History
 
 DHS&EM 30 January 2008 Situation Report 08-030Postmark
Home • dailysitrep • DHS&EM 30 January 2008 Situation Report 08-030
 
From:Wednesday, January 30, 2008 12:05 PM -0900
Subject:DHS&EM 30 January 2008 Situation Report 08-030 
To:
Attachments:
STATE OF ALASKA
DIVISION OF HOMELAND SECURITY
AND EMERGENCY MANAGEMENT

SITUATION REPORT 08-030 (as of 11:00 AM, January 30, 2008)

Homeland Security Advisory System – National Level:  Yellow-Elevated
Homeland Security Advisory System – Alaska Level:  Yellow-Elevated
Maritime Security (MARSEC) Level – Level I – Low.
Military installations in Alaska are at FPCON A.
State of Alaska Cyber Security Alert Level: Guarded
World Health Organization Pandemic Phase - Phase 3: No or very limited human-to-human transmission (An Influenza Pandemic situation report, which contains an explanation of the WHO Pandemic Phases, is attached to this situation report and updated every Tuesday)

Threat Level Changes
No change.

State of Alaska Situation
(Updates to this section from previous Situation Report are in Italics)

DHS&EM
DHS&EM’s new Emergency Operations Center Manager is Claude Denver.  He replaces Tom Smayda who now works for the Matanuska-Susitna Borough.

StateAlaska Fuel Shortages
The SECC continues to monitor and work with communities in rural Alaska that are facing fuel shortages and/or power generation problems.  The SECC is coordinating with local, state and federal agencies and other organizations to ensure that the situation in these communities does not reach the point of becoming a disaster emergency.

Current weather warnings and watches for Alaska can be found at the following National Weather Service web site:  http://www.arh.noaa.gov/

DOT&PF Road Information:  can be found at http://511.Alaska.gov/ or by calling 511.

Homeland Security
Alaska
New Trojan Intercepts Online Banking Information. A new Trojan virus known as Trojan.Silentbanker is able to intercept infected users bank account information during a transaction. The virus circumvents the two-factor authentication process by changing a customer's account details to the hacker's account. After the change is made, the user still sees the same screens they would if they were performing a normal transaction, but they are inadvertently transferring funds to the hacker's account.  Source: PC World (01/14/08); Reed, Brad (go to web site)

Dead spy satellite could hit Earth within a month, officials say. A large U.S. spy satellite has lost power and could hit the Earth in late February or early March, government officials said Saturday. The satellite, which can no longer be controlled, could contain hazardous materials, and it is unknown where on the planet it might come down, they said. It was not clear how long ago the satellite lost power, or under what circumstances. “Appropriate government agencies are monitoring the situation,” said a spokesman for the National Security Council. “Numerous satellites over the years have come out of orbit and fallen harmlessly. We are looking at potential options to mitigate any possible damage this satellite may cause,” he said. He would not comment on whether it is possible for the satellite to perhaps be shot down by a missile. A senior government official said that lawmakers and other nations are being kept apprised of the situation. Such an uncontrolled re-entry could risk exposure of U.S. secrets, said a defense and intelligence expert. He estimated that the spacecraft weighs about 20,000 pounds and is the size of a small bus. He said the satellite would create 10 times less debris than the Columbia space shuttle crash in 2003.  Source: January 27, Associated Press – http://www.foxnews.com/story/0,2933,325829,00.html

FBI warns of tax-rebate scam. If lawmakers pass an economic-stimulus package, it could mean people will receive a check in the mail. Some families could receive thousands of dollars. But the FBI is warning that some people are using the story to steal. Scammers, pretending to be IRS agents, are calling unsuspecting people, asking for Social Security numbers and other personal information so a refund check can be sent. An FBI special agent said they have four reports so far in the Kansas City area. He said scam artists are doing what is called phishing -- fishing for unsuspecting victims. The tax-rebate plan has not even been approved by Congress yet, and the IRS will never ask for personal information on the phone or in an e-mail.  Source: January 28, KMBC 9 Kansas City http://www.kmbc.com/news/15152423/detail.html

