in front of the U.S. Congress that call for greater information sharing between the private and public sectors, something Adm. Michael Rogers, director of the National Security Agency, has said he wants most from Congress.

The White House fact sheet outlining the diplomatic elements of cooperation went into more specifics, naming “state-sponsored cyber-enabled theft of intellectual property, trade secrets, or other confidential business information intended to provide competitive advantages to a state’s companies or commercial sector” as areas the two nations would cooperate and share information pertaining to cybersecurity.

Source: http://ift.tt/1PaFcwq



from critical infrastructure alliance http://ift.tt/1GKHJOC
via IFTTT

Survey: C-level Tech Execs Most Responsible for Breaches

As the data breach epidemic rages on, the question of corporate liability has been front and center. It turns out that many security-industry folks believe that C-level technology executives would and should be the ones held responsible for compromises, new research has revealed.

According to a survey by Tripwire of 250 attendees at RSA Conference USA 2015 and BSidesSF 2015 in San Francisco last week, technology leaders within firms are the ones who should be on the hook for security, in spite of pervasive vulnerabilities being present on many fronts that are leading to devastating cyber-attacks across a broad range of industries.

When asked, “Who would be held responsible in the wake of a data breach on critical infrastructure in your organization,” 41% of survey respondents said “CIO, CISO or CSO.”

When asked, “Who should be held responsible in the wake of a data breach on critical infrastructure in your organization,” 35% said “CIO, CISO or CSO.”

Only 18% of respondents believe the CEO would be held responsible, and only 10% believe the company board would be held responsible. Of course, in Target’s case, that’s exactly who was held responsible, to the point of resignation.

“Cyber security liability is difficult to assign because you have to determine who knew about the risks, and then you have to figure out what they did, or did not do about them,” said Ken Westin, senior security analyst for Tripwire. “If the CEO is made aware of security risks and does not provide the resources or plans to fix them, they own some of the responsibility.”

On the other hand, a large part of this boils down to cross-department communication. If the CISO does not share information about risk in a format that the CEO can understand, or fails to deploy the security controls and monitoring necessary to identify potential risks, then a greater share of the responsibility falls on her, Westin added.

“Cyber security is a team sport that requires active support across the organization and from all levels of the executive team,” he said.

Source: http://ift.tt/1zrnhjq



from critical infrastructure alliance http://ift.tt/1Q35a7o
via IFTTT

Minister: Hydro One sale strikes a balance

Broadening ownership of Hydro One strengthens the company’s long-term performance and generates billions for needed investments in critical infrastructure, such as rapid transit in Hamilton. Our approach generates approximately $4 billion of a $31.5 billion, 10-year infrastructure plan to invest in the roads, bridges, and transit lines our province needs and create more than 110,000 jobs each year. This approach pays down the debt by $5 billion.

Although a recent opinion piece suggested otherwise, by legislation Ontario will remain Hydro One’s largest shareholder and ratepayers will have enhanced protections. As part of this initial public offering, no other single shareholder — or group of shareholders — would be permitted to own more than 10 per cent of the new Hydro One, ensuring that shares are broadly held across Ontario and the government remains the largest single shareholder by far. This approach will allow Hydro One to become more innovative, more competitive, and a more effective performer.

Let me be clear — Hydro One has never had the power to set its own rates and will never have the power to set its own rates. This is done by the Ontario Energy Board, which has a powerful mandate to enforce just and reasonable rates for all Ontarians. Our government is legislating enhanced powers to protect consumers and increase oversight.

Our government is working to strike the appropriate balance — the people of Ontario keep the largest share of ownership, gain billions to build infrastructure, pay down $5 billion in debt, avoid having to borrow money and strengthen the protections that ratepayers enjoy.

Source: http://ift.tt/1dwgHy8



from critical infrastructure alliance http://ift.tt/1Gz8VL1
via IFTTT

UK rail comms are safer than mobes – for now – say infosec bods

Industry told to harden systems to prevent future train smash carnage

Analysis Last week’s warning that Britain’s railway systems could be susceptible to hacking has triggered a debate among security experts.

Prof David Stupples of City University London made headlines last week with a warning that plans to replace the existing (aging) signalling system with the new European Rail Traffic Management System (ERTMS) could open up the network to potential attacks, particularly from disgruntled employees or other rogue insiders. “Major disruption” or even a “nasty accident” could ensue if miscreants were able to plant malware on the system, the computer scientist warned.

The Station Agent

ERTMS is made up of on-board train, trackside and GSM mobile telephony equipment. The system is intended to replace legacy trackside signalling and voice systems with a modern in-cab signalling and voice communications system, based on a European standard.

The technology is designed to help lay the tracks towards faster, safer trains and more efficient use of the existing rail network. Similar technology is being adopted around the world and not just in Europe. UK testing has already begun ahead of a roll-out expected to take place over five years into the 2020s.

Chris Day, ICS security researcher at security consultancy MWR Infosecurity, commented: “ERTMS has been rightly recognised by the UK government and railway operators as critical infrastructure that is potentially susceptible to computer attack and there are ongoing investigations and remedial actions to mitigate identified risks against ERTMS. The fact this process is already in progress prior to the system being deployed in the UK is an important, proactive step forward in Industrial Control System (ICS) security management.”

“This will benefit both rail users and operators, as security issues are cheaper and more likely to be fixed if they are discovered prior to a systems deployment,” he added.

Day said that the risk of malware getting introduced to the system, as highlighted by Professor Stupples, were perhaps a little overstated:

“In our experience, the exploitation of core, safety-critical components of ICS presents a very different exploitation challenge to traditional desktop environments,” Day said. “Due to the safety-critical nature of ICS, we often see a very low tolerance to malicious activity and failure into to safe modes of operation.”

CSI ICS

The Stuxnet attacks against Iran’s nuclear centrifuges back in 2010 shows that industrial control plant can be attacked with malware, but such attacks remain very difficult to pull off, according to Day.

“Exploiting ICS will require a different approach and toolset to successfully execute attacks,” Day explained. “Just as security researchers and black hat hackers retooled to attack mobile devices in the early 2000’s, there will need to be a similar retooling period before we see a dramatic increase in ICS exploitation.”

“Unlike the mobile sector, there is currently a lack [the sort of] commonality between different ICS vendors which would facilitate widespread ICS exploitation. However, this appears to be changing, as ICS vendors are also slowly converging on delivering products using the ARM architecture and Commercial Off The Shelf (COTS) software to reduce the development costs of ICS equipment and remain competitive. The use of COTS technologies without appropriate security hardening remains a high-risk security weakness for ICS,” Day concluded.

El Reg contacted City University London for comment on Day’s analysis, but is yet to hear back at the time of going to press. We’ll update this story as and when we hear more.

As previously reported, Network Rail told El Reg that digital in-cab signalling is already used “safely and effectively by dozens of countries in Europe and around the world and is similar to technology already in use on the Tube and other metro systems in this country”. Cyber-security is a key part of the plan for introducing digital train control technology, it said, adding that it was working closely with “government, the security services, our partners and suppliers” to ensure safety. Network Rail operates the UK’s rail infrastructure, a role that makes it the lead organisation in the rail commas upgrade.

