Blue Cascades II Critical Infrastructure Interdependencies Exercise Outcomes and Insights - PowerPoint PPT Presentation

1 / 39
About This Presentation
Title:

Blue Cascades II Critical Infrastructure Interdependencies Exercise Outcomes and Insights

Description:

August, 2002, Briefed Canada/US bilateral on CIP in Ottawa Blue Cascades seen ... Develop a region-wide 'yellow-pages' of points-of-contact for disaster ... – PowerPoint PPT presentation

Number of Views:67
Avg rating:3.0/5.0
Slides: 40
Provided by: paula181
Category:

less

Transcript and Presenter's Notes

Title: Blue Cascades II Critical Infrastructure Interdependencies Exercise Outcomes and Insights


1
Blue Cascades II Critical Infrastructure
Interdependencies ExerciseOutcomes and Insights
  • Matt Morrison
  • Pacific NorthWest Economic Region (PNWER)
  • WREMAC, Vancouver, BC
  • November 4, 2004

2
Pacific NW Economic Region
  • Alaska
  • Idaho
  • Oregon
  • Montana
  • Washington
  • Alberta
  • British Columbia
  • Yukon

PNWER formed by statute in 1991 PNWER is a
Public/Private Partnership
3
Partnership for Regional Infrastructure Security
(PRIS)
  • October 2001, PNWER launched an initiative to
    develop a regional protection, preparedness and
    response plan for dealing with emergencies
  • November 30, 2001 PNWER formed Partnership for
    Regional Infrastructure Security.
  • June 2002 First multi-state, bi-national CIP
    Interdependency exercise Blue Cascades held in
    Welches, Oregon

4
Partnership for Regional Infrastructure Security
(PRIS)
  • August, 2002, Briefed Canada/US bilateral on CIP
    in Ottawa Blue Cascades seen as model
    bi-national exercise on interdependencies
  • Oct. 2002, Action plan developed key
    initiatives driven by stakeholder committees,
    information sharing is top priority
  • April 2003, Steering committee formed for
    Northwest Warning, Alert Response Network
    (NWWARN)
  • July 2004, Northwest, Warning, Alert Response
    Network Launched by DHS Secretary Tom Ridge
  • September 2004, Blue Cascades II held in Seattle,
    WA

5
Background
  • Held Sept. 8, 2004 in Seattle, Washington
  • Follow-on to Blue Cascades I (June, 2002 in
    Welches, Oregon)
  • Hosted by the Pacific Northwest Partnership for
    Regional Infrastructure Security funded by King
    County and the U.S. Department of Homeland
    Security (DHS)/National Cyber Security Division
  • Sponsored by the Pacific Northwest Economic
    Region, Microsoft, Puget Sound Energy, and
    Pacific Gas and Electric Company

6
Background, cont.
  • Attended by more than 200 representatives from
    private/public sector organizations (all
    infrastructure sectors city, county, state,
    federal civilian and defense entities commercial
    enterprises, including tourism, academe and
    community organizations)
  • Technical advice provided by National Laboratory
    experts through DHS/Science and Technology/
    Critical Infrastructure Protection Office and by
    the U.S. CERT

7
Background, cont.
  • Overall goal
  • Raise awareness of interconnections among the
    regions critical infrastructures and
    organizations and associated vulnerabilities in a
    trusted environment
  • Examine cyber threats/vulnerabilities that could
    affect operations, business practices, response/
    recovery
  • Identify ways to make organizations aware of the
    extent/duration of disruptions and resulting
    impacts
  • Bring emergency managers, physical/cyber security
    personnel together to foster interaction/integrati
    on

8
Scenario Development
  • Developed by the stakeholders themselves based on
    their biggest concerns, both cyber and physical
  • Designed to explore vulnerabilities and
    disruptions, and regional capabilities to deal
    with threats, cascading impacts and incident
    response
  • Stakeholder involvement in constructing the
    scenario provided them with a means to begin and
    develop a dialogue on interdependencies, to
    challenge assumptions and gain new insights

9
Scenario Snapshot
  • Setting is the week before Labor Day 2005 during
    annual Bumbershoot urban arts festival a
    Mariners game is underway at Safeco Field and the
    stadium is at capacity
  • A terrorist cell with members from Canada
    launches a series of cyber attacks that include
    zero-day and distributed denial of service
    attacks aimed at disrupting regional
    infrastructures, including emergency management
    and security operations

