The purpose of Poetslife is to promote the art and discipline of American Tactical Civil Defense for families and small businesses and to contribute practical American civil defense preparedness guidance for all Americans through my articles in the The American Civil Defense Association (TACDA.ORG) Journal of Civil Defense and leadership as the volunteer Vice President of TACDA.

5/10/2023

When State Hackers Take Aim at the Power Grid

“To me, the most terrifying form of warfare would be if there was some simultaneous cyber attack on our grid, on the banking system, and on our transportation system. That would be quite a devastating thing, and yet in theory, absent some real protective measures, that could happen.” – Wilbur Ross , U.S. Secretary of Commerce, Senate Commerce, Science and Transportation Committee, Confirmation Hearings,   1/17/2017

Unfortunately, the prescient warning by U.S. Secretary of Commerce Wilbur Ross has only become more serious since 2017.
To bone up on cybersecurity and other natural and manmade disasters, search 65 years of the Journal of Civil Defense by The American Civil Defense Association (TACDA.ORG).
I am the volunteer vice president and can vouch for TACDA's deep experience in civil defense protecting American families since 1962.
Recently, much of our work, of necessity, has been learning about and presenting cybersecurity hardening options.

Two Tools to Mitigate Cyber Threats

One of the greatest myths about cyber attacks is that they only strike big companies.
That is false because big companies employ hundreds of information technology (IT) and defensive cyber operations (DCO) professionals.
Result?
They suffer business losses due to cybersecurity attacks far less frequently than smaller and mid-size enterprises.
The situation changed recently with the creation of Adlumin.
Their platforms offer tools smaller and mid-sized enterprises can employ to detect and countermand cybersecurity attacks.
If you are a larger company, possibly the best cybersecurity firm currently is Dragos
If you have cybersecurity issues, in addition to the help those listed in the table below. be sure to contact Dragos for assistance.
There are overseas criminal organizations that work 24/7/365 to take down your business for profit.
The biggest criminal organization is the Communist Chinese Party (CCP).
The CCP uses "Unrestricted Warfare" (war by hundreds of means instead of kinetic warfare) to take down non-CCP businesses in the West.
They view it as a zero-sum game: They win if you lose.
Here is an excellent documentary that details this operation.

Cybersecurity SITRP 

The question is no longer IF hackers will take aim at the power grid. 
They already have. 
As one example, stories of hackers penetrating our energy sector regularly appear in the news.
See, for example, “Dragonfly: Western energy sector targeted by sophisticated attack group...Resurgence in energy sector attacks, with the potential for sabotage, linked to re-emergence of Dragonfly cyber espionage group.” (https://www.symantec.com/connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-group).
            Or, from the New York Times: “Since May [2017], hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities, as well as manufacturing plants in the United States and other countries."
            Among the companies targeted was the Wolf Creek Nuclear Operating Corporation, which runs a nuclear power plant near Burlington, Kansas ((July 6, 2017 https://www.nytimes.com/2017/07/06/technology/nuclear-plant-hack-report.html).
            Enter “hacker’s + power grid” in a search engine and see just how this prior abstract danger has become a clear and present one. 
             Recently, U.S. prosecutors have charged three Chinese "citizens" from Guangzhou with hacking into various businesses (Siemans, Moody's, etc.) to steal their secrets. The indictments were handed down in Federal court in Pittsburgh regarding attacks for the past six years. (Click here for details.) 
    Given the ease with which such foreign actors prey on our systems, there is every reason to believe they can, do, and will undertake the same attacks on our power grid. 
            Unfortunately, the most common image of a hacker is the one created by Hollywood...usually a smart, gifted if lonely teen in his bedroom with a hankering to explore the deep recesses of the Web. (Think of Matthew Broderick in the movie WarGames.)         
 The real world of real hackers is very different.
For example, the Communist Chinese Party (CCP) has entire divisions in their military devoted to hacking, discovering and exploiting American infrastructure vulnerabilities. 
They have a 10,000 year history of conquest using stealth and deception to exploit their enemies weakness to their benefit, and they are following this strategy to conquer the world via hacking operations carried out 24/7/365.
Their genius is that they pair a hacker criminal, say from Hong Kong, with a disciplined lieutenant colonel from the Red Chinese People’s Liberation Army (PLA). 
It is a variation on the old option judges would give teens in this country: jail time or join the U.S. Marines.
The Red Chinese version is they give the Chinese national hackers they arrest the option of jail time or — use your hacking skills to advance the superpower ambitions of the Communist Chinese Party.
The Red Chinese learned decades ago it was easier to steal American technology advances to accelerate their economic development in a spectacularly rapid pace. 
They have continued this strategy in the cyberwar sphere. Their command strategy has as its first tenant the taking down of digital capabilities in the US. 
Taking out our power grid is a primary tenant of that strategy.  They prefer to take our systems down in a digital manner without dropping one bomb or firing one bullet.
And they are succeeding in their probing until they decide to launch the apocalyptic cyber-attack on our energy grid.
They are not alone. North Korea, Russia, Iran and other nations have the same plans.
“Incidents of foreign network penetration and espionage …conducted by the Chinese government have recently become both more frequent and more clearly attributable to the People’s Liberation Army (PLA) rather than independent nationalist hackers, and 33% of all cyberattacks in the third quarter of 2012 seemingly originated from China.”
This PLA attack on our critical infrastructure was identified over five years ago and has only increased in the intervening years.
Unfortunately, they are not alone. There are many other nations (Russia, North Korea, Iran, etc.) that have realized the same strategy. And they are probing and penetrating our systems daily. 
Cybersecurity — the ability to protect or defend the use of cyberspace from cyberattacks — is a goal that requires many layers, much creativity, and eternal vigilance. 
Below I list organizations that exercise those skills daily.