Transport hubs and routers

Countries need to address the problem of cyber-criminal activity, not only on transport systems, but on critical infrastructure as a whole, according to Kaspersky Lab.

David Emm, principal security researcher at Kaspersky Lab, commented: “Whilst Kaspersky Lab is not privy to the security tests conducted by the rail lines, the fact that our train network could be compromised by cyber-criminals is another warning sign of the risks we face as our critical infrastructure becomes increasingly connected.”

Attacks against industry control and traffic management systems are becoming more than the staple of Hollywood hacker movies, according to Emm, who said isolated incidents of real attacks are already occurring.

“We’re already seeing examples of cyber-criminals exploiting new technology. For example, in Moscow, speed cameras and traffic monitoring systems were infected with an unidentified Trojanwhich stopped authorities catching traffic offenders. A seemingly minor attack, which had huge effects on function and revenue collection.

Security should be built into systems from the onset rather than added as an afterthought, according to Emm.

“We should view the recent warning as a wake-up call, not only for the transport industry, but for critical infrastructure as a whole. Governments and businesses around the world are now grappling with the potential threat to ‘critical infrastructure’ installations and the need to defend systems that, if successfully attacked, impact not just the organisations concerned, but society at large,” Emm said.

Source: http://ift.tt/1JbDzNi



from critical infrastructure alliance http://ift.tt/1ztYk77
via IFTTT

Wednesday 29 April 2015

Dow Chemical and Monsanto Could Hold the Solution to This Accelerating GMO Problem

The Internet almost caught on fire several weeks ago, when the World Health Organization characterized the generic, but widely used, herbicide glyphosate as “probably carcinogenic to humans.” Two other pesticides — malathion and diazinon — were also singled out, but only glyphosate is a household word, thanks to Roundup from Monsanto (NYSE: MON  ) , and, of course, to the Internet mobs that regularly assemble against the company.

Although the classification caused quite a stir, it probably won’t have any meaningful impact on the use of glyphosate (farmers are well aware that it replaced several much riskier herbicides), Monsanto’s revenue or profits (no viable or economical alternatives exist), or the general conversation on genetically engineered crops (some of which are resistant to glyphosate applications). After all, WHO has also labeled the occupational exposure experienced as a barber and emissions from high-temperature food frying as “possibly carcinogenic to humans” — and the world still has plenty of barbers and fast-food joints.

While it’s difficult to have a reasonable discussion on GMO crops, given how polarized the conversation has become, biotech crops aren’t perfect. They’re just tools. When used properly, tools can provide simple solutions to age-old problems. When used improperly or abused, tools can exacerbate existing problems or create new issues. With that in mind, let’s attempt to have a reasonable discussion on the topic by examining one real problem a specific type of biotech crop poses, and a potential solution that Monsanto and Dow Chemical (NYSE: DOW  ) are developing.

The path of least resistance
Herbicide-tolerant crops allow farmers to apply herbicides to their farms without the need to pinpoint the locations of weeds or avoid revenue-generating crops, thereby saving time, money, and carbon emissions during field maintenance. It’s a tremendously simple solution, which explains why farmers have widely adopted crops engineered to tolerate applications of herbicides, such as glyphosate, since their introduction in 1996. Today nearly 90% of all corn, cotton, and soybean varieties planted in the United States exhibit such traits, as U.S. Department of Agriculture data demonstrates.

Herbicide-tolerant traits denoted by “HT.” Image source: USDA.

Unfortunately, widespread adoption of herbicide-tolerant crops has led to the widespread prevalence of herbicide-tolerant weeds. Here the word “tolerant,” used to denote a positive trait in crops, is often replaced by the word “resistant,” since the trait has negative consequences when exhibited in weeds. Or, when sensationalism wins, the term “superweed” is applied.

Terminology aside, it’s still a problem — and one that has been accelerating according to market research polls. In 2011, about one-third of farmers reported having glyphosate-resistant weeds on their farms. That jumped to nearly 50% in 2012.

Are biotech crops really to blame? While there’s no doubt that biotech crops engineered to tolerate the application of herbicides have played a major role, the problem can be more accurately characterized as one of herbicide management. Resistant weeds existed long before biotech crops were deployed to American farms. However, the agricultural industry’s heavy reliance on a single herbicide, in this case glyphosate, has made it easier for resistance to emerge.

In other words, easy-to-use biotech crops have made it easier to rely on a single herbicide but haven’t directly led to herbicide-resistant weeds just because they’re genetically enhanced. Of course, farmers are still left with a big problem that needs solving. What solutions are emerging?

Industry stepping up
Some may balk at the idea that the agricultural industry can solve a problem it made worse, but there’s no getting around the fact that companies such as Monsanto and Dow Chemical will play a key role in any unified plan to address problems associated with herbicide-resistant weeds.

If the problem can be simplified as an overreliance on one herbicide, then one obvious way out is to use additional herbicides. Indeed, that idea is the driving force behind Dow Chemical’s Enlist Weed Control System, which includes (1) corn and soybean varieties engineered to resist both glyphosate and 2,4-D, another commonly used herbicide, and (2) a new mixture of the two herbicides called Enlist Duo.

The system worked beautifully in field trials, demonstrating the ability to control over 90% of five common weeds, including three already at least partially resistant to glyphosate.

Image source: Enlist.com.

That table should make it no surprise that Dow Chemical has experienced high demand for the Enlist Weed Control System — even before regulatory agencies approved it. The product is expected to contribute a majority of EBITDA growth for the company’s agricultural sciences portfolio, which is expected to grow by $1 billion from 2013 levels by 2020.

While the Enlist Weed Control System will provide an important near-term solution for farmers, weeds will eventually develop resistance to Enlist Duo. It’s an unfortunate reality that awaits agriculture if more robust guidelines and mandates aren’t introduced.

Longer term, it makes sense for the USDA to step in and encourage farmers to rotate herbicides, whether every harvest or every several years. It’s a bit complicated, since one herbicide cannot simply be substituted for another in the same amounts or applications. Such a move would also require coordination with industry to ensure adequate supply of herbicides and seeds in the mandated year. But if we want to protect the value that biotech crops and genetic traits provide, then it’s an inevitable step.

What does it mean for investors?
Whether or not you blame the likes of Monsanto and Dow Chemical for aiding the advance of herbicide-resistant weeds, there’s no denying that the pair are working on novel solutions. Do the solutions go far enough on specific timelines? Maybe not, depending on the length of time in question, but the difficult lessons learned by relying too heavily on one herbicide have created significant opportunities for companies that develop solutions, even if they’re partial ones.

This $19 trillion industry could destroy the Internet
One bleeding-edge technology is about to put the World Wide Web to bed. And if you act quickly, you could be among the savvy investors who enjoy the profits from this stunning change. Experts are calling it the single largest business opportunity in the history of capitalism… The Economist is calling it “transformative”… But you’ll probably just call it “how I made my millions.” Don’t be too late to the party — click here for one stock to own when the Web goes dark.

