Is anyone running an automated Terror Alert system that's
real time with the DHS?
-M
On Thu, Feb 20, 2003 at 08:08:58PM -0500, Richard Irving wrote:
> Yes.
>
> But, until elections 2004, the "FUD" field is hardcoded to "High".
>
> However, if there are changes to the -=actual=- dhs.gov status,
> it sends out an automatic Amazon.Com order for
> Hip Boots for all members of the
nnigan" <[EMAIL PROTECTED]>
To: "Richard Irving" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Thursday, February 20, 2003 8:27 PM
Subject: Re: Homeland Security Alert System
>
> On Thu, Feb 20, 2003 at 08:08:58PM -0500, Richard Irving wrote:
> > Yes
--
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Martin Hannigan
Sent: Thursday, February 20, 2003 9:27 PM
To: Richard Irving
Cc: [EMAIL PROTECTED]
Subject: Re: Homeland Security Alert System
On Thu, Feb 20, 2003 at 08:08:58PM -0500, Richard Irving wrote:
> Yes.
>
> But, u
Ok,
What we really need is something like what NOAA has for space weather:
http://www.maj.com/sun/noaa.html
Currently, the weather is "active and unsettled"...
Eric :)
On Thu, 20 Feb 2003, Martin Hannigan wrote:
> Is anyone running an automated Terror Alert system that's
> real time with the DHS?
CNN (or Fox, MSNBC, etc) news satellite feed (for national alerts)
Radio Shack National Weather Service Alert radio (for local alerts)
Individual states have other a
ult of a specific threat to
Telecomm, so get with the ISAC instead.
Jim
-Original Message-
From: Martin Hannigan
To: [EMAIL PROTECTED]
Sent: 2/20/03 7:35 PM
Subject: Homeland Security Alert System
Is anyone running an automated Terror Alert system that's
real time with the DHS?
-M
At 01:44 AM 2/21/2003 -0500, Sean Donelan wrote:
On Thu, 20 Feb 2003, Martin
Hannigan wrote:
> Is anyone running an automated Terror Alert system that's
> real time with the DHS?
CNN (or Fox, MSNBC, etc) news satellite feed (for national alerts)
Radio Shack National Weather Service Alert radio
On Fri, 21 Feb 2003, Martin Hannigan wrote:
> But what would you do with the information?
>
> Let the noc know what's up so they can be more vigilant based on the the
> threat level.
I'm not trying to be sarcastic, because lots of people have been going
through these same conversations.
"T
Okay, I'll bite...
--- Sean Donelan <[EMAIL PROTECTED]> wrote:
>
> On Fri, 21 Feb 2003, Martin Hannigan wrote:
> Isn't your NOC normally vigilant?
Of course.
> > Perhaps even use different sets of ACL's on the
> edge, etc. It could also
> > be used
> > to explain an unexpected surge in tra
David, what does "from" mean in your "rules"?
with .cc at the end? But there are very many
places with addresses in TLDs and ccTLDs other
than the geographical location.
passing through an AS known to be in a given
location?
Peter
Peter,
I didn't say that I did that, only that I know that
there are networks which deny all mail traffic from
certain ASes and/or TLDs on a fairly regular basis.
Personally I don't have a problem with .cc
I would say that for a US operator to respond to a
threat by enabling additional, tempora
>conf t
router> warning you cannot configure a router
with this one
Martin Hannigan wrote:
> I have my duct tape and plastic, but haven't applied it to the
> windows.
I hear it is more effective, if you wrap the plastic
around your head, and seal it with the duck tape
Never had a -
On Fri, 21 Feb 2003 14:41:05 EST, Martin Hannigan said:
> Example: DHS sets RED level. Reaction: Move some third level
> engineers into the SOC. Audit the DR plan if it's not on schedule
> to be audited. Audit the backup plans if not on schedule to be
> audited. Light the medium warm NOC to HOT N
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
> Behalf Of David Barak
>
> Well, an example could be "if threat level is yellow,
> permit traffic from $foreign_country_x, but if it goes
> to orange, deny all from $foreign_country_x, or
> perhaps log all from
On Fri, Feb 21, 2003 at 03:32:12PM -0500, [EMAIL PROTECTED] wrote:
> On Fri, 21 Feb 2003 14:41:05 EST, Martin Hannigan said:
>
> > Example: DHS sets RED level. Reaction: Move some third level
> > engineers into the SOC. Audit the DR plan if it's not on schedule
> > to be audited. Audit the backu
quot;Richard Irving"
> <[EMAIL PROTECTED]>
> Cc: <[EMAIL PROTECTED]>
> Subject: Re: Homeland Security Alert System
>
>
> "People who bought HIP BOOTS also shopped for:
> * Duct Tape
> * Jack Daniels
> * Def Leppard CD's
> * Clean Underwear"
&
I'm certain the government folks working to protect us 24x7 are doing
everything they can, but the fact of the matter is the public alert
systems in the US suck. Some just suck less.
http://www.nj.com/news/gloucester/index.ssf?/base/news-0/104590500555170.xml
"Butts said he often finds out a
> ISPs and other communication providers should be prepared to share
> information directly and quickly with each other. If you wait to hear
> from government officials to decide what sanitized information to share,
> it will be hours later. If ever.
If anybody is interested here, I did put to
- Original Message -
From: "Sean Donelan" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Saturday, February 22, 2003 1:47 PM
Subject: Re: Homeland Security Alert System
>
> I'm certain the government folks working to protect us 24x7 are doing
>
..Once again, reason to pursue getting involved with the Telecomm ISAC.
Jim
-Original Message-
From: Sean Donelan [mailto:[EMAIL PROTECTED]
Sent: Saturday, February 22, 2003 6:47 PM
To: [EMAIL PROTECTED]
Subject: Re: Homeland Security Alert System
I'm certain the government
On Mon, 24 Feb 2003, St. Clair, James wrote:
> ..Once again, reason to pursue getting involved with the Telecomm ISAC.
Or FIRST, IT-ISAC, MSC-ISAC, WW-ISAC, ISP-ISAC, IOPS,
22 matches
Mail list logo