10
Scenario Snapshot, cont.
  • The goal of the terrorists is to use the cyber
    attacks as a force multiplier to soften their
    adversary for a physical attacka SUV filled with
    high-powered explosives that impacts critical
    telecommunications and electric power assets in
    the Seattle Center vicinity
  • The final event was the loss of critical BPA
    substations serving the region, resulting in a
    power outage for at least five days to enable
    exercise participants to examine the effects on
    the region and their capability to deal with
    cascading impacts from a prolonged power outage

11
Exercise Process
  • A workshop format was used to facilitate
    discussion with participants seated at tables
    according to their organization to enable them to
    discuss how to respond
  • Participants were clearly instructed that the
    exercise was not testing anything or exploring
    mitigation options, but rather was a tool to
    generate discussion and begin identifying
    interdependencies and preparedness gaps
  • Members of the Scenario Design Team
    knowledgeable about operational aspects of a
    particular scenario event facilitated that
    inject

12
Exercise Evaluation Criteria
  • There were a large number of findings and
    recommendations many were suggested by
    participants in their evaluations of the exercise
    and by a team of independent evaluators
  • Criteria used to determine findings and
    recommendations included
  • Awareness/understanding of interdependencies
  • Understanding of cyber security threats/impacts
  • Extent of stakeholder cooperation/coordination
  • Level of communication/information sharing
  • Clarity of roles and responsibilities
  • Resource management capabilities
  • Effectiveness of Public information

13
Selected Findings
  • General Observations
  • Significant progress has been made in the Puget
    Sound region by local governments and many larger
    utilities and businesses in addressing physical
    vulnerabilities and related preparedness needs,
    but much remains to be done
  • An information sharing and notification system
    called Northwest Warning, Alert and Response
    Network (NW-WARN) has been established to link
    regional stakeholders

14
Selected Findings, cont.
  • Understanding Interdependencies and Cyber Issues
  • Most organizations were aware of
    interdependencies and their importance and saw
    the need to develop a comprehensive regional
    preparedness strategy
  • Organizations were less knowledgeable about
    interdependencies that could impact service
    providers on which they were dependent and the
    extent/duration of service disruptions
  • Cyber threats, vulnerabilities, and disruption
    impacts are not well understood by most
    organizations, which tend to overestimate the
    technical capabilities of their networks to
    withstand attacks and recover quickly

15
Selected Findings, cont.
  • Few organizations have cyber incident response
    plans or procedures for those that do, these
    plans are rarely tested
  • Organizations often shut off Internet access
    during a suspected attack some resort to manual
    operations, although they may not be able to
    sustain such procedures beyond a limited time and
    may require additional manpower, equipment and
    transportation to affected sitesdifficult in a
    regional disaster
  • Impacts of rolling blackouts and prolonged
    outages on interdependent infrastructures are not
    well understood organizations want more data on
    effects on continuity of operations/business
    processes

16
Selected Findings, cont.
  • Integration of emergency management, physical
    security and cyber security remain rare within
    organizations due to terminology/cultural
    differences
  • Emergency Operations Centers (EOCs) lack
    procedures to determine when to activate for a
    cyber event there are no threshold criteria to
    gauge a significant attack is underway and no
    means to secure necessary data from affected
    organizations to judge disruption extent/impacts
  • There appeared to be minimal cross-organizational
    communication or interaction on
    interdependencies coordination across
    stovepipes seldom occurs and smaller
    organizations are not involved

17
Selected Findings, cont.
  • Cooperation and Coordination
  • There is increasing involvement by private sector
    organizations in regional preparedness planning,
    but the level of this involvement is still quite
    low. Utilities with a tradition of involvement
    in mutual assistance agreements showed the most
    advanced levels of cooperation for emergency
    response
  • Private sector organizations are reluctant to
    contact government agencies, because of concerns
    that their information could be subject to public
    disclosure, which could impact their market value

18
Selected Findings, cont.
  • There are no criteria for what constitutes a
    cyber threat or attack that can provide guidance
    to stakeholders as to what should be reported to
    government authorities
  • Moreover, organizations do not know how and to
    whom they should report a cyber attack, what
    information to convey, what would constitute a
    crime scene, or what information should be
    preserved for evidence

19
Selected Findings, cont.
  • Organizations do not commonly share information
    about security issues or disruptions with others,
    making it difficult to gauge the magnitude of
    threats, the cause of a disruption, and if indeed
    an attack, the extent of the damage done
  • Cross-border issues were not meaningfully
    addressed in the exercise, e.g., U.S.-Canadian
    interdependencies and associated challenges in
    the areas of communication/ information sharing,
    coordination, and roles and responsibilities