What is to be Done

In the world of cybersecurity, given the potential harm that can be done immediately to our entire way of life, the old reactive strategy (Think —Decide—ACT) has been replaced by a proactive strategy (Decide—Act—Think). 
The Websites below act as the cybersecurity canary in the dark Web mine. 
To be proactive, you need a proactive toolset. 
Signs of an impending cyberattack may be identified by such entities before the actual attack starts. The organizations below will be among those who are the first line of defense to that attack.
    The good news is we have quiet professionals, cybersecurity experts, who daily countermand the cyber hackers. 
They would be the first line of defense were the current probes turn into a complete attack on the power grid. 
I highlight some of our canaries below.

Who Handles the Hackers — Private Sector

There are numerous private sector companies that handle the day-to-day threat of hacker probes and penetrations of our critical infrastructure.  
Were there to be a hacker attack on the power grid, they are the first line of defense. A few are listed below.

Organizations
Description
CyberSecure IPS
Provides protection against critical infrastructure intrusion attempts and dispatches first response teams in real-time.
Palo Alto Software
Software prevention to reduce cybersecurity risk to a manageable degree.
Advanced Persistent Threat (APT) Groups and Operations
The sheet is maintained by a select group of editors and includes data of APT activity (by China, Russia, Iran, North Korea, etc.), their tools, operations, and targets.
FireHOL IP Lists
Analyzes security IP feeds to identify cybercrime and malware trends and data analytic tools to track unique IPs.
IBM X-Force Exchange
Exchange threat platform (malicious IP addresses, botnet distributions) with a security intelligence blog and forum for responders to post information on common vulnerabilities.
Malware Check
Monitors URLs for suspicious malware, virus, worm, phishing and other activity by a search engine.
MalwareTech Botnet Tracker
Tracks active botnets by looking at their type, geographic distribution, and unique IPs on a live map that displays every incident and type that has occurred in the past 5 minutes.
Phishtank
Current, community based tracking of domains connected to phishing attacks along with downloadable databases.
SysAdmin, Audit, Network and Security (SANS) Institute Internet Storm Center
Offers data and analysis on future threat hunting trends and malware threats

 Who Handles the Hackers - Government

Just as the private sector has organizations that will be the first line of defense against an attack on the power grid, there are numerous government organizations that handle the day-to-day threat of hacker probes and penetrations of our critical infrastructure. A few are listed below.