 

 

View the original content and more from this author here: http://ift.tt/1QIURXq



from critical infrastructure alliance http://ift.tt/1PZq9rQ
via IFTTT

780,000 chemical weapons being destroyed in Colo.

PUEBLO, Colo. — Workers have begun destroying a massive stockpile of American chemical weapons stored at a former Army munitions depot near Colorado’s ninth-largest city, blasting the artillery rounds open with explosives and neutralizing them with solvents.

Workers perform their slow, painstaking task under heavy security and strict safety precautions, which include constant monitoring for leaks, armed guards on random patrols and video monitoring by independent observers. About 780,000 shells and mortar rounds filled with mustard agent are stored at the military-run Pueblo Chemical Depot, and all of them must be destroyed under a 1997 international law.

“You can’t be too safe about what we’re doing here,” said Thomas Schultz, a spokesman for the Pueblo Chemical Agent Destruction Pilot Plant. “As long as things are dull, we’re all happy.”

Chemical weapons were once stored across the USA, including in Oregon and Utah, but the United States has been destroying the stockpile for years. Most were incinerated, but community concerns in Pueblo, about 115 miles south of Denver, and at the Blue Grass Army Depot near Richmond, Ky., delayed destruction until the military could develop new techniques to reduce the risk of mercury contamination from the smoke.

The meticulous disposal process is a stark departure from how the military used to get rid of chemical weapons: either by burying them or dumping them into the ocean.

In 2004 and 2005, some chemical munitions were accidentally dredged up off the New Jersey coast and ended up buried in residential driveways. The Army apparently dumped the munitions in relatively shallow water, said Lenny Siegel, the executive director of the California-based nonprofit Center for Public Environmental Oversight.

“We didn’t have anything better to do with them at the time,” he said.

Siegel, a longtime observer and advocate for communities near chemical weapons and Superfund sites, said the new systems are expensive, slow — and safe.

“It costs more and takes more time, … but safety is given a pre-eminent position,” he said. “It’s no longer out of sight, out of mind, which used to be the approach.”

Mustard agent, which is often referred to as a gas, actually has consistency of molasses. It was made at the Rocky Mountain Arsenal near Denver, loaded into shells, and then shipped to the Pueblo depot for storage starting in the 1950s.

The stockpile must be destroyed on site because federal law prohibits shipping chemical weapons across state lines.

Mustard agent causes severe skin blistering and chemical burns, but those injuries don’t show up immediately. It was designed to cause widespread casualties, forcing armies to stop fighting and remove their wounded to safety for treatment.

About 90% of America’s chemical weapons have been destroyed, and Pueblo Depot holds the bulk of the remainder. Blue Grass, about 40 miles south of Lexington, Ky., has a small amount that includes nerve-agent munitions. Neutralization work in Kentucky isn’t expected to begin for several more years and likely will last until 2023, officials say.

Farmers ranching near the Pueblo depot, about 15 miles east of the city, worried that the Army’s initial plan to burn the chemical munitions could harm their crops — even if that harm came from proximity and not measurable air pollution. The farmers banded with Pueblo residents and ultimately persuaded the government to switch to the on-site destruction and treatment.

“There were all these ‘what ifs?’ ” said Irene Kornelly, the chairwoman of the Colorado Chemical Demilitarization Citizens’ Advisory Commission.

Pueblo-area residents spent 20 years building trust and collaboration with the Army while trying to help get the weapons destroyed, Kornelly said. Citizen interest in the process waned as the two sides reached compromise and the Army moved forward.

“The longer they stay there, the older they get, the more unstable they get, the more potential there is for something to go wrong,” she said. “I’ve always we’ve told people we are one ‘oops’ away from having all those people coming back to the meetings.”

Today, the Pueblo facility can destroy just six shells a day using an explosives chamber, which is loaded by hand.

But contractors are nearing completion of a significantly larger and partially automated $4.5 billion plant that will process up to 60 shells an hour and run continuously. That plant will open early 2016 and then operate until all the weapons are destroyed in 2019.

The automated plant will process the majority of the munitions by unscrewing their ends, removing the explosives inside, and then flushing out and neutralizing the mustard agent. A small number of shells that have leaked, corroded shut or have been previously opened will be destroyed in the explosive chamber.

So far, workers have destroyed about a dozen 105-millimeter artillery shells and 10 test-sample bottles. And to say the eyes of the world are watching is no exaggeration: Independent observers monitor the video-recorded destruction of each munition as workers hold up a clipboard showing its serial number before loading the explosives chamber.

Plant managers recently gave a USA TODAY reporter a tour of the two facilities.

The larger plant will use robots to handle much of the heavy lifting, since some of the largest shells weigh nearly 100 pounds. Human workers who earn about $28 an hour will move munitions from storage bunkers known as igloos into the processing plant.

That plant will be closed to virtually all public access within the next few weeks, and photography is already highly restricted.

Plant operations manager Kim Jackson said her team shares a sense of pride in knowing they’re doing the right thing in ridding the world of the 2,600 tons of explosive-laden chemical weapons stored a few hundred feet away.

“If we don’t do something, they’ll start corroding in their igloos,” she said.

Jackson supervises the largely automated facility, where about 600 people work. Jackson ran a similar destruction facility in Umatilla Chemical Depot, about 175 miles east of Portland, Ore., and is training her staff to begin operations in early 2016. To keep trainees on their toes, she occasionally spills her coffee on the plant floor deliberately, launching a chemical-containment drill.

Today, Jackson’s plant is filled with mock munitions, allowing workers to practice their movements and protocols. Many of the robotic arms and conveyor systems look like they belong in a normal factory although this one has walls 2 feet thick and every molecule of air leaves through five car-sized air filters.

The mustard agent removed from the shells will be treated in corrosion-resistant titanium tanks before being piped into tanks where bacteria help break down any remaining heavy metals. The treated water gets reused, and the remaining salts will be shipped off site for disposal.

The shells that once contained the mustard agent are heated to 1,000 degrees to sterilize them and then can be recycled like any other steel.

“We really are turning swords into plowshares,” said Schultz, the pilot plant spokesman.

View the original content and more from this author here: http://ift.tt/1PZq9rD


from critical infrastructure alliance http://ift.tt/1QLkGpR
via IFTTT

Income Inequality Is Costing the U.S. on Social Issues

U.S. Steel reports $75 million first quarter loss

Iran’s Revolutionary Guard Detains Cargo Ship Flagged to U.S. Protectorate

The Marshall Islands’ ship Maersk Tigris was reportedly forced from the Strait of Hormuz to Iranian waters.

Less than a week after a convoy of Iranian cargo and military vessels were turned away from the coast of Yemen by a U.S. Navy armada, a cargo ship belonging to a U.S. protectorate and traveling near Iran was fired upon by an Iranian coast guard vessel operating under its elite Revolutionary Guard Corps, forcing the ship to leave an international shipping lane and reroute deep into Iranian waters.

The situation will likely provide additional fodder to those who criticize the White House’s ongoing rapprochement with Iran as naive and dangerous. However, this isn’t the first instance of Iranian sailors’ adventurism on their regional seas.

