Monday 31 August 2015

CORRECTED-Indonesia favouring China over Japan in railway bid – govt sources

Aug 31 (Reuters) – Indonesia is leaning towards China over Japan in an aggressive bidding battle to build the Southeast Asian nation’s first high-speed railway, two government sources involved in making the decision said.

The two Asian giants have both sent envoys to lobby Indonesian officials over the past two weeks, each sweetening the terms of their bid for the contract worth about $5 billion.

Analysts believe that whoever wins will likely become the front runner for other high-speed rail projects coming up in Asia over the coming years, including one linking Kuala Lumpur and Singapore.

A cabinet-level committee led by chief economic minister Darmin Nasution will meet on Monday to make its recommendation on which country should build the rail line between the capital, Jakarta, and textile hub of Bandung.

President Joko Widodo is expected to announce the winner within days.

“Indonesia is leaning towards China because their proposal is less financially burdensome on the Indonesian government and because the issue of safety has been adequately addressed,” a government source told Reuters.

A second government source said Indonesia wanted to strike a balance between the two powers in handing out high-profile infrastructure projects. Japan already holds contracts to build Jakarta’s mass rapid transit system and the biggest coal-fired power plant in the region.

Both sources declined to be identified due to the diplomatic sensitivity of the issue for Jakarta and the economic stakes. Japan is Indonesia’s second-largest investor, while China is its top trading partner.

“We have two partners and it will be good if we can maintain both of them. We have to be smart when taking this decision,” Luky Eko Wuryanto, Indonesia’s deputy minister of infrastructure and regional development, told Reuters last Friday after meeting China’s ambassador to Indonesia.

ENVOYS

The 150-km (94-mile) rail line should to cut the journey between Jakarta and Bandung to 35 minutes, from about three hours. Trains are expected to reach speeds of more than 300 km (188 miles) per hour.

Indonesia hopes to extend the line later to connect Jakarta with the city of Surabaya.

Japanese Prime Minister Shinzo Abe last week sent an envoy to offer a more attractive deal ahead of Monday’s deadline, which was Japan’s second revision in two weeks.

Japan’s late manoeuvring brought protests from China, which said it was unfair Japan had been allowed to submit a new offer so close to the deadline, a minister said.

China had sweetened its offer earlier in August.

Japan initially believed it had won the contract after completing a more than $3 million feasibility study, but in March Widodo invited other offers in order to get the best deal.

China is offering a 73.92 trillion rupiah ($5.27 billion) loan with a 50-year tenure and an interest rate of 2 percent in U.S. dollars.

Japan is offering a 60.14 trillion rupiah repayable over 40 years at an interest rate of 0.1 percent in yen, with a 10-year grace period.

Its latest proposal also offers Japanese guarantees on financing and increases the percentage of local content. (Additional reporting by Gayatri Suroyo; Writing by Randy Fabi; Editing by John Chalmers, Robert Birsel)

View the original content and more from this author here: http://ift.tt/1hOaQGN



from critical infrastructure alliance http://ift.tt/1Q32mH0
via IFTTT

Europe to Fund Balkan Transport, Energy Projects

Following the Vienna summit, the Western Balkans has been promised 200 million euro in co-financing for 10 transport and energy projects, to improve growth and energy security

After the Western Balkans summit, which took place in Vienna on August 27, it has been announced that European institutions will grant around 200 million euro for 10 transport and energy infrastructure projects in six Western Balkans countries.

The total value of the agreed projects is around 600 million euro and they are to be conducted in Serbia, Montenegro, Macedonia, Albania, Kosovo and Bosnia.

The projects will be co-financed under the 2015 Instrument for Pre-Accession programme, IPA, and Western Balkans Investments Framework and by European financial institutions such as the European Investment Bank, European Bank for Reconstruction and Development, EBRD, and the German government-owned development bank, KfW.

The Western Balkans Investments Framework was developed jointly with the European Commission, the EBRD and the Council of Europe development bank, as well as by EU member states and Western Balkan countries themselves.

Among the projects to be developed with EU financial help are the Albania-Macedonia power interconnection and the grid section of Trans-Balkan Electricity Corridor in Montenegro and Serbia.

Twenty-four different other infrastructure projects were confirmed as of great importance for the region.

Completion of these projects should stimulate GDP growth by 1 per cent in each Western Balkan country and create around 200,000 new jobs in total, Serbian media reported.

Among the so-called “pre-identified” projects are the highway from Nis in Serbia to the Albanian coastal city of Durres through to the Kosovo capital of Pristina and the highway from Croatia to the Greek border via Montenegro and Albania.

The EU will also co-finance the Bosnia-Croatia road interconnection on the Mediterranean corridor as well as the rail interconnection between Serbia and Macedonia.

Western Balkans officials voiced satisfaction with the offer.

Milo Djukanovic, the Montenegrin Prime Minister, said his country stood to get 45 million euro from the EU for improving rail transport and electric transmission.

He said that without economic support from European institutions, the Western Balkans could not truly develop and provide a better life for its citizens.

“I consider this a very valuable contribution of the EU to the further improvement of transport and railway infrastructure,” Djukanovic said.

Mijat Lakicevic, a Belgrade-based economist, said it was a good news that the EU will co-finance some projects since regional transport infrastructure is worse now than it was 20 or 30 years ago. “Infrastructure is a precondition for development,” Lakicevic told BIRN.

On the other hand, he warned that 200 million euro was not enough to go round the entire region.

“We also have a problem with the quality of proposed projects and the region is already faced with unsuccessful and unfinished projects,” Lakicevic said.

The summit in Vienna is a part of the Berlin Process, a five-year process started last August and marked by yearly summits in order to underline the EU’s commitment to enlargement.

The focus of the initiative is on the six Balkan countries that are not yet EU members: Albania, Bosnia, Kosovo, Macedonia, Montenegro and Serbia. The next summit is scheduled for France next year.

View the original content and more from this author here: http://ift.tt/1hqMt14



from critical infrastructure alliance http://ift.tt/1EsCpiM
via IFTTT

Gammon Infra to divest nine projects

Gammon Infrastructure Projects is an infrastructure project development company incorporated by Gammon India, to participate in the development of infrastructure projects on a public private partnership (PPP) basis.

Ltd, Mumbai Nasik Expressway Ltd, Vijayawada Gundu Golanu Road Project Ltd, Pravara Renewable Energy Ltd, Sikkim Hydropower Ventures Ltd and Aparna Infraenergy India Pvt. Ltd. Brookfield had come in as one of the two anchor investors along with Sumitomo Mitsui Banking Corporation two years in the first close of the fund. Kotak PE is yet to announce a final closure of the $250 million fund.

Gammon India has sold nine Indian project companies of Gammon Infrastructure Projects to a subsidiary of US asset management giant Brookfield Asset Management for a cash value of around Rs 563 crore of cash, reported Mint.

Among key terms of transaction, the company said the consideration towards equity comprises cash consideration of approximately Rs192 crore and an advance waiver of Rs285 crore.

Aggregate cash inflows for GIPL on account of divestment would be approx. Rs. Indeed, infrastructure focused funds were the top net investor among all alternate investment funds registered with securities market regulator SEBI in the second quarter of the year ended June 30, 2015.

The outstanding debt as on March 31, 2015 for these projects was Rs 1,718 crore and the net exposure of GIPL in the asset basket was Rs 415 crore.

Parent company Gammon India, which had a standalone debt of Rs.5,185.6 crore as on 31 March, entered into corporate debt restructuring (CDR) led by its lenders in September 2013.

Abhijit Rajan, CMD, Gammon Group said, “The transaction involving nine projects represents the largest asset sale at one go in the Indian infrastructure industry”.

Gammon managing director Kishor Kumar Mohanty meanwhile said that the transaction “allows us to get capital released from completed projects and improve financial position to explore new opportunities in the infrastructure space arising out of government’s new initiatives”.

http://ift.tt/1UhgGSj



from critical infrastructure alliance http://ift.tt/1KWGfhb
via IFTTT

inal bids due in September for Vilnius Police Infrastructure PPP

Vilnius County Police Headquarters has announced that the due date for best and final offers (BAFOs) regarding the Vilnius Police Infrastructure Public Private Partnership (PPP) project is September 10, 2015, reports BC chief project manager for PPP Irmantas Butkauskas.

The authorities expect to receive BAFOs from all three bidders that took part in the competitive dialogue phase, namely:

Areko, a subsidiary of the real estate investment and development companyHanner,

Pilies projektai, a subsidiary of the Lithuanian real estate development companyMG Valda, and

Partnerystes projektai, a subsidiary of the real estate company EIKA, who develop residential, commercial, and other properties for individual and as complexes.

The successful bidder is expected to be announced between October and November 2015, with contract signing and financial close due to be completed by the end of 2015.

The project is one of pilot “design build finance maintain” (DBFM) projects in Lithuania to be implemented under the country’s PPP scheme. The 18 year PPP contract will involve the provision of new Police Custody and Police Station facilities in Vilnius, and will facilitate improved performance in various police functions in Vilnius. The construction of the facilities will take up to three years. Once construction is complete, regular maintenance of the infrastructure will be carried out for a further 15 years to ensure the proper functioning and effectiveness of the facilities, and their compliance with the required standards.