Organization
Description
Electricity Subsector
Coordinating Council
(ESCC)
The ESCC serves as the principal liaison between the federal government and the electric power sector, with the mission of coordinating efforts to prepare for national-level incidents or threats to critical infrastructure.
The National Cybersecurity and
Communications Integration Center
(NCCIC)
Part of the Department of Homeland Security that would act as the central command point where the government collects and analyzes data on the impact of any hacker attack on the power grid.
Department of Homeland Security (DHS) AIS (Automated Indicator Sharing)
Automated indicator sharing to help government and private sector entities exchange info on threat indicators.
Supervisory Control and Data
Acquisition Systems
(SCADA)
Software used by manufacturers, nuclear plant operators and pipeline operators to monitor variables to monitor and diagnose unexpected problems, such as a hacker attack.
The United States House
Permanent Select Committee
on Intelligence (HPSCI)
https://intelligence.house. gov/cyber/
Cyber criminals, often supported by hostile governments, are increasing their attacks on U.S. networks and American businesses. The HPSCI acts to mitigate this growing problem.
The National Security
 Agency  (NSA)
Part of the U.S, DOD, under the authority of the Director of National Intelligence, that protect U.S. Communications networks and IT systems.
The North American Electric Reliability Corporation (NERC) https://www.ferc.gov/industries/ electric/indus-act/reliability/cybersecurity.asp
Regulatory authority that assures the reliability and security of the bulk power system in North America.
U.S. Security and
Exchanges Commission (SEC)
Identifies and manages cybersecurity risks and ensures that market participants — including issuers, intermediaries, investors and government authorities.
National Institute of
Science and Technology  (NIST)
Practical, innovative security technologies and methodologies that enhance the country’s ability to address current and future computer and information security.

        Fortunately, everyday there are highly gifted, very creative, and extremely skilled American cybersecurity and engineering experts manning the protective firewalls of the cloud and network-based data systems in this nation. 
I know because I’ve worked with them.
They are well aware of the challenge. They know their duty. They are quiet professionals as important in the cyber world as the Special Forces quiet professionals we depend on every day are in the physical world,.
And they deserve the same level of respect, resources and support.

#James Dohnert, ‘Akamai study finds a third of all cyber-attacks originate from China’, V3.co.uk, 25 January 2013, http://www.v3.co.uk/v3-uk/news/2238996/akamai-studyfinds-a-third-of-all-cyber-attacks-originate-from-china.

For more information, see https://www.washingtontimes.com/news/2017/dec/28/electric-power-research-institute-wrong-about-powe/

And here

The CCP is the greatest threat to our national cybersecurity. For more detail, click here.

5/05/2023

Substack: Free Speech Rises

Please join me on Substack.

It is a free speech platform where many of the best minds around are sharing ideas that will help you know the truth from the lies. 

Given our present culture, that is a critical survival gift.

I noticed last year a number of intellectuals I respect had migrated to Substack. 

When I saw more and more of them there, I began to look into it. Now, I post my civil defense strategies, tips, and knowledge there.

Why?

Because on Substack you will find the good, the true, and the beautiful...the opposite of what our current culture promotes. 

Here are a few of my posts on Substack.

Farmers Markets: Solution to American Food Shortages

Children Need Civil Defense Skills

Cybersecurity for Your Family

Data and Situational Awareness

When State Actors Take Aim at the Power Grid

Overcome the despair by following the eternal wisdom. 

Join us at Substack..


5/02/2023

Cybersecurity for Your Family


Cybersecurity is Everyone's Business

Like civil defense, cybersecurity is everyone's business and is especially critical for families.

Protection from cyberattacks is no longer just the business of the government or experts. It is a fundamental responsibility of every American family.

You must know how to defend against social engineering ruses, phishing attacks in all their variations, cell phone calls from cybercriminals, and other cyber threats. 

More importantly, you must train your children and grandchildren in the tools they need to deflect and defeat and triumph over these real-world threats to their freedom.

Daily, small businesses and average Americans are being fleeced out of money by cybercriminals. 

Some of these operate on their own. 

