Yes, I agree. I talked to our CEO here at counterclaim, and confirmed
that we could be listed in such a compilation. On another note, he and
I are both part of an InfraGard group that has formed (actually,
transformed from another high-tech forensics group) up in Portland. See
www.infragard.net for details, or
http://www.fbi.gov/pressrel/pressrel01/infragard.htm for the original
Jan2001 announcement) We've discussed starting up a local chapter, and
I'd like to get a show of hands for interest. Here are some quotes
(from the second link) regarding InfraGard's mission:
The National InfraGard Program provides four basic services to its
members: an intrusion alert network using encrypted e-mail; a secure
website for communication about suspicious activity or intrusions; local
chapter activities and a help desk for questions. The critical component
of InfraGard is the ability of industry to provide information on
intrusions to the local FBI Field Office using secure communications in
both a "sanitized" and detailed format. The local FBI Field Offices can,
if appropriate, use the detailed version to initiate an investigation;
while the NIPC at FBI Headquarters can analyze that information to
determine if the intrusion is a broader attack on numerous sites. The
NIPC can simultaneously use the sanitized version to inform other
members of the intrusion without compromising the confidentiality of the
reporting company. In addition, the secure website contains a variety of
analytic and warning products that can be made available to the
InfraGard community.
"The InfraGard Program allows law enforcement and industry to work
together and share information regularly, including information that
could prevent potential intrusions into our national infrastructure,"
said Attorney General Janet Reno. "Building bridges between law
enforcement and the public and private sector is one of the most
important ways we can protect ourselves from these threats."
If you're not personally ready to interact on this level (being
anti-big-bro like a typical open-source zealot, or just plain paranoid
like a good security admin), then I suggest at LEAST keeping up on the
latest reports from www.nipc.gov, which have to do with all sorts of
vulnerabilities in our critical infrastructure. Cheers, all!
Ben Barrett