According to Mr Tadas Jagminas, director of the Project Management Department of Invest Lithuania, the successful implementation of this pilot PPP project could facilitate further PPP projects in Lithuania.

“The successful implementation of the Vilnius Police Infrastructure PPP project will give us valuable experience which will further strengthen PPP implementation in Lithuania. Lithuania sees PPP projects as a way to stimulate the economy and deliver the investments needed to close the infrastructure gap. Up to 5 other potential projects for social infrastructure have been identified and potential local and foreign investors are showing interest in these projects.”

View the original content and more from this author here: http://ift.tt/1UhgJh0



from critical infrastructure alliance http://ift.tt/1LNqoXO
via IFTTT

Wake up call for much greater scrutiny of future private/public sector infrastructure projects

The reluctance of the BCCI to accept the toll reduction proposed by Government in the 2015 budget which was to take effect by September 1, 2015 is indeed troubling and while I do agree that consultations could have been held with BBCI about the proposed lowering of tolls through a government subsidy prior to the budget presentation this issue raises the following concerns:

(1) The BBCI stance is a wakeup call for much greater scrutiny of any future private/public sector infrastructure projects. Private interests and profits should never be the deciding factor in determining access of the citizens of Guyana to travel freely and conduct their business in a manner that is not a financial burden to them.

(2) The high cost of the BBCI bridge toll may well be one of the most compelling reasons for the lack of revenue and profits. However, responsibility for this has to be laid at the feet of the company and those who negotiated such a deal.

(3) We know that due to the high costs of the Berbice Bridge toll many citizens opt to use other means of travelling to and from Berbice thereby leaking revenues for the BBCI.

(4) The Berbice Bridge toll has been an unequal and in effect discriminatory burden to the residents of Region 6 and one which falls much more heavily on vulnerable and poor families already finding it very difficult to make ends meet.

(5) If the impasse on this matter continues and no solution is in sight for the burdened citizens of Region 6 and others then bring back an improved ferry service.

(6) Lastly and more importantly the rights of citizens including the constitutional rights of Guyanese must never be held ransom to profit making deals which bargains away rights, access of movement and travel for Guyanese citizens.

View the original content and more from this author here: http://ift.tt/1IygJNm



from critical infrastructure alliance http://ift.tt/1KWGecY
via IFTTT

Saturday 29 August 2015

New Report Identifies Tech as infrastructure’s tipping point

The innovative power of 3D printing, commercial drones, self-driving vehicles, electricity storage, and the Internet of Things are pushing the North American infrastructure market toward a tipping point, according to the latest study by the nation’s preeminent infrastructure advisory firm.

CG/LA Infrastructure’s Building Prosperity: 2015 Strategic 100 North American Infrastructure Report identifies those strategic projects, all incorporating transformative technologies to unleash $376 billion in infrastructure opportunities over the next 18 months.

“Advanced technologies promise a transformation in the marketplace that will propel revolutionary new undertakings and modernize legacy projects in highways, bridges, rail, the power grid, and urban mobility,” CG/LA Infrastructure President and CEO Norman Anderson said. “Our challenge as an industry is to create a new market framework, creating better projects, faster approvals, and channeling great ideas into prosperity driving reality.”

The Strategic 100 by Region. The Gateway Project – the critical tunnel between New York and New Jersey – was ranked number one for 2015, a project crucial to the prosperity of the New York region. On a regional basis: New England had eight projects, valued at $28.5 billion; the Mid Atlantic had 17 projects, valued at $43.8 billion; the South/Southeast had 24 projects, valued at $39.1 billion; the Midwest had 5 projects, valued at $20.3 billion; and the West had 26 projects, valued at $163.6 billion. Canada had 12 projects on the list, collectively valued at $61.2 billion and Mexico had 8 projects, valued at $19.9 billion.

The Strategic 100 Rating System. In addition to technology, the Strategic 100 projects were ranked by CG/LA’s proprietary model, which scored projects according to the following criteria:

·       Competitiveness – How does this project align with a region or state’s economic needs?

·       Productivity – How does this project add value to a community by enabling improved economic         productivity?

·       Sustainability – Does this project enable a city to operate more sustainably? 

·       Business Opportunity – Does this project have a business opportunity in the next 3-12                       months?

·       Job Creation – What is the projected impact on creation of jobs on the local economy?

The Strategic 100 comes on the heels of CG/LA’s Blueprint 2025 initiative launchan 18-month, 100-nameplate initiative for U.S. CEOs to craft an infrastructure plan for the administration that will take office on January 20, 2017. Blueprint 2025 aims to raise infrastructure to a priority level on par with national security while generating long-term, bipartisan support through at least the next three election cycles.

CG/LA’s upcoming 7th North American Infrastructure Leadership Forum in Washington, DC is a highly selective gathering of more than 500 C-level executives representing technology firms, engineers, construction principals and investors who represent the private and public sectors, and project sponsors from throughout North America.

View the original content and more from this author here: http://ift.tt/1UcyBcA



from critical infrastructure alliance http://ift.tt/1JoASHo
via IFTTT

Infrastructure devt will solve youth unemployment – President

TORORO – President Yoweri Museveni has said that the National Resistance Movement has prioritized and will continue to allocate reasonable resources to the development of the country’s infrastructure projects such as roads, electricity generation, the railway network which form the backbone to the country’s economic development.

The President was Friday addressing a mammoth crowd at Tororo Municipality Grounds where he officiated at the commissioning of the Mbale-Tororo 48km road that was rehabilitated at a cost of sh63.8b. It was funded by the government of Uganda from locally generated revenue.

President Museveni waves to crowds at Tororo Municipality Grounds where he officiated at the commissioning of the Mbale-Tororo 48km road. PHOTO/PPU

The President called for consensus between government and the citizens especially the civil servants on what Uganda’s development priorities are and focus on them.

He said that as the country faces unemployment problem, government is focusing on ways of reducing the cost of doing business so as to attract increased investment in the country that will in turn create more jobs and contribute to the country’s economic development.
President Museveni addresses crowds at Tororo Municipality Grounds where he officiated at the commissioning of the Mbale-Tororo 48km road. PHOTO/PPU

Museveni however expressed concern that as government focuses on infrastructural development so as to reduce the cost of doing business and be competitive in the region, Ugandans especially civil servants, continue to demand for immediate salary increment which if effected would affect the implementation of crucial infrastructural programs.

“We have to agree on national priorities, we can’t attract industries without peace, roads, the railway and electricity. And we can’t get them without investing heavily and yet we can’t invest heavily in priority areas when civil servant are demanding immediate salary increment” the President said.

The President said they increased the Works Ministry budget from sh300b a few years ago to sh3trillion this financial year which accounts for the improved road net work in the country.

“This road and many other roads which are being constructed are a clear testimony of the National Resistance Movement strategy that focuses on development rather than consumption and you can see that it works,” he said.
President Museveni holds a shield and spear given to him by Tororo elders. PHOTO/PPU

Museveni said that in addition to improving the road network, government has finalized plans to construct the standard gauge railway that will further ease transport in the country.

He announced that government is due to tarmac Mbale-Bubulo-Lwakhakha road, Tirinyi-Palisa-Kumi-Kamonkoli road and Tororo Busia road. Others to be upgraded are Nabumali-Butaleja-Namutumba road, Bubulo-Bududa circular road, Magale-Bumbo-Lwakhakha road and Tororo-Nagongela-Busolwe road.

Mr. Museveni emphasized that the solution to unemployment in Uganda is in industrialization.

“Tororo cement factory alone employs 800 workers, what would happen if we had more such factories? Most Ugandans go to Japan and work in factories because Japan has many factories. There is scarcity of labor in the country,” he said.

The President appealed to Ugandans to work and overcome poverty by making good use of the government programs aimed at eliminating poverty. He urged the youth to safe guard their lives from HIV/Aids by avoiding promiscuity and other negative vices such alcoholism and substance abuse.

He appealed to Ugandans to embrace and support the National Resistance Movement so as to cement the gains the country has realized since 1986.

The Executive Director of the Uganda National Road Authority (UNRA) Mrs. Allen Kagina said that the authority is committed to improving the road network in the country and asked the population to take advantage of the improved roads to increase production and better their lives.

She appealed to communities to protect the road assets especially the road signs by reporting thieves to UNRA and the Police. She also cautioned the transporters from overloading that damages the road and reduces its life span.

View the original content and more from this author here: http://ift.tt/1NFjYdC



from critical infrastructure alliance http://ift.tt/1NFjXXa
via IFTTT

Trout Creek Community Centre receives $145,000 boost

The province of Ontario announced Friday its investment in three infrastructure projects in the Nipissing region, including $144,475 for Trout Creek.

According to the release, the money is earmarked for upgrades that will improve the community centre’s functionality and prepare it for community events.

“Partnering with the province allows us to reach out to all of our residents through improved services and infrastructure,” Powassan Mayor Peter McIsaac said in the statement.

“We are pleased that The Trout Creek Community Centre can continue to provide cornerstone services to our residents, particularly through our involvement with the NOHFC.”

Through the province’s Northern Ontario Heritage Fund Corporation (NOHFC), $1.4 million will be provided to three projects.

In addition to the Trout Creek funding, Canadore College will receive $906,860 to expand operations at the Innovation Centre for Advanced Manufacturing and Production. The facility provides Canadian manufacturing companies with the newest research and development resources available.