U.S. Naval Forces Central Command received a distress call from the Maersk Tigris, flagged to the Marshall Islands, early Tuesday morning as it was traveling through the chokepoint of the Strait of Hormuz. Crew members aboard the ship said a patrol vessel with the Iranian Revolutionary Guard Corps Navy made contact at roughly 4 a.m. local time and ordered the Maersk Tigris to redirect toward Larak Island, near the Iranian coast.

The Maersk Tigris crew initially refused, so the Iranian vessel fired multiple shots across the bridge of the cargo ship.

The U.S. Navy has dispatched a yet unspecified aircraft and the USS Farragut, a destroyer sailing nearby, to head toward the region to observe.

No Americans were on board, according to the Department of Defense.

Many key elements of the situation remain unknown early Tuesday, but the incident certainly does not help already tense relations between the U.S. and Iran.

“It is inappropriate,” Pentagon spokesman Army Col. Steve Warren said of Iran’s actions.

American officials have openly blamed the predominantly Shiite nation for meddling in active war zones, including in Iraq and Syria against the Islamic State group, in Lebanon through its alliedHezbollah militant political party, and in Yemen where it is believed to support the Houthi uprising.

A convoy of Iranian cargo ships was heading toward Yemen last week, and was joined by two Iranian warships on Friday. The U.S. Navy deployed the USS Theodore Roosevelt supercarrier, among other vessels, to also sail to the area. Pentagon officials would not say the action was designed to pose a direct affront to Iran, believed to be smuggling weapons or other supplies to the Houthis currently waging war against the government of Yemen. But the Iranian ships turned back toward their home ports on Friday, and as of Tuesday morning had rounded the northeast corner of Oman.

Tuesday’s standoff also comes amid shaky negotiations between the Obama administration and the Iranian government over its nuclear program. Obama did not discuss the incident during a press conference Tuesday afternoon with Japanese Prime Minister Shinzo Abe.

Iran’s state news service, Fars, in a story early Tuesday identified the vessel it engaged as U.S.-owned, citing anonymous “informed sources” who said there may be Americans aboard. The ship was trespassing on Iran’s territorial waters, the report stated, and was seized at the request of Iran’s Ports and Maritime Organization, or IPMO.

An “Iranian warship” was escorting the vessel to the port city of Bandar Abbas.

Top Iranian leaders have not issued any public statements about the incident. A Twitter account believed to reflect the thinking of Ayatollah Khamenei tweeted since the incident began, continuing what is now a string of criticism over police use of force in the U.S. – most recently in Baltimore.

The Pentagon did not have a specific update Tuesday morning on the whereabouts of the Maersk Tigris, or what authority the USS Farragut would have when it arrives nearby.

However, website MarineTraffic.com, which tracks the routes and locations of publicly listed ships,shows the path of the Maersk Tigris up to the Strait of Hormuz, an abrupt shift in course and its current position just off the Iranian coast.

 

View the original content and more from this author here: http://ift.tt/1JPmqJe



from critical infrastructure alliance http://ift.tt/1OFbDZ2
via IFTTT

Troops roll in to Baltimore as Obama urges US to start ‘soul-searching’

Show time: 8 finalists to compete for $100,000 from Steve Case

By RICK SMITH, WRAL TechWire Editor

Steve Case’s “Rise of the Rest” tour is coming to the Triangle on May 5, and eight startups will be making pitches directly to the AOL founder. One of the eight will land $100,000 in financing.

Case starts his day with breakfast at the Governor’s Mansion. Then it’s on to the Triangle startup show.

This just in: Raleigh-based Groundfloor will be pitching Case in Atlanta.

Case has already invested in Triangle startups Mati Energy, Automated Insights and Windsor Circle.

Here are the finalists in the Raleigh-Durham Pitch Competition:

• Tom and Jennys – cavity-preventing, sugar-free candy
• Personalized Learning Games – social and emotional learning platform for K-8 students
• ELXR Health – platform for behavioral patient consent and data exchange
• Archive Social – social media archiving, monitoring, and analytics for legal compliance
• Stealz – social media engagement tool that turns customers into brand ambassadors.
• Reveal Mobile – mobile audience platform that improves mobile ad targeting
• Antenna – platform to react to any content or product on the internet
• RocketBolt – platform for intelligent lead tracking throughout a customer’s experience

The full schedule

Case will have a full day in the Triangle, starting with breakfast at the Go vernor’s Mansion with Gov. Pat McCrory.

Here’s the calendar with times and places:

8:30 AM – 9:00 AM:

Press availability, Governor’s Mansion, 200 N. Blount Street

9:00 AM – 10:30 AM:

Startup Crawl: American Underground (AU) @ Raleigh (213 Fayetteville Street, Raleigh, NC) and HQ Raleigh (310 S Harrington St, Raleigh, NC)

11:30 AM – 12:15 PM:   

Rise of the Rest discussion with Steve Case and college students at Frontier, 800 Park Offices Drive, Durham, NC

12:30 PM – 1:00 PM:

Startup Crawl (continued): American Underground @ Main (201 W Main St, Durham, NC)

1:00 PM – 1:30 PM:

Lunch with companies that Steve Case previously invested in (Mati Energy, Windsor Circle, Automated Insights), American Underground @ Main (201 W Main St, Durham, NC)

2:00 PM – 3:00 PM:            

Fireside Chat with Steve Case (Revolution), moderated by Frank Gruber, Tech Cocktail, Carolina Theatre, 309 W Morgan St, Durham, NC

3:00 PM – 5:00 PM:

Rise of the Rest Pitch Competition, Carolina Theatre, 309 W Morgan St, Durham

Judges: Steve Case (Revolution) Frank Stasio (NPR correspondent) Sarah Yarborough (Raleigh Denim) with more to be announced

5:00 PM – 7:00 PM:

Startup Celebration and Happy Hour to award $100,000 to pitch competition winner, American Underground, 201 W. Main Street, Durham, NC

7:00 PM:     

Steve Case throws first pitch at Durham Bulls game

View the original content and more from this author here http://ift.tt/1zdsR8F



from critical infrastructure alliance http://ift.tt/1AgpCZv
via IFTTT

Study predicts global infosec workforce shortage of 1.5M by 2020

By George Jackson

In April, ISC(2) released their annual report on the global information security workforce. It predicts a perfect storm in cybersecurity — an escalating number of concerns coupled with a huge workforce shortfall.

Dan Waddell, ISC(2)’s director of government affairs for the National Capital Region, discussed trends in cyber with Government Matters from the RSA Conference in San Francisco.

 

View the original content and more from this author here: http://ift.tt/1zdsQSm



from critical infrastructure alliance http://ift.tt/1JANbV7
via IFTTT

Rise of the Rest – Spring 2015 Edition: Pitch Competition Participants Revealed!

By Revolution Team

In just one week, we’ll kick off the third installment of the Rise of the Rest Tour, which will traverse through the Southern U.S. from May 4th-8th. Hot off the presses, we’re excited to briefly introduce the 40 startups who will line up to pitch Steve Case for a chance to win a $100,000 investment. Which promising young startup will rise to the top in Richmond, Raleigh-Durham, Charleston, Atlanta, and New Orleans? Follow our live Road Trip Journal on riseofrest.tumblr.com to find out.