20
Selected Findings, cont.
  • Communications and Information Sharing
  • Although many government and larger private
    sector organizations demonstrated they have
    redundant communications in place, exercise
    participants did not seriously discuss the impact
    on communications if power and telecommunications
    outages and rolling blackouts continued more than
    a few days
  • It is unclear how Emergency Operation Centers
    (EOCs) would be activated or communicate with law
    enforcement or first responders if both cell and
    wired communication systems were down and the 800
    MHz system was also down

21
Selected Findings, cont.
  • There is a need to develop ways to share
    accurate, real-time information to understand
    interdependencies and how to respond/recover from
    regional disasters at the same time, the private
    sector is adverse for proprietary and legal
    reasons to share necessary data
  • There are impediments associated with sharing
    classified information with private sector
    organizations while security clearances are
    available to personnel with a need to know
    through the FBI and other federal government
    agencies, such clearances are difficult to obtain
    in a timely manner, if at all

22
Selected Findings, cont.
  • Roles and Responsibilities
  • Many participants described cyber incident
    management as confused or loose
  • The federal government has a number of
    organizations that have missions to respond to
    cyber incidents and there are also state and
    private sector response organizations and vendors
  • It was not clear to participants what role DHS
    elements and other federal agencies would play in
    a regional terrorist attack, particularly in
    cyber incidents

23
Selected Findings, cont.
  • Resource Management
  • Participants sought resources based on existing
    plans and procedures, but when forced to look
    outside their organizations were unaware of where
    to go for help if they did know where resources
    might be, they did not know how to access them
  • There is no resource inventory that could be
    utilized in a regional emergency or a resource
    management plan to set priorities and oversee
    allocation
  • It was not apparent in the exercise how local
    responders would have the resources to handle the
    terrorist attacks

24
Selected Findings, cont.
  • The private sector has resources that could be
    used in disasters that could be incorporated into
    regional preparedness planning legal and
    liability issues should be worked out in advance
    through mutual aid and other agreements
  • It is unclear what DOD assets could be available
    for use in a regional emergency and how such
    assets would be integrated into response and
    recovery efforts

25
Selected Findings, cont.
  • Public Information and Education
  • The scenario raised a number of questions,
    including when should the public be informed,
    what information is provided and how is this
    information disseminated and by what
    organization(s)?
  • Private and public sector employees, including
    those of community institutions, should have
    education and training on what they need to do in
    major emergencies and understand state and local
    plans and requirements
  • There should be a single point-of-contact for
    preparedness for each stakeholder who is
    responsible for interfacing with other POCs of
    regional organizations

26
Selected Recommendations
  • Encourage organizations to integrate their
    emergency management, physical and cyber security
    and incident response activities and personnel to
    provide a comprehensive approach to disaster
    preparedness
  • Develop tutorials on impacts of electric power
    outages, rolling blackouts and power surges, and
    other types of outages
  • Develop a collaborative initiative to identify
    and map regional interdependencies and develop
    the analysis systems that can assess linkages and
    impacts of disruptions, ascertain preparedness
    gaps and determine cost-effective mitigation
    measures

27
Selected Recommendations, cont.
  • Develop criteria to enable stakeholders to better
    determine when a significant cyber attack is
    underway rather than just a nuisance incident
  • Create a regional Cyber Security Council within
    the Partnership for Regional Infrastructure
    Security to foster collaboration and to establish
    cyber emergency response and recovery protocols
  • Develop a regional cyber emergency
    response/recovery plan that includes notification
    and threshold criteria for standing up EOCs for
    cyber attacks

28
Selected Recommendations, cont.
  • Develop a region-wide yellow-pages of
    points-of-contact for disaster preparedness for
    regional stakeholders and determine means to keep
    it up-to-date
  • Assist in the development of a model continuity
    of operations plan for small and medium
    organizations that focuses on interdependencies
    and cyber disruptions

29
Selected Recommendations, cont.
  • Undertake cyber vulnerability assessments of
    regional EOCs and other emergency response
    centers that can help identify cost-effective
    mitigation strategies to improve survivability
    and redundancy of IT and communication systems
  • Conduct a series of seminars/ workshops to expand
    general knowledge of cyber threats, attacks,
    disruptions, impacts and response and recovery
  • Hold targeted exercises and workshops to further
    explore regional interdependencies, including
    those that go beyond state and national borders
    use these events to test current practices,
    including resorting to manual operations