The City of North Bay will receive $375,000 for an engineering study and environmental assessment of the construction of a new multi-use pier at the city’s waterfront. The project will also consider the construction of a breakwater and siltation barrier in the location of the existing King’s Landing wharf.

According to the province’s release, this funding is part of the largest infrastructure investment in Ontario’s history — more than $130 billion over 10 years, which will support more than 110,000 jobs per year on average, with projects such as roads, bridges, transit systems, schools and hospitals across the province.

Ontario’s long-term infrastructure plan will help connect regions, develop new economic opportunities and improve quality of life for Ontarians by supporting critical infrastructure projects in cities, towns, and rural and remote communities all across the province.

Investing in local infrastructure is part of the government’s plan to build Ontario up. The four-part plan includes investing in people’s talents and skills, making the largest investment in public infrastructure in Ontario’s history, creating a dynamic, innovative environment where business thrives, and building a secure retirement savings plan.

“By continuing to support local infrastructure projects through the NOHFC, our government is helping to create economic opportunities for Nipissing and communities across the North,” Michael Gravelle, minister of northern development and mines and chair of the NOHFC, said.

View the original content and more from this author here: http://ift.tt/1NFjXX6



from critical infrastructure alliance http://ift.tt/1NFjVic
via IFTTT

How To Respond To a State-Sponsored Cyber Attack

As offensive cyber activity becomes more prevalent, policymakers will be challenged to develop proportionate responses to disruptive or destructive attacks. Already, there has been significant pressure to “do something” in light of the allegedly state-sponsored attacks on Sony Pictures Entertainment and the Sands Casino. But finding a timely, proportionate, legal, and discriminatory response is complicated by the difficulty in assessing the damage to national interests and the frequent use of proxies. Perpetrators have plausible deniability, frustrating efforts to assign responsibility. Past experience suggests that most policy responses have been ad hoc.

In determining the appropriate response to a state-sponsored cyber incident, policymakers will need to consider three variables: the intelligence community’s confidence in its attribution of responsibility, the impact of the incident, and the levers of national power at a state’s disposal.

While these variables will help guide responses to a disruptive or destructive cyberattack, policymakers will also need to take two steps before an incident occurs. First, policymakers will need to work with the private sector to determine the effect of an incident on their operations. Second, governments need to develop a menu of preplanned response options and assess the potential impact of any response on political, economic, intelligence, and military interests.

Background: Cyber Incidents and Uncertainty

Even as the number of highly disruptive and destructive cyberattacks grows, governments remain unprepared to respond adequately. In other national security areas, policy responses to state-sponsored activity are well established. For example, a country can expel diplomats in response to a spying scandal, issue a demarche if a country considers its sovereignty to have been violated, and use force in response to an armed attack. Clear and established policy responses such as these do not yet exist for cyberattacks for two reasons. First, assessing the damage caused by a cyber incident is difficult. It can take weeks, if not months, for computer forensic experts to accurately and conclusively ascertain the extent of the damage done to an organization’s computer networks. For example, it took roughly two weeks for Saudi authorities to understand the extent of the damage of the Shamoon incident, which erased data on thirty thousand of Saudi Aramco’s computers. Although this may be quick by computer forensics standards, a military can conduct a damage assessment from a non-cyber incident in as little as a few hours.

Second, attributing cyber incidents to their sponsor remains a significant challenge. Masking the true origins of a cyber incident is easy—states often use proxies or compromised computers in other jurisdictions to hide their tracks. For example, a group calling itself the Cyber Caliphate claimed responsibility for taking French television station TV5 Monde off the air with a cyberattack in April 2015, and used the television station’s social media accounts to post content in support of the self-proclaimed Islamic State. Two months later French media reported that Russian state-sponsored actors, not pro–Islamic State groups, were likely behind the incident. Even when attribution is possible, it is not guaranteed that domestic or foreign audiences will believe the claim unless officials reveal potentially classified methods used to determine the identity of the perpetrator, damaging intelligence assets. Under pressure, responses are likely to be made quickly with incomplete evidence and attract a high degree of public skepticism. This creates clear risks for policymakers. Quick damage assessments could lead to an overestimation of the impact of an incident, causing a state to respond disproportionately. Misattributing an incident could cause a response to be directed at the wrong target, creating a diplomatic crisis.

Developing a Proportionate Response

Policymakers should consider three variables before developing a response. First, they should understand the level of confidence that their intelligence agencies have in attributing the incident. Although there have been great strides in intelligence agencies’ ability to attribute malicious activity, digital forensics is not perfect. The degree of attributional certainty will have a direct impact on the action taken. For example, if the level of attribution is low, policymakers will be limited in their choice of response even if the severity of the attack is high. They may choose a less valuable retaliatory target to limit the odds of escalation and international criticism. There may also be instances where there is so little evidence for the source of the attack that the victim may choose not to respond.

Second, policymakers should assess the cyber incident’s effects on physical infrastructure, society, the economy, and national interests. Questions include: What was the physical damage caused by the affected systems, and was there any impact to critical infrastructure? What type of essential services are affected? Has the incident caused a significant loss of confidence in the economy? What was the incident’s impact on national security and the country’s reputation?

Third, policymakers should consider the range of diplomatic, economic, and military responses at their disposal, from a quiet diplomatic rebuke to a military strike. Responses need not be limited to cyberspace—nothing bars a state from using other channels, though each carries its own risks.

Cyber responses can be taken in addition to diplomatic, economic, and military activity. However, they would most often be delivered covertly and could be difficult to develop quickly unless a government had prepared capability against a specific target, likely involving prior cyber espionage, an unparalleled understanding of a target’s vulnerabilities, and a custom exploit kit at its disposal. As an example, Stuxnet reportedly took years to develop and deploy. An overt cyber response can be unappealing as states may lose the ability to launch similar responses against other targets. Although states may outsource their responses to a proxy, doing so could limit their control over the response and lead to escalatory activity. Therefore, policymakers are likely to concentrate on other levers of power, alongside whatever they may do covertly.

Recommendations

Given the likely pressure governments will feel to respond to significant cyberattacks, policymakers need to develop a response framework before a disruptive or destructive cyber incident occurs. Although each response will be case specific, a framework will enable policymakers to quickly consider their options.

Figure 1 represents a possible framework that policymakers can build on. Combining incident impact, policy options, and proportionality, it outlines the different levers of state power that can be applied in response to escalating levels of cyber incident. It plots the effects of a cyber incident, with website defacement at one end of the scale and loss of life at the opposite end. This is plotted against the level of response, ranging from media statements to military responses. Across the response spectrum there will be inherent political and legal risks associated with each decision, and risks increase as the level of the response increases. The proposed responses are applicable to state-sponsored activity. For disruptive or destructive activity caused by individuals, criminal networks, or others without state backing, law enforcement responses are more appropriate.

Figure 1. Policy Responses to Escalating State-Sponsored Cyber Incidents

As with other areas of international relations, proportionality emerges through state practice—the expulsion of diplomats in response to a mild violation of sovereignty is perceived as proportionate only because states have been doing it for decades. When one country levies economic sanctions, the sanctioned country often responds in kind—Russia responded to U.S. sanctions over its annexation of Crimea with sanctions of its own. This same logic applies to cyberspace. While there may be pressure to respond disproportionally to deter future attacks, international law requires that states only take forcible measures that are necessary and proportionate to successfully repel or defeat a disruptive or destructive cyberattack, limiting the “scale, scope, duration and intensity” of any action a victim state may take. Furthermore, responding proportionally may make it easier to build the international coalitions necessary to isolate and punish the attacker as well as limit the likelihood of escalation.

If a country is the victim of a state-sponsored website defacement, a public denouncement is likely the most appropriate response. Moving up the scale, any activity that begins to manipulate or destroy data would potentially require diplomatic action, such as a demarche in low-impact cases or the expulsion of diplomats if the incident affects the victim’s economy. Once the economy is adversely affected, a range of economic responses can be used in coordination with diplomatic pressure, from freezing individuals’ financial transactions within the sponsoring state to levying international sanctions. Should an incident cause physical damage, a policymaker could consider a military option as an appropriate and proportional response, from military posturing to an attack, depending on the incident’s severity. All of these options can be complemented with cyber or covert action, which will also need to be proportionate to the damage caused by the incident.

Each state can begin developing its own policy response framework by first working with the private sector, particularly in critical infrastructure. Critical infrastructure is a priority for attackers, making it important for infrastructure operators to be involved in the development of a response framework. They are in a good position to advise government on incidents that would affect their operations and how severe an incident would need to be before a response is required.

Second, policymakers should clearly understand the costs associated with each response in the framework. Each response will have an impact on a country’s diplomatic relations, reputation, and military and intelligence operations. These effects need to be understood before a response is chosen. Assessing options will require input from relevant government agencies, as well as critical infrastructure operators, whose operations could be affected by a response.

Cyber incidents provide governments with a highly complex set of decisions to make, from understanding the severity of the incident to assessing appropriate responses to take, while continually evaluating the risks involved in taking certain courses of action. The framework, while deliberately simplified, provides a rudimentary model for framing the potential responses to a state-sponsored incident before one occurs. This should give policymakers a starting point from which to make their own assessments on courses of action to take during a time of crisis.