We’re excited to once again be joined by Google for Entrepreneurs and UP Global as presenting partners for the tour, with support from both new and previous tour partners including Salesforce for Startups, Engine, Tech Cocktail, Startup Grind, Village Capital, and Seed Here Studio.

This promises to be one of the liveliest Rise of the Rest tours thus  far – we’ll be joined by public and private sector luminaries like Governors Nikki Haley and Pat McCrory, Senators Mark Warner and Tim Kaine, Sallie Krawcheck, Walter Isaacson, and jazz legend Irvin Mayfield.  And in addition to the startup crawls, fireside chats and pitch competitions that are the hallmark of every Rise of the Rest stop, on this swing we will tour the Atlanta Belt Line to discuss redevelopment, hold the first ever pitch competition aboard a Navy Ship (the USS Yorktown in Charleston), a live pitch fest on a Mardi Gras style float as it travels through the streets of New Orleans with music playing and beers served (for those over 21), a first pitch at a Durham Bulls Game, and a gathering of college students in Research Triangle – to name a few.

Our tour through the Southern U.S. will put new miles on the Rise of the Rest bus, which has already traveled more than 2,000 miles by bus to nine U.S. cities: Detroit, Pittsburgh, Cincinnati, Nashville, Madison, Minneapolis, Des Moines, Kansas City, and St. Louis.  We’ve met incredible startups and visionary leaders in each of these startup ecosystems who understand the important role that all sectors – public and private – play in helping the entrepreneurial economy thrive. And, Steve has personally invested $1 million in great startups along the way.

So, without further ado, we’re excited to share the list of companies who will have the opportunity to join our growing Rise of the Rest portfolio, along with the names of some of the all-star judges who will join us.

MAY 4TH: RICHMOND, VIRGINIA

  • Guest judges include: Steve Case, Revolution, Aneesh Chopra, Hunch Analytics and former Chief Technology Officer of the United States, Ting Xu, Evergreen Enterprises, Aaron Montgomery, Carlotz, Tige Savage, Revolution Ventures, and Eric Edwards, Kaleo.
  • Pitching companies:
    Rockin’ Baby – premium baby carriers and clothing brand
    Marilyn & Michelle – products to help comfort women with breast issues
    Painless 1099 – smart bankling platform to help freelance workers save for and file taxes
    Nutriati – plant-based ingredient nutrition company
    WealthForge – solution to make private placement transactions more efficient
    Luminary – multichannel CRM platform
    Hourwise – on-demand back office support for trades-people
    Vibeats – mobile web platform for dining reservations

MAY 5TH: RALEIGH-DURHAM, NORTH CAROLINA

  • Guest judges include: Steve Case, Revolution, Frank Stasio, NPR correspondent, J.D. Harrison, The Washington Post, Talib Graves-Manns, and Sarah Yarborough, Raleigh Denim
  • Pitching companies:
    Tom and Jennys  – cavity-preventing, sugar-free candy
    Personalized Learning Games – social and emotional learning platform for K-8 students
    ELXR Health – platform for behavioral patient consent and data exchange
    Archive Social – social media archiving, monitoring, and analytics for legal compliance
    Stealz – social media engagement tool that turns customers into brand ambassadors.
    Reveal Mobile – mobile audience platform that improves mobile ad targeting
    Antenna – platform to react to any content or product on the internet
    RocketBolt – platform for intelligent lead tracking throughout a customer’s experience

MAY 6TH: CHARLESTON, SOUTH CAROLINA

  • Guest judges include: Steve Case, Revolution, Eric Bowman, Sparc, Sallie Krawcheck, Elevate Network, Bobby Ocampo, Revolution Ventures, Herbert Drayton III, Vertical Holdings, Bobby Hitt, South Carolina Secretary of Commerce
  • Pitching companies:
    Dynepic – creating a playground for smart toys
    Good Done Great – revolutionizing the way corporations and people give back
    Eatabit – API that prints electronic food orders inside restaurants
    Bidr – platform to help fundraiser’s increase performance
    Charleston Gourmet Burger – unique, all natural gourmet burger seasonings
    OpenAngler – platform to find and book fishing charters
    Bublish – cloud-based tools, metrics and resources for authorpreneurs
    Echovate – replicating top performers through data-science machine learning

MAY 7TH: ATLANTA, GEORGIA

  • Guest judges include: Steve Case, Revolution, Tom Foster, Inc. Magazine, Bridgette Beam, Google, David Cummings, Pardot and Atlanta Tech Village, Paul Judge, Pindrop Security and Monsieur, and David Hall, Revolution Ventures
  • Pitching companies:
    Partpic – visual search technology for replacement parts
    Groundfloor – lending club for real estate
    Cooleaf – employee engagement software for top workplaces
    LocalRoots – mobile marketplace for local farms to sell direct to consumers
    eCredable – leverages alternative credit to connect “no credit” consumers to creditors
    Zyrobotics – provide personalized technology that makes the world accessible to everyone
    Reveal Estate – Turbo Tax-like platform that empowers home buyers and saves them money
    The Village Microfund – helps develop the economic landscape of low-income communities in the US.

MAY 8TH: NEW ORLEANS, LOUISIANA

  • Guest judges include: Steve Case, Revolution, Jean Case, The Case Foundation, Irvin Mayfield, American jazz trumpeter and bandleader, Zach Strief, New Orleans Saints
  • Pitching companies:
    GoToInterview – on-demand video interviewing platform for high-turn industries
    PlantBid – business to business marketplace for the professional horticulture products industry
    WhereY’Art –  marketplace and social network connecting artists/buyers
    Servato – industrial internet of things solution provider
    Get Healthy – software and services powering direct primary care revolution
    Million Dollar Scholar – transforming how schools and parents prepare students to pay for college
    Welcome to College – helps colleges optimize the college visit and enroll optimal fit students
    Community Health TV – multicultural, multi-platform health media company

The tour is part of a national effort to shine a spotlight on one of the most important trends shaping the U.S. economy moving forward: a confluence of factors ranging from technological innovation to public policy reforms that are making it easier for high-growth startups to launch and create jobs in cities and towns nationwide, not just in Silicon Valley. Learn more about the previous winners from the tours HERE

For a full schedule and to RSVP to public events on the Spring 2015 tour, visit RiseoftheRest.com, and follow us on Twitter @RiseOfRest and Instagram.

View the original content and more from this author here: http://ift.tt/1zdsNWH



from critical infrastructure alliance http://ift.tt/1AgpAAE
via IFTTT

Budget Increase: Check — Now how do you build out an effective security program and team?

HP Security StrategistsBy HP Security Strategist Stan Wisseman

The constant stream of security incidents have convinced your executive leadership and Board to take action – they’ve asked you to build out an information security program and provided the funding to do so. Where to start? It’s possible to spend a lot of money on information security enhancements that are ineffective against today’s threats. What are the most important cyber-related risks to address? How can the information security program support the mission of the organization? How can the program get properly resourced?

