Communications Litigation Today was a service of Warren Communications News.

Trade associations in information technology (IT) and telecom sec...

Trade associations in information technology (IT) and telecom sector submitted plan to federal govt. on steps they said were needed to ensure operational continuity of nation’s communication networks. CTIA, Information Technology Assn. of America (ITAA), TIA and USTA submitted plan to NTIA Dir. Nancy Victory and to Richard Clarke, chmn. of President’s Critical Infrastructure Protection Board and cybersecurity adviser to President. Plan is intended to be incorporated into “National Strategy” on infrastructure protection, which is to be released in July. Document includes several “first principles,” including: (1) Put critical infrastructure assurance into context. IT and telecom sector must realize that its products and services are used to protect infrastructure assets of other sectors. (2) Look at how roles are established and partnerships are built. (3) Consider next steps. CTIA, ITAA, TIA and USTA are sector coordinators responsible for developing sector-specific input for the strategy. Report noted that last July, impact of computer worm Code Red was mitigated by “rapid mobilization” of Internet community, including National Security Council, FBI’s National Infrastructure Protection Center, Commerce Dept.’s Critical Infrastructure Assurance Office, Defense Dept.’s Joint Task Force for Computer Network Operations, AOL, UUNet and others. “The experience validates the existence and capability of a virtual emergency response network within the I&C Sector,” report said. “Attacks will no doubt continue into the future, although the type and severity of the event is apt to change. It is not yet clear whether the ad hoc nature of the emergency response team is beneficial, allowing participants to vary as attacks vary, or whether a more formal mobilization process is warranted.” Report said answering that question was important next step. It said “uneven international response” to Code Red worm demonstrated need for more international solutions to critical infrastructure assurance. One possibility is creation of international critical infrastructure assurance coordinating center that would promote sharing of best practices in information security and coordination on cybercrime incidents. Other “next steps” include: (1) Ascertaining legislative initiatives, such as tax credits, that may be needed. (2) Assessing vulnerabilities that “may be created as the public increasingly uses wireless devices and wireless LANs to conduct Internet-based transactions.” (3) Ascertaining what additional vulnerabilities are created “as the public increasingly uses wireless devices and wireless LANs to conduct Internet-based transactions.”