View the original content and more from this author here: http://ift.tt/1N0MHtm



from critical infrastructure alliance http://ift.tt/1NFjVi8
via IFTTT

Powerful Attraction: Utilities Still Love TDM

We continue to see great progress toward all-IP networks, and it’s become a forgone conclusion that TDM is dead.

While it’s definitely fading, there are a few environments that still cling to TDM, and give carriers and vendors a reason to continue supporting it, at least in a small way. One of those environments is the utilities market, specifically the operation technology (OT) architectures of utilities, where critical infrastructure control and monitoring systems, substations and other assets often still are connected by technologies like Sonet and SDH.

TDM lives on because the utilities, usually very conservative operations by nature, have not felt the need to embrace new technology. TDM has provided the resiliency they require to keep their critical infrastructure up and running, and OT applications don’t demand much bandwidth.

But, things are changing as carriers and vendors are nearing the end of their own TDM service and product lifecycles. They are nudging the utilities to migrate to IP, which will help utilities to realize some of the same operational cost reductions and network flexibility and efficiency benefits that most telecom companies began to realize well over a decade ago.

In telecom, we’ve been living with IP technology for so long that we’ve started to distinguish between old IP and New IP. (See New IP: Bigger, Better andFCC Passes IP Transition Rules.)

However, across other industries, a few TDM outliers remain, and their eventual migration could create a major business opportunity for telecom companies to help them join the IP era. You can read more about this opportunity and the competitive dynamics around it in our most recent Prime Reading feature: Critical Infrastructure: Why Telecom Is Taking a Renewed Interest in the Utility Sector.

View the original content and more from this author here: http://ift.tt/1EpzFmD



from critical infrastructure alliance http://ift.tt/1NFjXGO
via IFTTT

Friday 28 August 2015

Protecting Our Future: New Cybersecurity Book Examines Critical Infrastructure Sectors

In Protecting Our Future: Educating a Cybersecurity Workforce, Volume 2 (August; Hudson Whitman/Excelsior College Press), Dr. Jane LeClair, COO of Excelsior CollegesNational Cybersecurity Institute, brings together several of Americas foremost cyber experts to examine nine Critical Infrastructure Sectors, as identified by Presidential Policy Directive-21 (PPD-21).

This volume completes the examination of all 16 Critical Sectors begun in Protecting Our Future, Volume 1, also edited by Dr. LeClair.

Written for practitioners, students, and employers, the book (bit.ly/ncibook) discusses workforce needs and recommends best practices in the following Sectors: Information Technology, Chemical Industry, Commercial Facilities, Manufacturing, Water Systems and Dams, Emergency Services, Food and Agriculture, and Transportation.

Can we prevent cyber-attacks? No. Can we mitigate their impact with education and top-of-mind awareness? Yes, said Dr. LeClair, who also recently edited Cybersecurity in Our Digital Lives with Gregory Keeley, founding partner and CEO of Ariana Partners, Inc.
Volume 2 offers ground-level insight from some of the industrys leading professionals, and informs readers of the kinds of activities and vulnerabilities that will impact the future of our nations security.

A cyber-attack on any of these critical infrastructures would have a catastrophic effect on our very way of life. We must proactively consider these risks, writes Sherri W. Ramsay, former director of the National Security Agency/Central Security Service Threat Operations Center, Department of Defense, in the books foreword.

Contributors to Volume 2 include: Philip W. Burnett, Christina Cooper, Kyle Foley, Anne Kohnke, William M. Martin, Kevin McLaughlin, George B. Murphy, Denise Pheils, Dan Shoemaker, Randall Sylvertooth, and Kin F. Wong.

To learn more or to purchase Protecting our Future: Educating a Cybersecurity Workforce, Volume 2, visit the Hudson Whitman/Excelsior College Press website (http://bit.ly/excelsiorpress).

View the original content and more from this author here: http://ift.tt/1PCYyvk



from critical infrastructure alliance http://ift.tt/1LGohVO
via IFTTT

ETC Simulation Contracted by Concordia University to Expand ADMS Training System with Utilities Capabilities

Environmental Tectonics Corporation’s(OTC Pink:ETCC) (“ETC” or the “Company”) Simulation Division (“ETC Simulation”), located in Orlando, Fla., has announced the signing of a contract with Concordia University Portland to expand their Advanced Disaster Management Simulator (“ADMS”) training suite to include additional capabilities to support the training of utility companies in emergency management.

The partnership between Concordia University and the Western Energy Institute, in cooperation with Portland General Electric will be the first of its kind designed to provide emergency management training and education specifically for utility companies. With ADMS, multiple utilities agencies work simultaneously to ensure that critical infrastructures remain online during a time of crisis. Their training can include incident management, coordinating communications, sharing of resources and testing standard operating procedures in a time of crisis.

Concordia’s Homeland Security Simulation Center, includes an on-scene Incident Command room with a 180-degree immersion theater screen, four Field Unit positions and an Emergency Operations Center (“EOC”) room which makes up the largest ADMS training suite in the United States. During an emergency simulation, the command team will receive real-time logistics information, on-scene visuals and 2D mapping along with any information related to the event. The expansion to their ADMS training suite will include the addition of utilities vehicles and personnel.

“The introduction of training capabilities for utility companies and their emergency management panning is another milestone for ADMS.” said Lori Bozenbury, Director of Business Development at ETC Simulation. “We have over 20 years of experience in providing virtual reality training to the emergency response community and are now integrating that with critical infrastructure systems. Utility companies will have access to a variety of scenarios to exercise incident command and test their operating procedures in order to provide the proper response in a time of crisis.”

______________

About ADMS:

ADMS(TM) is a high-fidelity Virtual Reality Simulation Training Platform that comprises multiple products including Incident Command training from technical to strategic level (ADMS-Command), emergency response and force protection specific to a military environment (ADMS-Airbase), firefighting techniques and tactics (ADMS-Fire), driver training and vehicle operation (ADMS-ARFF and ADMS-Drive), and multiple level police coordination for crowd management and riot control (ADMS-Control).  ETC’s signature True Simulation Technology blends physics-based simulation, embedded artificial intelligence, accurate animations, photo-realistic graphics, ambient sounds, vehicle controls, and motion platforms to totally immerse trainees in the exercise.  ADMS enables first responders and emergency managers to prepare at all levels of response in a safe, economical and environmentally-conscious way.

About ETC Simulation:

ETC Simulation (http://ift.tt/1NLLYvp), located in Orlando, FL, specializes in virtual reality emergency response and disaster management training systems.  Their hallmark product, ADMS(TM), is a proven tool for training emergency management personnel at all levels, with more than one million successful training hours completed globally.

About ETC:

ETC designs, manufactures, and sells software driven products and services used to recreate and monitor the physiological effects of motion on humans, and equipment to control, modify, simulate and measure environmental conditions.  Our products include aircrew training systems (aeromedical, tactical combat, and general), disaster management systems, sterilizers (steam and gas), environmental testing products, hyperbaric chambers, and other products that involve similar manufacturing techniques and engineering technologies.  ETC’s unique ability to offer complete systems, designed and produced to high technical standards, sets it apart from its competition.  ETC is headquartered in Southampton, PA.  For more information about ETC, visit www.etcusa.com.

Forward-looking Statements:

This news release contains forward-looking statements, which are based on management’s expectations and are subject to uncertainties and changes in circumstances.  Words and expressions reflecting something other than historical fact are intended to identify forward-looking statements, and these statements may include terminology such as “may”, “will”, “should”, “expect”, “plan”, “anticipate”, “believe”, “estimate”, “future”, “predict”, “potential”, “intend”, or “continue”, and similar expressions.  We base our forward-looking statements on our current expectations and projections about future events or future financial performance.  Our forward-looking statements are subject to known and unknown risks, uncertainties and assumptions about ETC and its subsidiaries that may cause actual results to be materially different from any future results implied by these forward-looking statements.  We caution you not to place undue reliance on these forward-looking statements.

View the original content and more from this author here:  http://ift.tt/1PCYzzA



from critical infrastructure alliance http://ift.tt/1UhCNTn
via IFTTT

America’s Great Infrastructure Stagnation

Critical Infrastructure: Why Telecom Is Taking a Renewed Interest in the Utility Sector

It’s an industry that’s facing a transition from TDM to IP, along with increasing fears that its networks could be disabled by security breaches. Yet its organizational cultures are lethargic, with philosophies toward infrastructure spending that could best be described as intensely thrifty, and it’s highly regulated, so it’s not under much competitive pressure to change.

What industry are we talking about?

It’s the electric power industry (though don’t feel bad if you thought we were talking about the telecom operators…).

Even though telecom’s evolution from TDM to IP networking is for the most part a done deal, telecom has been through, and still is dealing with, some of the same factors, such as ever-increasing security threats against its infrastructure. And as we’ve seen in telecom, many of the issues mentioned above create an environment ripe for network investment.

Those challenges aren’t limited to the electric power and telecom sectors, of course. Some of those issues (particularly the security threats) could be applied to a number of other verticals — think oil and gas, water utilities, transportation infrastructures, public safety, homeland security — that more broadly constitute the critical infrastructure sector, comprising companies and organizations that can’t rely on third party communications infrastructure and need to build and run their own networks.