Baselining against a Framework

A good place to start is by leveraging a cyber-security control framework. Use of a framework isn’t a silver bullet, but it gives you a vetted reference model of best practices to work with. There are several frameworks to consider, including: ISO/IEC 27001:2013, NIST Cyber Security Framework (CSF), and the SANS Critical Security Controls for Effective Cyber Defense. I’ve used ISO 27001/2 as a framework with some success. The difficulty with all ISO standards, in my opinion, is that the revision cycles are long and the standards may not adapt quick enough to the evolving threat landscape. Also, ISO standards can be bloated with excessive wording, long lists, and unnecessary prescriptive text. SANS helpfully prioritizes their list of 20 critical controls to help you focus on what they view as the most effective measures. Some prefer the SANS top 20 due to its practical nature. The NIST CSF leverages existing cybersecurity best practices (ISO 27001, COBIT, ISA 99, etc.) and is divided into five “core functions” with sub-categories. Chart

The CSF was built with the flexibility to add new categories and subcategories as new requirements arise. You can also use more function-specific frameworks like Cigital’s Build Security In Maturity Model(BSIMM) for software security, or HP’s Security Operations Maturity Model (SOMM) for security operations.

Whichever framework(s) you select, it’s a good practice to assess your organization’s current security posture against the framework to establish a baseline capability and identify functional gaps. Don’t get discouraged by the results! We are all on a journey to enhance the maturity of our security control environments. As reflected in a recent post by Brian Krebs, understanding where your organization is on the maturity scale is valuable reference as you develop your program roadmap. You will want to focus on the most impactful enhancements to mitigate gaps and enhance program maturity. As was shown in HP’s 2015 Cyber Risk Report, these could be a combination of dealing with the basics (e.g., secure platform configurations) as well as more advanced capabilities (e.g, user behavioral analytics). I recommend development of a multi-year roadmap that aligns with overall organization goals and manages InfoSec risks within the risk appetite of the organization. Now you’ve got to resource the plan.

Developing a Cybersecurity Workforce

Resourcing, however, is the next challenge – developing a workforce with the abilities to execute the roadmap. It’s difficult to find individuals with a balance of technical skills and necessary soft skills to constructively engage with business partners. I recommend a competency-based talent approach rather than one solely based on experience or certifications (the NICCS National Cybersecurity Workforce Framework is a useful reference). You also need to be open minded when recruiting given the demand for cybersecurity skilled professionals has outstripped supply in the US with an estimated 209K jobs going unfilled. You may need to develop from within through professional development programs, or consider outsourcing some functions.

Once you’ve captured your workforce requirements, you can determine which roles are better filled by employees or which can be provided by external parties. In certain cases, outsourcing cyber security functions provide benefits which include lower costs, additional expertise, operational efficiencies and lower burden on management. For small to medium businesses, outsourcing makes it possible to have many of the same capabilities as larger organizations, but at a lower cost than building the capability in house.

It is critical that you have a flexible and well-rounded team, whether they are in-sourced, outsourced, or a hybrid. A great analogy is NASA’s Mission Control Center (MCC). The MCC has an integrated team of flight controllers certified in particular disciplines such as electrical power, thermal control, trajectory, payload, or medical. All of them have a general understanding of the mission parameters but each team member has a unique knowledge. If a mission incident does occur, combining their collective wisdom, a comprehensive and effective plan can be developed (think of the MCC of Apollo 13). NASA

Likewise, you need a battle hardened team composed of SME’s in various domains (e.g., software security, network defense, cyber operations, digital forensics) and they should be well versed in their respective domains.  Most importantly, you need to see how the whole program hangs together in order to create a “mission plan” as well as a team that effectively responds when there is a newly discovered vulnerability, breach or attack.

Learn more about HP Enterprise Security.

View the original content and more from this author here: http://ift.tt/1bb9fXp



from critical infrastructure alliance http://ift.tt/1JANajZ
via IFTTT

Tuesday 28 April 2015

Containerships In A Bottle Neck?

The recent congestion problems at US West Coast ports have captivated observers of the liner industry, and many others. At times during February and March the containership capacity delayed outside the five largest US West Coast ports reached over 0.2m TEU. These delays have led to a number of cargo diversions away from the West Coast, and a wider impact on the boxship sector.

 

Increasing boxship delays outside US West Coast ports were reported from late 2014. Data indicates that in mid-February 33 boxships of around 0.22m TEU 2015-04-27_upload_2515531_CIM1504were at anchor outside the top five US West Coast ports of Los Angeles, Long Beach, Oakland, Seattle and Tacoma. This was equivalent to 1.2% of the containership fleet as of the start of February. The majority of these delays occurred outside the LA-Long Beach port complex, where some vessels were reportedly at anchor for up to 14 days. Largely as a result of this congestion, throughput at the major West Coast ports contracted in early 2015, falling by 19% y-o-y in the first two months (see inset graph).

Handling The Boxes

The expiry in June 2014 of labour contracts for longshoremen of the ILWU was a key reason behind the delays on the US West Coast. The Pacific Maritime Association (PMA), responsible for negotiating new contracts with the ILWU, blamed the union for labour slowdowns and shortages during a nine month period in which no agreement was reached. US ports were subject to rising cargo pressure in 2014, partly as a result of robust growth of around 6% on the eastbound Transpacific trade. Moreover, the ports were also handling larger boxships in 2014; the average size of vessel deployed on the Transpacific route had risen 12% y-o-y by start April 2015, to 6,038 TEU, as larger vessels have been used by the leading operators on the trade. These factors led to a rising, spiky flow of box volumes into US ports, exerting increasing pressures upon port facilities.

Congestion Easing?

Delays eased once a tentative agreement was reached between the PMA and ILWU at the end of February. On the US West Coast, boxship capacity was only understood to be at anchor outside LA-Long Beach by early April, albeit still over 70,000 TEU. However, there have been signs of strain on the US East Coast, with throughput growing 10% y-o-y at the top five US East Coast ports in January, partly in response to cargo diversions from the West Coast. Both NY-New Jersey and Virginia were reportedly operating with delays and cargo backlogs in early April, as bottlenecks moved location.

Further Delays Ahead?

So, though congestion now looks to have eased on the US West Coast, there have been reports of delays elsewhere. The increased operation of very large containerships is set to increase the pressures on container terminals. Combined with concerns that port capacity has been an under-invested part of the sector in recent years, it means that congestion issues may well pop up around the globe on a more regular basis going forward. Given the ability of such problems in the system to soak up substantial capacity, this could have a wider, supportive impact on the box shipping markets.

Source: Clarksons

 

View the original content and more from this author here: http://ift.tt/1bQx6Nw



from critical infrastructure alliance http://ift.tt/1bQx6Nx
via IFTTT

ILWU to idle Bay Area ports to protest police killing of African Americans

International Longshore and Warehouse Union Local 10 in the Bay area will use its monthly stop-work meeting on Friday to idle the ports of Oakland and San Francisco to protest recent police killings of African Americans.

The executive board and membership of Local 10 aligned its “Union Action to Stop Police Killings of Black and Brown People” with International Workers’ Day, which is celebrated on May 1 in many countries.