Some are employed by their governments like the Communist Chinese Party (CCP) 50 Cent Army

And some cybercriminals act on their own and with their governments approval to steel money, intellectual property, property like home titles, reputations, and other goods and services from Americans.

WWIII has already begun, but it is not being fought with tanks and ships. Rather, it is a battle of 1's and 0's being waged over fiber optic lines worldwide.

I have already addressed state-sponsored hackers in my civil defense blog post When State Hackers Take Aim at the Power Grid.

Here, I will analyze what you can do when criminals and hackers strike at you and your family. 

Why? Because our mastery of cybersecurity will determine if our children and grandchildren are free or slaves.

Predator Cybercriminals Prey on Americans Daily

Everyday, Americans are fleeced out of millions of dollars by predator cybercriminals, mostly foreigners.

What you read in the media of cybercriminals stealing millions from Americans is the tip of the iceberg. The issue is much bigger as most companies, and individual Americans, are so ashamed to have fallen for a grift they do not report it to law enforcement.

And even if they do report it to law enforcement, local law enforcement does not have the resources to investigate it. And national law enforcement knows that most cybercriminals are overseas and, therefore, the reality is that 99.9% of them will never be caught or prosecuted.

You are on your own.

So you need to learn to identify cybercriminals when they attempt to manipulate you to gain access to your credit card, money, bank account, or data. 

How to Protect Your Data and Money from Cybercriminal Cell Phone Calls

There are many variations on this attack, but it goes something like this.

Out of the blue, you get a call. It is not from family or friends or anyone you know. On the other end, someone identifies themselves as a representative from Microsoft and says your computer has been hacked and they need to take over your system to help protect your data.

Or you get a call and a cybercriminal claims they are the police and your grandchild needs $1,000 bail or they will spend the night in jail.

Americans are a good, honest, and trusting people. This is a character trait that is exploited by the predator criminals.

So they will bait with something clever like, "I am calling from your bank because there has been unusual activity on your account."
When you get these calls, hang up.
They have a more sophisticated way to get your data and money than any door-to-door salesman you would turn away.

They are trained.
They are skilled.
They are clever.
They are devious.
They will manipulate you.

Do not allow them to have access to you or your thoughts.
Much as you think you would not fall for their scams, they are professionals at grifting and will fleece you out of your assets.
I have known multiple cases of very wealthy and successful people who have been fleeced by these cybercriminals.
Like them, you will not even realize it until after you are robbed.

Check your Bank Accounts for Unusual Activity

The most common grift for cybercriminals is that they will gain access to your credit card or checking account and try to run a $9.99 or some other small amount to see if it clears.
If it does, they return and clean out your account.
I had this happen 3 months in a row with 3 different debit cards.
The cybercriminal would try to put through small $9.99 charges on my debit card. When I noticed them as they were for gaming sites and I do not game, I contacted my bank and got a new card.
But the scumbag was able to access the next 2 cards.

How?

Neither I nor my bank could find out.
But this is a common scam and one you can prevent by closely monitoring your checking, savings, debit and credit accounts for unusual charges or activity.
True, your bank can identify certain unusual activities, but not all.
You are on your own.

Practice Zero Trust

Only answer your cell phone if you know the number or person calling.
If you do not recognize the number, do not answer.
If the person calling is legitimate, like a call from a doctor's office, they will leave a message.
Dishonest cybercriminals, for the most part, will not leave a message.
They will simply move on to the next mark.

Americans are a good, intelligent, honest, and trusting people.
This is not true of much of the world.
Here is an example.
I have given out 5,000 TACDA.ORG (The American Civil Defense Association) business cards in the past 3 years.
Mostly, I identify Moms with children (often at Mass on Sunday) and small business owners and workers (plumbers, electricians, painters, HVAC repairman, telephone and fiber line repairman, construction workers, truck drivers, sales clerks, policeman, fireman, and many others.
I approach them and say, "I am a civil defense volunteer with the American Civil Defense Association. 
The information on this card will help keep you and your family safe from natural and manmade disasters. Please spread the word to other Americans."
Of the 5,000 Americans I have approached, only 2 have refused to take my card.
Why?
Because American's are good, intelligent, honest, and trusting people.
And they know I am only trying to help them and my family.