Put it all together and that sector just might represent the next great market opportunity, worth billions of dollars each year in potential sales, for a wide array of telecom industry vendors that have the communications connectivity and security technology expertise to help critical infrastructure operators modernize and protect their networks. (See A Critical Time for Critical Infrastructure.)

Among that group of verticals, the electric power companies may represent the largest and most immediate target: In North America alone, there are thousands of electric utilities of all sizes. “In the US there are more than 4,500 utilities, some of them quite large, but others small cooperatives or municipal operations” says Amir Barnea, head of RAD Data’s Critical Infrastructure Line of Business. “In Europe, where transmission and distribution of power are separated by regulation, there are about 200 distribution companies and 50 transmission companies.”

The utilities market is no big secret in the telecom community, and both telecom service providers and vendors have been serving the IT communications needs of such companies for years. What’s been generally less understood by telecom types, at least until fairly recently, is the operational technology (OT) units of these companies. The OT frameworks consist of the physical grids, monitoring systems, automated Supervisory Control and Data Acquisition (SCADA) devices and other equipment — including (and here’s the big hook!) communications equipment — that keep their mission-critical services up and running.

But, during the past few years, a growing number of telecom vendors have intensified their efforts to sell their communications platforms and security solutions into the OT side of utilities. Here’s a brief list of just some of the vendors with critical infrastructure strategies:

Those are the most obvious participants and the ones Light Reading has talked to recently, but the list is sure to grow, as other companies tell us they’re in the process of sizing up the market for future engagement.

The size of the utilities market in particular, and the overall critical infrastructure sector in general, is one part of the attraction for these vendors, but the vendors also are being driven by their own needs, including increasing pressure to diversify their customer bases and break from their reliance on a few big telcos for most of their revenue.

Some of them have begun to accomplish this diversification by broadening their appeal to cloud service providers and Web 2.0 companies, but critical infrastructure operators may be the next logical step.

Yet, telecom vendors targeting this market aren’t stepping into virgin territory, competitively speaking. A long list of incumbent vendors, particularly in the utility segment, are as well entrenched with utility customers as telecom vendors probably consider themselves to be with their own traditional customers. Among the traditional technology suppliers to the utility sector are:

Still, there are several reasons for the heightened interest telecom vendors have in this market and their willingness to challenge the incumbent utility vendors. One reason is the mashup of the sensor-driven smart grid evolution being brought about by Internet of Things connectivity. All of the sensors and other gear that gather information and monitor grid operations need to connect with one another and with the SCADA devices that ultimately control the power grid.

“The world is being filled with automation,” Barnea says. “You have SCADA — all the devices that turn power on and off — that make autonomous decisions based on information from sensors. You have teleprotection, which is the very important capability to detect a problem and protect the grid by shutting down a particular line if necessary.”

The need to connect automated devices, which might sound a lot like the IoT to the rest of us, is what utility vendor giant GE refers to as the Industrial Internet. “We’re in the early innings of the Industrial Internet,” says Luke Clemente, general manager of Grid Automation at GE Digital Energy. “It’s a significant opportunity that we believe from an end point perspective will dwarf what is in most cellular networks now.”

Clemente, telling a tale that telecom vendors know well, adds: “Cellular is 6 billion or more end points, and we’re looking at something that is going to be significantly larger when you talk about the Industrial Internet. We see more and more the idea that networks will become ubiquitous and the ability to optimize information for better decision making is going to become a very pronounced change.”

While the Industrial Internet will present utilities with a dizzying number of potential new applications, using all of the data gathered, Clemente says power grids still have to stick to their traditional technology foundations, in terms of being, above all, “safe, reliable and redundant.” Those foundations in many cases, and for many years, have consisted mostly of proprietary TDM-based architectures.

View the original content and more from this author here: http://ift.tt/1WUUBHQ



from critical infrastructure alliance http://ift.tt/1UhCLuB
via IFTTT

Christie Approves $1.94 Billion for Critical Water Infrastructure Improvements

“This represents a major milestone,” said Department of Environmental Protection Commissioner Bob Martin.

The state of New Jersey is cranking up funding for critical water infrastructure, much of it damaged by Superstorm Sandy.

Up to $1.94 billion in state financing will be available under a bill signed by Governor Christie this week.

Local governments and public and private utilities can apply for low-interest loans to fund nearly 280 projects across the state. A minimum of $600 million in loans is available this fiscal year. Senator Bob Smith, who co-sponsored the bill, says that’s around three times the usual amount.

“I think that part of that is due to the fact that about $250 million of it is federal money. So we’ve been able to up the amount of funding to improve water and sewage systems,” said Smith.

Some drinking water and waste water systems we use today date back to the 19th century. Lawmakers, Department of Environmental Protection officials and environmental groups say the hardware and technology are in desperate need of a reboot.

“You’ve got potential public health issues, but you’ve also got the cost of operating and maintaining it and when that breaks, a break typically cost you three times what it would cost to replace it because you’re doing 24/7 manual labor on it, you’re rushing projects, you’re rushing freight,” said the Executive Director for the New Jersey Environmental Infrastructure Trust David Zimmer.

And with 130 miles of coastline, New Jersey is vulnerable to storm surges.

This pump station is one of 100 water treatment plants in the state crippled by Hurricane Sandy. The storm damaged $2.6 billion worth of drinking and waste water infrastructure damage statewide.

Martin says the underground caverns of this pump station were flooded when he visited on November 5, 2010 with he visited withFEMA Administrator Craig Fugate. One question on their minds: How do we plan for the next Sandy?

“How do we lay out long-term plans to build flood walls around this place? How do we elevate the electrical components of this place? How do we replace the pumps, how do we protect for the future?” he said.

It’s one project that will benefit from the legislation — $185 million goes to the Middlesex County Utilities Authority to restore the Sayreville and Edison pump stations. Additionally, $72 million will go towards the Bayshore Regional Sewerage Authority in Union Beach, $33 million for a sea wall at the Atlantic County Utilities Authority treatment plant and $16 million to build wet weather pumping stations and and nearly twice that much for storm water projects in Hoboken.

View the original content and more from this author here: http://ift.tt/1PCYwDP



from critical infrastructure alliance http://ift.tt/1LGoh8f
via IFTTT

Thursday 27 August 2015

BILD: Make infrastructure funding an election issue

On October 19, we’ll be going to the polls after one of the longest federal elections in recent history, so let’s use the next few months to make infrastructure funding for cities — especially the GTA — an election issue.

The GTA needs more federal funding for critical infrastructure like the pipes that bring clean water to our taps, the roads and transit we take to work and the bridges that connect our communities.

It might not appear to be the most pressing of issues, but it is and here’s why: infrastructure is vital to our economic prosperity, we all benefit from it and we all have the responsibility to help pay for it.

Currently, the federal government earmarks just $5 billion per year for infrastructure across the nation. The GTA is one of the fastest growing regions in North America and our existing infrastructure isn’t meeting the needs of our existing let alone our growing population.

If we don’t have pipes in the ground, roads for moving goods and people, and transit to provide an alternative transportation method that eases congestion we are going to experience some drastic growing pains.

The federal government used to give more money to the provinces for infrastructure and through them, municipalities received funding.

Municipalities alone cannot bear the cost of putting in the infrastructure needed to support our growing population and to help attract more businesses to the region.

To fill the gap, in the last decade we have seen municipalities significantly increase development charges and other government fees. Development charges are a tax on new development, paid for by new homebuyers and in the last decade they have more than doubled in most municipalities across the GTA.

We agree with the principle that growth should pay for growth but the new homebuyer and employer are already paying their fair share.

We did a study a few years ago that showed that government charges and fees amount to one-fifth the cost of a new home on average across the GTA. It is unreasonable and unfair to put the cost of infrastructure on the backs of the new homebuyers when it will benefit all of us.

We need to elect a government that is committed to funding much-needed infrastructure in the GTA. Research the party platforms and ask the candidates canvassing your neighbourhood where they stand on funding infrastructure to support the growth of our region.

View the original content and more from this author here: http://ift.tt/1gJps9w



from critical infrastructure alliance http://ift.tt/1DSpK90
via IFTTT

Wednesday 26 August 2015

More legislation needed to bolster Asean cyber security

Asean countries have been slow to produce comprehensive national cyber security strategies and implement the necessary legal frameworks for security and critical infrastructure protection, according to research.

The BSA’s APAC cyber security study Dashboard found that all markets reviewed have gaps in their cyber security capabilities, and there are opportunities to improve the systems needed to protect against, prevent, mitigate, and respond to cyber attacks. It examined the national cyber security strategies of 10 countries in the Asia-Pacific region, of which four are Asean countries – Singapore, Malaysia, Indonesia and Vietnam.
BSA, an industry trade group that represents several software giants, considers it critical for countries to develop comprehensive national cyber security strategies and sector-specific plans that are practical, flexible, risk-based and respectful of privacy and other civil liberties.

“Implementation of sector-specific responses to cyber security in Asean, and in fact across the Asia-Pacific region is very limited,” said Jared Ragland, director, policy – APAC at BSA.

Simon Piff, associate vice-president, enterprise infrastructure at IDC Asia Pacific, agreed there is a lack of local legislation covering cyber security. “With no really meaningful data management laws in place, and absolutely no disclosure laws in most markets, the need to secure data is not as high on the agenda for most Asean organizations as it perhaps should be,” he said.