Port of Oakland spokesman Mike Zampa confirmed there will be no vessel, yard or gate operations on Friday’s first shift. Vessel loading and unloading are scheduled to resume on the second shift Friday. Port customers and vendors have been notified, and the temporary suspension of cargo-handling activities isn’t expected to have a lasting effect on port operations, Zampa said.

ILWU locals are allowed to have one stop-work meeting each month to discuss union matters. Local 10’s meeting had been scheduled for the evening shift on Thursday. Local 10 proposed to employers, represented by the Pacific Maritime Association, that the stop-work meeting be held instead on Friday’s day shift as part of May Day activities in the Bay Area that will include a march and rally at Oakland City Hall. The PMA did not object.

Local 10 is expressing outrage at police killings of persons of color, including recent incidents in Ferguson, Missouri; New York; and Charleston, South Carolina.

Contact Bill Mongelluzzo at bmongelluzzo@joc.com

View the original content and more from this author here: http://ift.tt/1Gt6NV9



from critical infrastructure alliance http://ift.tt/1za12hz
via IFTTT

US drought takes its toll on clean energy production

Climate change, cyberattacks are growing threats to grid, says US energy chief

US energy infrastructure is outdated and increasingly vulnerable to threats, US Energy Secretary Ernest Moniz told reporters at a Monitor-hosted breakfast in Washington.

US energy infrastructure is vast, aging, and in need of an overhaul, Energy Secretary Ernest Moniz says, and the biggest challenges are the most unpredictable: climate change and cyberattacks.

Staggering in size, the US energy system includes 2.6 million miles of pipeline and 6.3 million miles of electrical distribution lines. There are 414 natural gas storage facilities and 330 ports handling crude and petroleum products, plus 140,000 miles of railway carrying crude and more from well to refinery – and that’s only a small sample of the transmission, distribution, and storage systems that power the US.

But all of that infrastructure is vulnerable to growing threats, Sec. Moniz said Monday at a Monitor-hosted breakfast for reporters in Washington.

“I’m not going to single out one [threat] because we’ve got to address them all,” Moniz said. But looking ahead, he added, “I think the two that almost certainly will increase in risk level are cyber and extreme weather” made worse by climate change.

Last week, Moniz rolled out his department’s Quadrennial Energy Review (QER), identifying weaknesses in US energy infrastructure – from inadequate natural gas distribution pipelines to an outdated electric systems.

The electric grid, the report found, is especially vulnerable.

“Threats to the grid – ranging from geomagnetic storms that can knock out crucial transformers; to terrorist attacks on transmission lines and substations; to more flooding, faster sea-level rise, and increasingly powerful storms from global climate change – have been growing even as society’s dependence on the grid has increased,” according to the report.

 

 

View the original content and more from this author here: http://ift.tt/1JLKJYH



from critical infrastructure alliance http://ift.tt/1Oz3FQY
via IFTTT

Darktrace’s new Industrial Immune System to protect industrial sites like power stations

Cyber security firm Darktrace has launched a new product to defend industrial sites from online threats.

The Cambridge-based company has unveiled its Industrial Immune System, a new product capable of detecting emerging cyber-threats within Industrial Control Systems (ICS). Applying Darktrace’s machine learning and mathematics to both operational technology (OT) and corporate environments for the first time, the system can detect cyber-attackers and subtle insider threats in real time.

Industrial Control System are relied on by power stations, factories and other parts of critical infrastructure to manage key processes. They are increasingly being targeted by advanced hackers and exposed to vulnerabilities that originate in the corporate network.

Darktrace says Industrial Immune System represents a major innovation for critical infrastructure providers, giving them a holistic, visual overview of their production environments and alerting them to potential threats, before they develop into full-blown cyber-attacks. Powered by Enterprise Immune System technology developed at Cambridge University, Darktrace has specially adapted its innovative mathematical models to ICS data, forming an adaptive ‘pattern of life’ for the machines, networks and users within these environments, which is used to spot previously unidentified anomalies, in real time.

“We are very excited to extend our industry-leading Enterprise Immune System technology to the critical field of Industrial Control Systems,” said Nicole Eagan, CEO of Darktrace.

“By studying the behaviour of the control system itself, not the industrial process that it manages, we can provide increased confidence that the control system in functioning as intended. The Industrial Immune System’s fundamental ability to detect previously-unidentified cyber threats within operational technology systems is a world-first, helping operators meaningfully improve the resilience of critical infrastructure, and the safety of the people that work in these environments.”

The Industrial Immune System is available as part of Darktrace’s flagship Enterprise Immune System, and has already been rolled out at the European energy leader Drax. Following the successful implementation of Darktrace’s self-learning appliance within its corporate IT network, Drax chose to extend threat visibility into their OT systems too, using the Industrial Immune System to continuously monitor behaviours and alert security operators to any suspicious or abnormal activity.

“Nothing is fool-proof in the modern-day challenge of cyber security, especially when it comes to protecting complex systems. Darktrace has transformed our ability to preempt threats, by shining a light into our production environments and helping us focus our investigations,” said Peter Emery, Group Operations Director at Drax. “With Darktrace, we now have visibility of both our corporate and production environments, enhancing our ability to anticipate potential issues early, wherever they originate.”

 

 

For more information about Darktrace’s Industrial Immune System, visit http://ift.tt/1JNIa8m;

View the original content and more from this author here: http://ift.tt/1HT7PiL

 

 



from critical infrastructure alliance http://ift.tt/1JNIa8o
via IFTTT

Monday 27 April 2015

Top 100 U.S. Oil and Gas Fields

Both crude oil and natural gas reserves in the United States increased in 2013, according to a new report from the U.S. Energy Information Administration (EIA). This report also included the first update of the EIA’s “Top 100 U.S. Oil and Gas Fields” list since 2009.

All told, the top 100 oil fields in the United States contained an estimated 20.6 billion barrels (56%) of crude oil and lease condensate in proved reserves in 2013. For natural gas, the top 100 fields represented 239.7 trillion cubic feet (68%) of natural gas proved reserves. According to the EIA, there were several particularly important changes in the updated rankings. Specifically:

“…oil fields in the Eagle Ford and Bakken shale plays and natural gas fields in the Marcellus Shale have become significant contributors to total U.S. reserves. Fields in the Marcellus and Eagle Ford plays appear at the top of the list in their respective categories, whereas in 2009 the Marcellus fields were ranked in the bottom half of the list, and Eagle Ford fields (discovered in 2008) did not appear in the top 100. Alaska’s Prudhoe Bay, previously the oil field with the largest amount of reserves, fell to third, behind fields in the Eagle Ford and Permian Basin.”

Furthermore, the definition of “proved reserves” brings in a dependence on economic conditions (i.e. market prices and operating costs) that can result in significant variations in reserve values over time. The EIA defines proved reserves as “estimated quantities of oil and natural gas that analysis of geologic and engineering data demonstrates with reasonable certainty are recoverable under existing economic and operating conditions.” Therefore, while the estimated total amount of crude oil or natural gas in the ground might remain constant, the proved reserves could vary year to year.