I do not identify a mark to use to commit a crime.
American's know that, trust me, and take the card as they know it is of benefit to them and their families to keep them safe.

Not so with foreign cybercriminals. 
Treat them like they are a disease and avoid everything about them, including their sales pitch.

Beware the Tag Team

Some cybercriminals practice a very sophisticated tag team methodology.
Here is one of many scenarios they use.
One foreign cybercriminal calls and states that you have been identified as spending money on child pornography by the FBI due to charges on your bank account.
When you laugh at them and say that is impossible, they will ask you to hold and claim a representative of your bank is on the other line and they will patch you through to them.
Another perp will come on the line and state he is a representative from your bank and that there are, indeed, payments on your account paying for child porn.
He will identify your bank and explain that he needs to take control of your computer and review your account for unusual activity.
Then another perp will come on and announce that he wants to work with you to keep the remaining amount in your account safe.
He will ask you to withdraw it to protect it and go to a crypto ATM to transfer it back to the bank.
There are many variations on this scenario, but it is a technique they use to convince honest Americans to empty their bank account.
Hang up before they get to the team tag.

You are on your Own

You must be aware of cybercriminal threats and attacks.
They are endless.
Once a cybercriminal steals your data or money, they will not be identified or prosecuted as they are safe overseas.
So, learn what you need to do to protect yourself.
There are many resources to help you learn what to do.
Here is one.




5/01/2023

EMP or Electromagnetic Pulse Impacts

Electromagnetic pulse or EMP is real and you need to know about it.

The Communist Chinese Party (CCP) and the Chinese People's Liberation Army (PLA)  are actively working on an EMP strike as one of their options. Forewarned is forearmed. 

Dr. Lowell Wood's EMP testimony.

The EMP Threat: The State of Preparedness Against the Threat of an Electromagnetic Pulse (EMP) Event

Joint Hearing Before the Subcommittee on National Security 

U.S. House Electromagnetic Pulse Threats to U.S. Military and Civilian Infrastructure 

Dr. Michael J. Frankel's EMP Commission reports and links

I am the volunteer vice president of the American Civil Defense Association. We publish the Journal of Civil Defense. The Volume 55, 2021 Fall/Winter issue II of our Journal is dedicated to teach you about EMP from multiple perspectives.

The Soviet Union had an EMP capability all during the Cold War. They never used it because then there was the jointly agreed upon principal of mutually assured destruction (MAD) between the United Soviet Socialist Republic and the United States of America.

The CCP has a different view. 

They believe, and are pursuing, a first strike capability to take out the United States of America

They believe they can destroy us before we even know they have launched. Their spy balloon over the continental United States in February, 2022 is part of this strategy.

NOTE: Solar storms can also cause disastrous EMP events.

For more details about EMP see back issues of The American Civil Defense Association (TACDA.ORG) Journal of Civil Defense, see here.



4/03/2023

Civil Defense Redux

I worked for a guy who was heavily involved in NASA's Apollo space program who liked to say, "It took 450,000 private contractors and 50,000 government contract managers to put an American on the moon."
That ratio also applies to civil defense.

Insurance and Civil Defense

So much civil defense and disaster preparedness involves insurance: Review your homeowners insurance policy regularly to make sure you have enough coverage, and the right kind of coverage, for YOUR home, family, and things.
Know what is not covered by your insurance policy (such as floods).
UNDERSTAND what is, and is not, covered.
Make sure you have the best insurance company working for you.
(Great civil defense lessons can be found at TACDA)
In a former life, I had the honor of working with emergency management professionals. I taught a class at the Emergency Management Institute and monitored Emergency Operations Centers in Texas, Utah, North Dakota, and Arizona.
I was also able to write articles for Hazard Monthly. Two articles included: Two Fine Volcano Books Produced by Smithsonian Project, about Krakatoa 1883 - The Volcanic Eruption and its Effects by Tom Simkin, and Volcanoes of the World - A Regional Directory, Gazetteer, and Chronology of Volcanism During the Last 10,000 Years, by Tim Sinkin, see Siebert, et al. (Krakatau darkened the word's sky's for 4 days.)