But Piff expects this to change soon as organizations that are in some way involved in a security breach may be expected to pay their share of lawsuit costs, which can be hefty. The lawsuit costs faced by Target and Home Depot could amount to $8m to $10m each.

“This means that a local organization that did not patch a web server that then gets used in a hack could potentially be liable,” said Piff. “While the laws may not yet be in place to deliver on this reality, such a reputation in the US or EU markets could severely cripple many local businesses.”

To date, Malaysia and Singapore have established public-private partnership initiatives to take advantage of private-sector experience in preventing, detecting, responding to and mitigating cyber security incidents. In contrast, said Ragland, Indonesia and Vietnam need to do more to leverage the private sector’s cyber security knowledge and best practices.

View the original content and more from this author here: http://ift.tt/1hciMkd



from critical infrastructure alliance http://ift.tt/1MMMyIr
via IFTTT

More GO Service Between Brampton and Toronto

IoT Security Market to Grow to Almost 30 Billion Dollars by 2020

The emerging adoption of Internet of Things (IoT) has enabled the control of various connected devices into a single smart interface of smartphones, PCs and tablets. At the same time, it has also provided the opportunity to hackers for hacking the entire infrastructure to promote the disruptions. The increasing numbers of cyber security threats have resulted in the urgent need for adopting integrated IoT security solutions for enterprises, SMBs, and government. As the impact of potential IoT threats is expected to be severe, most large enterprises and SMEs will increase work toward implementing IoT security solutions to safeguard the highly critical data and infrastructures.

The IoT security market is expected to grow to $28.90 billion by 2020, at a CAGR of 33.2 percent during the forecast period of 2015 to 2020 due to growing security concerns for the critical infrastructure along with diversified application of IoT. Moreover, the growth of social media and rising prominence of personal data are also fueling the growth of market. The emergence of applications and connectivity technologies of IoT such as sensors, RFIDs, NFC and Zigbee; capture huge amount of data and personal information such as bank details, medical data, and transaction details which can be vulnerable if hacked. Therefore, MarketsandMarkets expects the trend for IoT security to grow at a faster rate than IoT.

According to MarketsandMarkets analysis, Identity and Access Management (IAM) solution holds the largest share of IoT security solutions market. The solution serves major verticals such as BFSI, telecommunication and IT, energy, oil and gas, public sector, education, healthcare, and retail. The rising cases of digital identity fraud and the features of IAM such as password management, single sign on, advanced authentication and audit are driving the growth of IAM. Additionally, increased spending pattern over security solutions and enhanced enterprise mobility also add to the adoption of IAM.

Among the services, support and maintenance services is expected to lead the market throughout the forecast period. . It includes maintenance of hardware and software to provide seamless security and minimize the loss due to threats. Securing IoT is a big task and therefore the need for real-time resolution of problems is witnessing a vast increase. Support & maintenance services are essential for real-time solution of problems and hence are witnessing huge growth due to increasing penetration of IoT in different verticals.

The banking, financial services, and insurance (BFSI) vertical accounted for the largest market share in the IoT security market during 2015-2020. This sector is continuously upgrading its processing and transaction technologies and therefore requires end-to-end security solutions to optimize operations against both internal and external threats. Furthermore, smart banking, internet banking, and mobile banking are the factors which have led the BFSI sector to focus more on IoT security. Also, this sector is among early adopters of IoT and therefore is expected to witness high traction in the IoT security market.

The growing adoption of connected devices across different verticals and the widespread impact of IoT attacks are expected to shape the future of IoT security market. The growth potential of the IoT security market is expected to remain high in the future and the market is expected to provide huge growth opportunities to the security solutions and services providers. The diversification trend of the cybersecurity vendors and semi-conductor manufacturers into providing embedded security solutions for IoT has also increased the competition in the market. Due to security concerns; enterprises, SMBs and government organizations are increasing their investments towards better IoT security solution and therefore the growth will remain high for the IoT security market in future.

View the original content and more from this author here: http://ift.tt/1hFIBdB



from critical infrastructure alliance http://ift.tt/1hFIChr
via IFTTT

Having Australian ports in foreign hands could harm our long-term security

The change to foreign ownership of Australian companies and critical infrastructure continues with the takeover offer for rail and ports operator Asciano from Brookfield Infrastructure Partners, a Bermuda-based company listed on the New York and Toronto stock exchanges.

The offer, which values Asciano at US$9 billion, is a part cash (75%) and part scrip (25%) bid. While it has the blessing of the Asciano board, the offer is yet to be approved by both the Australian Competition and Consumer Commission and Foreign Investment Review Board.

Australians appear relatively unconcerned about major transfers of ownership such as these – yet it is at odds with the assiduous strategies of larger economies such as the United States and China, to secure their supply chains.

Asciano was a spinoff of the Toll Group, formed in 2007. It has a rail division, Pacific National, acquired by Toll from the federal government-owned National Rail Corporation in 2002, and a port and logistics division, Patrick Terminals and Logistics.

Patrick is a long-established Australian company. It was originally started by the owner of coastal trading vessels before morphing into a number of other shipping and stevedoring companies. Although known for its role in the 1998 waterfront dispute, it has since become a leader in the stevedoring sector. It was acquired by Toll in 2006.

The Brookfield name is not completely unknown in Australia. The company already owns Brookfield Rail – a 5,500 km rail network in Western Australia – and the Dalrymple Bay Coal Terminal in Queensland.

Brookfield’s interest in Asciano is partly driven by a goal of positioning itself for the mooted sale of the federal government-owned Australian Rail Track Corporation, the owners of 8,500 kilometres of critical rail track across Australia.

If the Asciano sale goes ahead, approximately 95% of all Australian containerised imports and exports will be handled by foreign-owned companies including Dubai Ports World (based in the United Arab Emirates), Hutchinson Port Holdings (based in Hong Kong) and International Container Terminal Services Inc. (based in the Philippines), with only the Adelaide container terminal still in Australian hands.

On the other hand, a potential benefit for Australia is that Brookfield has indicated it will utilise Patrick’s world-leading expertise in automation across stevedoring operations it owns in other countries.

The general public may not be fully aware of the extent and ramifications of this shift in ownership in businesses critical to Australian trade. The main driver for overseas owners is to maximise return on the considerable investment they have made to acquire the assets, with in some instances, applying creative means of getting around Australian laws and regulations. For example, the recent Senate Committee inquiry into tax avoidance highlights just one of the issues, that of tax avoidance by overseas companies operating in Australia.

Many countries are grappling with how to manage the increase in foreign ownership, but in some cases public opposition has prevented a takeover going ahead. In 2006, a number of North American container terminals and logistic centres were up for sale but Dubai Ports World, one of the bidders whose ownership is concentrated in the Middle East, was ultimately excluded from the process due to the public’s fear that such a sale would compromise port security.

The US is also fiercely protective of its coastal shipping regime where all coastal cargo in North America has to be shipped by American owned and crewed vessels. This is in stark contrast to the current Australian coastal trading policy where increasing amounts of cargo on the Australian coast are being carried by foreign flagged and crewed vessels.

China is taking the security of their supply chains even further. Chinese companies, with the help of the government, are in the process of acquiring interests in ports and port-related businesses in the Indo-Pacific, East Africa and the Mediterranean along the shipping routes from China to Europe, the so-called “Maritime Silk Road”.

This project is part of the “One Belt, One Road” policy, which is an undertaking to secure China’s supply lines to and from Europe. It also includes a land-based route the “Silk Road Economic Belt”, which more or less runs along the centuries old former Silk Road and is developed to allow China’s landlocked western provinces to access the markets of Southeast Asia and the Middle East. The other aim of this initiative (backed by a US$40 billion fund) is to shape China’s regional periphery by exercising economic, cultural and political influence.

Australia could learn something from other economies – to carefully assess the long-term harms and benefits of allowing the sale of critical assets.

View the original content and more from this author here: http://ift.tt/1EV1dek



from critical infrastructure alliance http://ift.tt/1IfoTdw
via IFTTT

Tuesday 25 August 2015

Watpac boosted by construction projects

Construction and mining services group Watpac has worked to rehabilitate its balance sheet and will look to the year ahead with a share buyback and new projects.

As the last piece of the repair, the group reported a $9.1 million impairment to residual industrial property assets, which took the statutory profit to $11.5 million for the 2014-15 year, down 35.4 per cent on the previous year.

This was offset by the stronger contracting business, where the group has won a number of projects including the York & George apartment and retail project in central Sydney and the Melbourne Park redevelopment.

Watpac’s contracting revenue was $929 million, up from $857 million, while revenue from mining and civil revenue was $284 million, down marginally.

No distribution was paid.

Watpac managing director Martin Monro said its better balance sheet meant the group was “backing” itself with a buy back of 10 per cent of its issued shares.

“This was seen as the most efficient approach to provide shareholder value,” Mr Monro said.

“We will continue to explore capital management initiatives to enhance shareholder value, with flexibility to consider other strategic options maintained with the on-market share buyback.

“There are signs that NSW has got its mojo back in term of new construction and infrastructure projects and Victoria is also in good shape. Queensland remains tough, but showing positive signs in the past few months.”