30
Selected Recommendations, cont.
  • Conduct an interdependencies seminar or exercise
    to examine U.S- Canadian cross-border disaster
    response issues and incorporate the lessons
    learned into bi-lateral discussions on
    cooperative activities
  • Develop a dictionary of terms and acronyms that
    includes cyber terminology to begin building a
    common language that all stakeholders can
    understand
  • Develop guidelines that take into account legal
    and proprietary issues to instruct organizations
    on when, how, and whom to notify about cyber
    threats/attacks

31
Selected Recommendations, cont.
  • Explore ways to provide expedited federal
    security clearances to enable dissemination of
    threat and classified information to those in key
    stakeholder organizations who have a
    need-to-know
  • Further develop NW-WARN as a regional mechanism
    for alerts/ and sharing information, and include
    cyber issues as a focus ensure that cyber
    security officials of infrastructures and other
    organizations are included
  • Explore establishing a regional Information
    Sharing and Analysis Center to enable key
    stakeholders to better exchange and assess
    physical and cyber threat-related information in
    a trusted environment

32
Selected Recommendations, cont.
  • Develop a better understanding among stakeholders
    of the National Response Plan and the National
    Incident Management (NIMS) System and how
    regional unified command will operate during a
    cyber attack explore the feasibility of
    incorporating key private sector organizations
    into NIMS
  • Encourage the federal government to identify a
    single point of contact within the U.S.
    Government to respond to cyber emergencies
  • Encourage the state to take the lead in working
    with local/federal agencies and other
    organizations in developing a roadmap of roles
    and responsibilities and what emergency services
    they offer

33
Selected Recommendations, cont.
  • Leverage existing efforts to develop a regional
    resource management plan that includes oversight
    of prioritization and allocation of equipment,
    supplies, and mission essential personnel
  • Develop a certification program for maintenance,
    medical, and other critical private sector
    personnel who will need to provide essential
    services in a regional emergency to enable them
    to travel unimpeded through security roadblocks
    or into other jurisdictions
  • Investigate how defense assets could be employed
    in a regional disaster and incorporate these
    assets into regional preparedness planning

34
Selected Recommendations, cont.
  • Establish a Web-based information resource for
    regional stakeholders that can be used to provide
    useful data for stakeholders and to function as a
    coordination and scheduling mechanism for
    exercises, seminars, conferences
  • Develop a training course for private and public
    sector employees, including community
    institutions, on what they need to do in major
    emergencies and familiarize them with state and
    local plans
  • Develop a training course for public information
    officers and media on physical and cyber threats
    and impacts and include these individuals in
    workshops and exercises

35
Next Step Action Plan
  • BLUE CASCADES II participants will reconvene
    November 12 to discuss the exercise results and
    develop a set of activities and pilot projects
    (an Action Plan) to improve regional readiness
  • The Action Plan will
  • Be comprised of short-term, low-cost solutions
    and mid and longer-term actions that will require
    larger investments
  • Build on already existing public and private
    sector plans and technologies
  • Partnership members will work collectively to
    define requirements, including project leads,
    oversight procedures, funding needs and sources
    of support

36
Requirements for Success
  • Leadership at the municipal, county, and state
    level is essential to the successful
    implementation of the Action Plan
  • Particularly important will be the encouragement
    and support of DHS and other relevant federal
    agencies
  • Bottom line lessening interdependency-related
    preparedness gaps and achieving a disaster
    resilient region depends on regional stakeholders
    taking the necessary steps

37
Need for Regional Approach
  • Addressing interdependencies requires
  • Involving all key stakeholders in
    partnershiputilities, businesses, community
    institutions, counties, states/provinces, federal
    government (civilian and defense), academe,
    non-profits
  • Both individual organizational and collective
    efforts
  • Getting rid of assumptions and insular thinking,
    and demonstrating willingness to do things
    differently

38
Need for Regional Approach, cont.
  • Developing a regional strategy that includes
    prevention, protection, deterrence, vulnerability
    assessment, risk-based mitigation,
    response/recovery, training, exercises, RD
  • Focusing on physical, cyber, chemical,
    biological, radiological threats and
    disruptionsand associated interdependencies
    deliberate acts and all hazards (including
    systems failure and human error)
  • Information sharing on a regional basis
  • Bottom uptop down commitment and support

39
Contact Information
  • Pacific NorthWest Economic Region (PNWER)
  • 2200 Alaskan Way, Suite 460
  • Seattle, WA 99121
  • URL www.pnwer.org
  • Matt Morrison
  • Executive Director
  • Tel (206) 443-7723
  • Email Matt_at_pnwer.org
Write a Comment
User Comments (0)
About PowerShow.com