National
Super Bowl deemed a target in federal threat assessment. The upcoming Super Bowl game will be a desirable target for terrorists, according to a threat assessment by federal security officials, which outlines several scenarios of possible attacks and security precautions for the February 3 event. Domestic and international terrorists have targeted major sporting events in the past, including the 1972 Munich and 1996 Atlanta Olympic Games, said the assessment compiled by the FBI and Homeland Security Department. The assessment, dated January 14 and obtained by the Washington Times, reminds law-enforcement officers of past incidents near stadiums, including an October 2005 incident in which a University of Oklahoma student blew himself up near the Gaylord Family-Oklahoma Memorial Stadium. It also warns that many thefts of government and law-enforcement property that could be used to facilitate entry have been reported in Arizona. Since October 2004, the Arizona Counter Terrorism Information Center has received more than 300 reports of thefts from fire, first responder, military, and police personnel including from those in the Phoenix area, where the game will be played.  Source: January 25, Washington Times –

Vishing Attacks Rise Alarmingly, Internet Crime Complaint Center Warns. A new wave of security attacks has been reported by the Internet Crime Compliant Center that asks consumers to provide personally identifiable information through mobile phone browsers or by requesting it over the phone. The vishing attacks, otherwise known as voice phishing, send text messages indicating users' bank account information has been tampered with and the user must access their account by clicking on a fraudulent link to resolve the situation. Users are also encountering vishing schemes involving calling a pseudo bank telephone number to clear the alleged security problems regarding their account; an automated "bank" greeting then prompts the user to provide their card numbers. The criminals waging the attacks have attempted to brand themselves as legitimate parties by inserting their own malware warnings and cautioning users about fraudsters. Similar attacks have been reported by the IC3 involving impersonation of FBI officials and agents, employing actual letterhead or images from the federal agency to appear legitimate. The IC3 has warned users to contact their financial institutions using phone numbers from sound sources such as bank statements.  Source: Network World (01/18/08) (go to web site)

Pacific Rim
(Nothing crucial to report)

International
Pakistan Nuclear Chief Confident in Security of Weapons. Lt. Gen. Khalid Kidwai, chief of Pakistan's nuclear program, said that the nation's nuclear arsenal is safe. Recent political turmoil in the country raised fears that nuclear material could be at risk of theft by Islamic militants or rogue elements of the military. Kidwai held a briefing for foreign journalists Saturday at a military base in Rawalpindi, describing the security system for the nuclear program as "foolproof." He said that there are approximately 10,000 soldiers guarding the nuclear weapons, though he did not disclose how many weapons the country has. Pakistan is believed to be in possession of around 50 nuclear warheads. The Bush administration recently offered assistance in improving security, and presidential candidate Sen. Hillary Clinton said that she would ask President Pervez Musharraf to allow a U.S. security team to enter the country to aid with security.  Source: Dallas Morning News (01/27/08) (go to web site)

The Next Situation Report: will be published as of 11:00 AM, January 31 2008. A significant change in the situation or the threat level will prompt an interim report. Please direct questions regarding this report to the SECC at 907-428-7100 or secc@ak-prepared.com.

How to reach the Division of Homeland Security and Emergency Management: Phone the State Emergency Coordination Center (SECC) by dialing (907) 428-7100 or 1-800-478-2337, 24 hours per day.  Information on emergency topics is available on the Division's web site at http://www.ak-prepared.com.  Homeland Security information may be found at http://www.ak-prepared.com/homelandsecurity/

How to reach the Division of Administration – State Cyber Security Program:  If you have questions you may contact Darrell Davis, State Computer Security Officer darrel.davis@Alaska.gov.

For further information:
Being prepared: Ready.gov
Countries:              U.S. State Department Background Notes.
Maps:           United Nations Cartographic Section
                University of Texas Library Map Section.
                        http://www.state.gov/documents/organization/20120.pdf