Mr Monro said Watpac had a total construction forward order book of almost $1.2 billion across a number of sectors, while the mining and civil business continued to deliver profit despite difficult conditions, and had recently converted several contracts.

“The focus for us will be more of the same in the coming year, but we do see genuine and sustainable signs of improvement and robustness emerging across the country,” he said.

“There is $150 million in net cash which gives us new-found health in the balance sheet, to be able to pay debt and return equity and bid on new projects.

“We remain confident of our strength in contracting, and we will continue to explore opportunities in the resources sector as they come to market.”

View the original content and more from this author here:  http://ift.tt/1LusjO6



from critical infrastructure alliance http://ift.tt/1Lusedk
via IFTTT

City allows delays in infrastructure projects after heavy rainfalls

City councilors approved 108-day extensions for three major infrastructure projects delayed because of inclement weather this spring that produced above-average rainfall and flooding.

Public Works Director Mike Stewart said the additional days were calculated pursuant to Oklahoma Department of Transportation rules and regulations. Those specifications, he said, also are set out in each of the three contracts governing the projects.

The projects impacted by the weather include the Martin Luther King Street rehabilitation project, the Elliott-Dayton Street drainage project, and the replacement of the east side sewer interceptor line. With the council’s approval of the requested extensions, the drainage project, which was scheduled to be completed by Aug. 11, now has a Nov. 27 deadline, the sewer line replacement project is scheduled to be completed Jan. 23, and the street project schedule was extended from Oct. 14 to Jan. 30.

Stewart said he was aware of complaints from residents within the project areas that workers have not been at the sites at times and has conveyed those concerns to contractors. Residents affected by the projects also have lodged complaints about the failure of workers to clean up after themselves or inform residents about blocked access to their homes.

One resident affected by the drainage project said she was unable to access her home and had to park her car in a nearby field for more than eight days and cross barbed-wire fences to get home. Karen Holder-Todd urged administrators to encourage contractors to expedite their work.

“All we are asking is, please clean up after themselves, be more courteous (and) talk to the neighbors,” Holder-Todd said. “We are willing to help them if they help us out.”

Ward I Councilor Lee Ann Langston echoed those concerns, saying she has fielded several complaints from residents within her ward who have expressed similar concerns. She urged the exercise of “common courtesy.” Ward IV Councilor Marlon Coleman said he has fielded similar complaints about the Martin Luther King Street project, and he cited a need for additional signage.

View the original content and more from this author here: http://ift.tt/1LushWG

 



from critical infrastructure alliance http://ift.tt/1MQEKHj
via IFTTT

root9B and OSIsoft partner to enhance Industrial Control System (ICS) Security

NEW YORK, Aug. 24, 2015 /PRNewswire/ — root9B, a root9B Technologies Company (OTCQB: RTNB), a leading provider of advanced cybersecurity services and training for commercial and government clients today announced a new partnership with OSIsoft, a global leader in operational intelligence, to provide government and commercial customers with proactive cyber defense capabilities, threat intelligence, and advanced services for Industrial Control Systems (ICS).

“Everyone understands that network attacks are more prevalent than ever. But the truth is that ICS are increasingly vulnerable as well. Over the past several years many malware strands have been released and were maliciously designed to attack and damage Operational Technology (OT), ICS equipment and property,” said Mike Morris, Chief Technology Officer at root9B. “Our business depends on our ability to provide services, technology, and intelligence to mitigate threats against government agency critical infrastructure today and tomorrow. By leveraging OSIsoft’s operational intelligence software, our security professionals are equipped to identify and thwart sophisticated attacks on operational devices and assets, like SCADA systems.”

root9B has proven expertise in providing federal and commercial clients with advanced technology solutions for cybersecurity operations. Its capabilities include Active Adversary Pursuit (HUNT) operations, Network Defense Operations, Vulnerability Assessments, Malware Analysis, Incident Response, and Mobile Cyber Protection.

root9B will also leverage its 24/7 Adversary Pursuit Center in Colorado Springs, Colorado to provide manned security services and proactive threat intelligence services to government and commercial customers and infrastructure. It will also manage cyber events to include both Information and Operational Technology networks in response to modern tactics, techniques, and procedures used by adversaries to target and exploit critical infrastructure networks.

For over 30 years, OSIsoft’s PI System, an open, scalable infrastructure for collecting, processing, exploiting, and disseminating sensor-based data, has been relied upon by diverse industries within the U.S. national and global critical infrastructures such as energy, power, and oil & gas. For the past several years, OSIsoft has also been providing its solution within the Federal Government. The PI System provides operational visibility into those ever increasing complex environments where IT and OT data systems’ health and security are the most critical. Centralized read-only access to a complex diversity of digital information and real-time alerts enables the PI System to be utilized as an abstraction layer that monitors critical facilities for cyber-attack, as well as isolate reporting systems as a point of weakness.

“We are pleased that root9B is leveraging OSIsoft’s technology to provide government agencies and commercial entities with innovative services to combat threats that have evaded standard Cyber/IT and Physical Security through the years,” said Paul J. Geraci, OSIsoft Senior Director for Intelligence and National Security Programs. “The enhanced operational intelligence provided by OSIsoft’s PI System, along with root9B’s knowledge and expertise, will allow government and commercial entities to leverage contextual, real-time operational data that’s proven effective and efficient in the majority of our nation’s critical infrastructure assets and industrial data centers – both within the government and private sectors.”

About root9B
Based in Colorado Springs, CO, root9B is a leading provider of advanced cybersecurity services and training for commercial and government clients. Combining cutting-edge technology, tactics development, specialty tools, and deep mission experience, root9B personnel leverage their extensive backgrounds in the U.S. Intelligence Community to conduct advanced vulnerability analysis, penetration testing, digital forensics, incident response, industrial control system (ICS) security, and active adversarial pursuit (HUNT) engagements on networks worldwide. For more information, visit www.root9b.com.

About root9B Technologies, Inc.
root9B Technologies (OTCQB: RTNB) is a leading provider of Cybersecurity and Regulatory Risk Mitigation Services. Through its wholly owned subsidiaries root9B and IPSA International, root9B Technologies delivers results that improve productivity, mitigate risk and maximize profits. Its clients range in size from Fortune 100 companies to mid-sized and owner-managed businesses across a broad range of industries including local, state and government agencies. For more information, visit http://ift.tt/1vJhOig.

About OSIsoft, LLC
OSIsoft, a global leader in operational intelligence, delivers an open enterprise infrastructure to connect sensor-based data, operations and people to enable real-time and actionable insights. As the creator of the PI System, OSIsoft empowers companies across a range of industries in activities such as exploration, extraction, production, generation, process and discrete manufacturing, distribution and services to leverage streaming data to optimize and enrich their businesses. For over thirty years, OSIsoft’s global customers have embraced the PI System to deliver process, quality, energy, regulatory compliance, safety, security and asset health and security improvements across their operations. Today 100% of the Federal Energy Regulatory Commission’s (FERC) ISOs and RSOs have also embraced the PI System due to their trust in the system.

View the original content and more from this author here: http://ift.tt/1hVJwX8



from critical infrastructure alliance http://ift.tt/1MQCPT9
via IFTTT

Katrina at 10: Reflections on a Human-Made Disaster

The following is a guest post by Stephen E. Flynn, Professor of Political Science, Director of the Center for Resilience Studies, and Co-Director of the George J. Kostas Research Institute at Northeastern University. He can be reached at s.flynn@neu.edu

The flooding of New Orleans during Hurricane Katrina was a human-made disaster, not a natural one. The flood-protection system for the city had been poorly designed and maintained. It also turned out that a series of waterway engineering decisions to try to contain the flow of the Mississippi River and to facilitate river navigation to and from the Gulf of Mexico, were badly out of sync with the region’s ecosystem. In short, it was a failure of critical infrastructure at multiple levels that nearly doomed one of America’s major cities. Ten years later, what happened to New Orleans should serve as a forceful reminder of the costly consequences of hubris, denial, and neglect. Sadly, though, this attitude continues to characterize the relationship Americans have with their built and natural environments.

New Orleans’s primary line of defense against the sea and the Mississippi River has long been a levee and flood-wall system. Unfortunately, that system saw little investment in the half century prior to Hurricane Katrina. The city is like a fishbowl, with the water on the outside and a half a million homes on the inside. New Orleans has been sinking at a rate of three feet per century, so that it lies at an average of six feet below sea level, with some neighborhoods as low as eleven feet below. Without the levees and flood walls, much of the city would be a shallow lake.

When Hurricane Katrina made landfall it had hooked east, sparing the city its worst winds. But the waters from the storm found a ready path to assault the “Big Easy,” thanks to the construction of a 76-mile canal that was completed by the U.S. Army Corps of Engineers in 1968. The Mississippi River Gulf Outlet (MRGO), known locally as “Mr. Go”, was built to shorten the time and distance required for oceangoing vessels to transit from the Gulf of Mexico to the New Orleans waterfront. During Katrina this cement-sided waterway provided a ready path to funnel the storm surge originating from the Gulf of Mexico for a direct hit on New Orleans. As the hurricane came onshore, the water steamrolled down the MRGO on a collision course with the Industrial Canal, causing an 800-foot breach. Many of the communities to the east of New Orleans were victims of the overtopping of the MRGO. More than 80 percent of the city was flooded and nearly 250,000 residents were forced to flee; today the population is still nearly 100,000 below its pre-Katrina level.