To give an example from the EIA’s analysis:

“The Securities and Exchange Commission (SEC) requires companies to assess proved reserves based on the average of the prices of a crude benchmark on the first day of each month for the year. Using, for example, front-month West Texas Intermediate (WTI) futures closing prices for the first trading day in each month of 2013, this value was $97.28 per barrel (bbl) for 2013. The comparable value for 2014, for which EIA is now collecting proved reserves data from operators, was slightly lower at $94.42/bbl.”

Photo Credit: U.S. Energy Information Administration (2015)

About the Author: An engineer and researcher who works at the intersection of energy, environment, technology, and policy. Follow on Twitter @mclott.
View the original content and more from this author here : http://ift.tt/1zd3fco


from critical infrastructure alliance http://ift.tt/1EKxt8S
via IFTTT

ISIL’s sophisticated recruiting campaign poses persistent threat in U.S.

WASHINGTON — A recent string of terror-related cases in the U.S., including the the arrests of six Minnesota men accused earlier this month of attempting to join the Islamic State, highlights an unprecedented marketing effort being waged by ISIL, U.S. law enforcement officials and terror analysts said.

It’s a campaign that is finding resonance from urban metros to the American heartland,

“This is not so much a recruitment effort as it is a global marketing campaign, beyond anything that al-Qaeda has ever done,” a senior law enforcement official with knowledge of the matter said Thursday.

The official, who is not authorized to comment publicly, said the Islamic State’s slick multimedia productions, its use of social media and personal “peer-to-peer” communication are proving to be effective parts of a sophisticated program aimed at the West.

“I don’t think there has been one case in which we haven’t found some connection to the videos or other media the group has produced,” the official said.

Federal authorities have identified more than 150 U.S. residents who have sought to join the ranks of the terror organization or rival groups in Syria. There is evidence that about 40 of those have traveled to the region and returned to the U.S. Most have been charged; an undisclosed number are free and subjects of intense surveillance, the senior official said. The smallest subset of the group, an estimated dozen, represents those who have actually joined the fighting ranks.

But the official said that the breadth of the ongoing inquiries suggests that the actual numbers of ISIL sympathizers, or those contemplating travel to join the group and other rival organizations, are likely much higher.

The threat posed by aspiring foreign fighters has been a blinking red light within the nation’s counterterrorism network for months. But the flurry of new cases suggests a persistent problem for law enforcement officials who fear that some of the recruits could launch attacks against U.S. targets when they return home or will be inspired to lash out on their own.

They are young women and men who are “responding to the call to join violent jihad abroad at an alarming rate,” Assistant Attorney General John Carlin, chief of the Justice Department’s National Security Division, told a homeland security summit last weekend. He said that the federal government has brought 35 such cases involving aspiring foreign fighters, many of whom have been arrested before leaving the country

FBI Director James Comey also has expressed serious concern, saying ISIL and similar terror-support inquiries are ongoing in each of the bureau’s 56 field divisions across the country.

Varied nature of threat

A series of criminal cases filed in the past month highlight the varied nature of the threat facing the U.S., and ISIL’s aggressive pursuit of U.S.-based and other converts.

In the most recent Minnesota case involving six young suspects, all intercepted by authorities before their planned travel to Syria, U.S. Attorney Andrew Luger said ISIL demonstrated a powerful recruiting tool that it is difficult to counter.

Luger described a so-called “peer-to-peer” or “brother-to-brother” campaign in which the close group of suspects engaged in the radicalization of each other, providing encouragement during each phase of a nearly year-long mission to reach Syria.

At the same time, the group also was getting support directly from the battlefield. Abdi Nur, a former associate of the Minnesota suspects, slipped past authorities last May and is believed to be in Syria with the terror group.

Since Nur reached Syria, Luger asserted that the suspected terror operative has been serving as the chief “foreign fighter recruiter” for his former associates in Minneapolis.

Michael Leiter, former director of the U.S. Counterterrorism Center, said ISIL’s recruiting strategy — its personal outreach efforts, application of slick YouTube productions and other social media — represents an unmatched level of sophistication demonstrated by terror organizations in the aftermath of 9/11.

“Al-Qaeda in Pakistan represented Version 1.0, with its static video of (Osama) bin-Laden’s face. Al-Qaeda in the Arabian Peninsula became Version 2.0, with (American cleric) Anwar al-Awlaki using graphics and the online magazine Inspire to reach potential English-speaking converts. Think of ISIL as Version 3.0.”

While officials believe that the U.S. will never produce the volume of recruits being drawn from Western Europe, where a disaffected Muslim population and a lack of integration has helped contribute thousands of foreign fighters to ISIL’s cause, Leiter and others said the U.S. nevertheless remains an important focus.

“The image that there is a pipeline of soldiers for ISIL running out of the U.S. is a powerful one,” said Bruce Hoffman, a longtime terrorism analyst and director ofGeorgetown University’s Center for Peace and Security Studies program. “That’s why you are seeing such a full-court press (from ISIL).”

Hoffman said the FBI and government’s intelligence apparatus has devoted immense resources to counter the recruiting effort. But he said ISIL’s multifaceted outreach and leveraging of social media is threatening to “outpace the government’s capabilities across the intelligence community.”

“It’s like the Dutch boy sticking his fingers in the dike,” Hoffman said.

Terror sympathizer back in the U.S.

Among the most striking of the recent foreign fighter cases brought by federal prosecutors involves Abdirahman Sheik Mohamud.

The 23-year-old Columbus, Ohio, man, charged last week, returned from Syria last year. While there, he allegedly joined his brother, Abdifatah Aden, and received some training in a camp operated by the Al-Nusrah Front, an affiliate of al-Qaeda and rival of ISIL. Following Aden’s death last June, Mohamud returned to the U.S. and began discussing an unspecified attack against the homeland.

Although the outlines of the plot remain under investigation, Mohamud’s alleged interest in such an attack strikes at the heart of a long-held fear by U.S. authorities: a terror sympathizer back in the U.S., searching for a target.

According to court documents, Mohamud “talked about doing something big in the United States.”

In conversations with one government informant who believed the suspect was attempting to recruit him for a U.S.-based attack, Mohamud “wanted to go to a military base in Texas and kill three or four American soldiers execution-style.”

The senior law enforcement official, who is familiar with Mohamud’s case, said that such suspects who have demonstrated a greater commitment by traveling to the region and returning are generally “graded higher” as possible threats. The official cautioned that investigators are still gathering information on the extent of Mohamud’s activities.

“We have very little patience for letting subjects plan, mature and develop,” the official said, adding that the suspects’ planning and known travel activities are dictating the timing of recent arrests across the country.

Mohamud has pleaded not guilty. His attorney, Sam Shamansky, declined comment.

Hoffman said Mohamud’s alleged designs on a potential U.S. target, as described in court documents, were “too opaque” to assess as a credible threat.

“I want to know a lot more. … The good news is that we’re catching them, but that may be just the tip of larger problem.”

 

View the original content and more from this author here: http://ift.tt/1z9YMaj



from critical infrastructure alliance http://ift.tt/1Gz3C0r
via IFTTT