Yes, I agree.  I talked to our CEO here at counterclaim, and confirmed 
that we could be listed in such a compilation.  On another note, he and 
I are both part of an InfraGard group that has formed (actually, 
transformed from another high-tech forensics group) up in Portland.  See 
www.infragard.net for details, or 
http://www.fbi.gov/pressrel/pressrel01/infragard.htm for the original 
Jan2001 announcement)  We've discussed starting up a local chapter, and 
I'd like to get a show of hands for interest.  Here are some quotes 
(from the second link) regarding InfraGard's mission:

The National InfraGard Program provides four basic services to its 
members: an intrusion alert network using encrypted e-mail; a secure 
website for communication about suspicious activity or intrusions; local 
chapter activities and a help desk for questions. The critical component 
of InfraGard is the ability of industry to provide information on 
intrusions to the local FBI Field Office using secure communications in 
both a "sanitized" and detailed format. The local FBI Field Offices can, 
if appropriate, use the detailed version to initiate an investigation; 
while the NIPC at FBI Headquarters can analyze that information to 
determine if the intrusion is a broader attack on numerous sites. The 
NIPC can simultaneously use the sanitized version to inform other 
members of the intrusion without compromising the confidentiality of the 
reporting company. In addition, the secure website contains a variety of 
analytic and warning products that can be made available to the 
InfraGard community.

"The InfraGard Program allows law enforcement and industry to work 
together and share information regularly, including information that 
could prevent potential intrusions into our national infrastructure," 
said Attorney General Janet Reno. "Building bridges between law 
enforcement and the public and private sector is one of the most 
important ways we can protect ourselves from these threats."

If you're not personally ready to interact on this level (being 
anti-big-bro like a typical open-source zealot, or just plain paranoid 
like a good security admin), then I suggest at LEAST keeping up on the 
latest reports from www.nipc.gov, which have to do with all sorts of 
vulnerabilities in our critical infrastructure.  Cheers, all!

       Ben Barrett

Reply via email to