Given its clear vulnerability to flooding, the haphazard management of New Orleans’ storm protection system prior to Hurricane Katrina is mystifying. Invading floodwaters not only put lives at risk, they created a toxic cauldron of debris that contaminated and scarred the urban landscape. Yet throughout the 1990s, federal funds that might have been used to repair and strengthen the city’s levees and flood walls and protect the pumping stations were bled off for other projects, such as widening the MRGO. In 2004, the Army Corps of Engineers asked for $22.5 million for storm protection projects for New Orleans. The Bush administration cut that budget request to $3.9 million and then dropped it to $3.0 million in 2005.

Sadly, the sense of denial and neglect of critical infrastructure that led to the near-drowning of New Orleans in 2005 continues to endanger many U.S. cities today. Miami, Norfolk, New York, and Boston all face the twin risks of rising sea-levels associated with climate change along with the likelihood of more frequent and intense hurricanes. Seattle sits astride the Cascadia subduction zone that belongs to the Pacific Rim’s seismically active “Ring of Fire,”and Los Angeles lies along the San Andreas Fault. In America’s heartland, cities such as St. Louis and Memphis could be devastated by an earthquake along the New Madrid Fault Line.

Across the nation, Americans have been taking for granted the critical infrastructure built with the sweat, ingenuity, and resources of earlier generations. Not only are we not upgrading it to keep pace with modern needs, Congress and state legislatures have been squandering this legacy by failing to adequately fund basic repairs and maintenance for roads, bridges, ports, wastewater and drinking water systems, dams, and levees, and the electrical grid and pipeline distribution systems. Even for “blue sky” days, our ongoing neglect of that infrastructure is a national disgrace. But as New Orleanians can attest, it translates into reckless endangerment when disasters strike.

For too long Americans have been pretending that disasters are rare and unknowable. Additionally, we have been resistant to making sensible investments in mitigation measures before storms occur, such as placing flood barriers around electrical substations or moving emergency generators out of basements to higher floors. Insanely, in the aftermath of disasters we have a national bad-habit of returning to “business as usual” by often allowing reconstruction in areas that will almost certainly be flooded again.

Hurricane Katrina, along with Hurricane Sandy in 2012, are reminders that the gravest source of danger for Americans derives not from acts of God or acts of terror but from our own negligence. The ongoing risk associated with disasters is far more knowable than we often assume and the means for mitigating their consequences are well within the reach of the most-advanced and wealthiest country in the world.

What has been in too short supply is the political will and leadership that will ensure our communities, metropolitan regions, and nation can better withstand, nimbly respond, recover, and adapt to the inevitable disasters heading our way. There are few more important imperatives that the next president will need to advance than bolstering national resilience.

View the original content and more from this author here: http://ift.tt/1LuqMYv



from critical infrastructure alliance http://ift.tt/1MQCLmf
via IFTTT

National Institute of Standards and Technology Publishes Cybersecurity Standards Objectives

The National Institute of Standards and Technology has published a draft of its objectives for cybersecurity standardization, following in many ways the consultative model that it used successfully in drafting the NIST Framework for critical infrastructure cybersecurity.

The NIST international standards report, published August 11, encourages federal agencies to support development of international consensus standards in many cybersecurity areas, including cryptographic techniques, IT system security evaluation, identity management, network security, software assurance, and supply chain risk, among others.

The report strongly endorses the adoption of international consensus standards, over promulgation of government specific standards,  because among other considerations, they are more likely to address and maintain market relevance, benefit from an open and transparent development process, and are more likely to be widely adopted.

Perhaps the most useful segment of the NIST report is a matrix, backed by a comprehensive and well-documented analysis, of the current state of standards development in 10 core areas of cybersecurity standardization.  It identifies those areas where standards are in development or are needed in a half-dozen key IT applications, such as cloud computing, industrial control systems and health IT.  This matrix provides a roadmap for establishing the priorities that agencies and industry may use adopt in developing critical cybersecurity standards.

View the original content and more from this author here:  http://ift.tt/1MQCIqL



from critical infrastructure alliance http://ift.tt/1LuqO2B
via IFTTT

Monday 24 August 2015

Hospital gets $736,378 infusion for specific projects

CAMBRIDGE – Cambridge Memorial Hospital has had much of its annual maintenance wish list answered by the province.

On Thursday (Aug. 20), the provincial government announced it would be upgrading hospital infrastructure in Waterloo Region with the investment of more than $2.5 million.

The cash infusion will pump $736,378 into existing infrastructure at Cambridge Memorial Hospital, $1,140,676 into Grand River Hospital, $548,418 into St. Mary’s General Hospital and provide the North Wellington Health Care Corp with $137,034.

The work to be done is part of the ongoing maintenance of the aging hospitals. Each of the hospitals earlier this year applied for funding for specific projects. They might include structural upgrades like roof replacements and new windows, upgrading heating and cooling systems, upgrading back-up generators, fire alarm systems and meeting fire and building coder requirements.

At CMH, funding was approved for six projects, which include: upgrading the electrical distribution system, which is now operating at capacity; roadway repairs at the rear of the hospital; boiler repairs; replacing thermostats and upgrading the HVAC work in the oldest part of the hospital; installing new sidewalks; and replacing patient doors that no longer meet fire codes.

“This is something we go through every year and we are very grateful to the province for the funding it supplies for this type of work,” said CMH communications manager Stephan Beckhoff.

In the 2015 budget, the government committed to providing more than $11 billion in hospital capital grants over 10 years, including grants administered through the Hospital Infrastructure Renewal Fund.

According to a provincial government press release, this funding is part of the largest infrastructure investment in Ontario’s history – more than $130 billion over 10 years.

“As a nurse, and someone who cares deeply about patient care, I applaud these investments in the critical infrastructure of local hospitals. These changes will provide safer, more efficient and upgraded hospitals for patients and staff to use for years,” said Cambridge MPP Kathryn McGarry in the release.

View the original content and more from this author here:
http://ift.tt/1U91nWe



from critical infrastructure alliance http://ift.tt/1hVpR9I
via IFTTT

Kratos Defense & Security Solutions Cut to “Hold” at Zacks (KTOS)

Zacks lowered shares of Kratos Defense & Security Solutions(NASDAQ:KTOS) from a strong-buy rating to a hold rating in a research report sent to investors on Wednesday morning,MarketBeat reports.

According to Zacks, “Kratos Defense & Security Solutions, Inc. is a specialized National Security Technology business providing mission critical products, services and solutions for United States National Security priorities. Kratos’ core capabilities are sophisticated engineering, manufacturing and system integration offerings for National Security platforms and programs. “

In other Kratos Defense & Security Solutions news, Director Bandel L. Carano acquired 150,000 shares of Kratos Defense & Security Solutions stock in a transaction dated Friday, June 5th. The stock was acquired at an average cost of $6.03 per share, for a total transaction of $904,500.00. The transaction was disclosed in a legal filing with the Securities & Exchange Commission, which is available at the SEC website.

Separately, B. Riley reissued a buy rating and issued a $9.00 price objective on shares of Kratos Defense & Security Solutions in a report on Tuesday, August 11th.

Kratos Defense & Security Solutions (NASDAQ:KTOS) traded down 0.23% during midday trading on Wednesday, reaching $4.30. The company’s stock had a trading volume of 683,048 shares. The firm’s market cap is $253.72 million. The company has a 50 day moving average price of $5.49 and a 200 day moving average price of $5.74. Kratos Defense & Security Solutions has a 1-year low of $4.08 and a 1-year high of $7.92.

Kratos Defense & Security Solutions (NASDAQ:KTOS) last announced its earnings results on Thursday, August 6th. The company reported ($0.02) earnings per share (EPS) for the quarter, topping the Zacks’ consensus estimate of ($0.04) by $0.02. During the same period in the previous year, the firm posted $0.02 earnings per share. The business had revenue of $160.50 million for the quarter, compared to analysts’ expectations of $185.40 million. The firm’s revenue was down 21.4% compared to the same quarter last year. On average, equities research analysts expect that Kratos Defense & Security Solutions will post $0.03 EPS for the current year.

Kratos Defense & Security Solutions, Inc. (NASDAQ:KTOS) is a technology focused security business providing mission critical products, solutions and services for domestic andinternational customers. The Company operates in three segments: Kratos Government Solutions (KGS), Unmanned Systems Segment (US) and Public Safety & Security (PSS). The US segment provides unmanned aerial, ground, seaborne and command, control and communications system business. The KGS and US segments provide products, solutions and services primarily for mission critical national security priorities. The PSS segment provides independent integrated solutions for advanced homeland security, public safety, critical infrastructure, and security and surveillance systems for Government and commercial applications. The Company’s principal products and solutions are related to Command, Control, Communications, Computing, Combat Systems, Intelligence, Surveillance and Reconnaissance (C5ISR).

To get a free copy of the research report on Kratos Defense & Security Solutions (KTOS),

View the original content and more from this author here:
http://ift.tt/1U91nWc



from critical infrastructure alliance http://ift.tt/1hVpTyn
via IFTTT