My Civil Defense History

I worked on civil defense in the early 1980's when it was square and old fashioned and...basically...forgotten by most Americans. 
After all, the Russians were no longer a real threat, the Chinese were our new trading friends...what else could happen? 
National priorities shifted and civil defense became a distant memory.
Now it is back in the news everyday...and if no longer forgotten...often ignored. 
But just as it was forgotten and dismissed as passé in the 1980's an 1990's and events in 2001 forced us to dust it off and rediscover it, civil defense began to be taken seriously by the American people.
Many called themselves "preppers" or "survivalists" but they were basically continuing a long civil defense plan that began during the beginning of the Cold War.


CCP/PLA SITREP

Given the war manual for the the Communist Chinese Party (CCP) and the People's Liberation Army (PLA) Unrestricted Warfare, they clearly state if they cannot take us over by bribing our political, business, academic, health industry, Hollywood, and other corrupt Americans, they will consider a nuclear strike on us an option.
The CCP is not shy about saying they consider the United States future one where we supply their massive population with food from our rich farmland and buy their products at prices they set.
On top of this threat matrix, there is another threat matrix that dictates the importance of American civil defense.
With wars, inflation, riots, and massive numbers of manmade and natural disasters, the need for civil defense expertise became evident to me.
Fortunately, I was able to discover a source of civil defense expertise: The American Civil Defense Association.
As before, there is much misinformation, more good information, many professionals, and many other fast-buck artists out there on the web promoting their products, plans and systems. 
With two decades of experience providing leadership and vision for TACDA, and interacting with its highly expert board of directors and members, I can vouch for their usefulness, honesty, dedication, expertise, and desire to educate Americans about civil defense, as hey have since 1962.
Although viewed by many as a relic of he Cold War between the Soviet Union and the United States of America, civil defense still has many followers overseas, especially in Russia, Switzerland, China, and many other nations. 
It even has followers in the United States still. 
TACDA understands the threat matrix and they have located material, systems, companies, policies and planning systems that work and, more importantly, adapt to various situations. 

Why I Believe in the TACDA Mission
I believe so deeply in the TACDA mission that I have donated thousands of hours to promoting our organization.
I am the volunteer vice president of The American Civil Defense Association. I started writing articles for the Journal of Civil Defense in 2008, was invited to join the Board of Directors,  and eventually role to the position of vice president.
Over the years, I have written over a dozen civil defense articles for the Journal of Civil Defense.
My last article was "Children and Civil Defense."
My latest article is "Farm Markets: Solution for American Food Shortages."
I also spent months uploading 60-years of prior TACDA civil defense articles to the TACDA website.
From my emergency funds, I have printed up thousands of TACDA business cards and handed them out, mostly to Moms and men and women with small business, the backbone of the American Dream.
Distributing 5,000 TACDA cards one on one to other Americans I have only had 3 people refuse to take one.
So, 4,997 Americans were willing to take it to the benefit of themselves, their families, and their businesses.
The demand for civil defense is there.
It is just not being met.

To Search TACDA's Vast 65-Year Library

For ease of searching the vast knowledge contained in this material, I added deep search engine optimization terms to help you find exactly the civil defense expertise you want to learn.

TACDA's Survival Store

TACDA sells a number of useful mitigation and preparedness products. I especially recommend the personal evacuation kit for anyone who works in an office.
Consider METTAG's if you need a triage card to note casualties.
TACDA understand the fundamentals of emergency management which depend on details, like mettags http://www.mettag.com/
I encourage you to join TACDA. If you do join you and your family will get a big return. Here is the contact information: TACDA, www.tacda.org, info@tacda.org, 800.425.5397,800.403.1369 (fax).

Also consider North American Rescue to CAT Tourniquet's, medical bags, and professional survival equipment.

My own house burned down some years ago due to a defective circuit board on an electric mower. As you can see in the photo that was taken by a neighbor, it was a bad fire. 
Because we had adequate USAA insurance, we were able to rebuild a better house quickly. 
The new house is beautiful, but I would give it all back not to have the memory of my wife being medivaced out to the Johns Hopkins Burn Unit. Disasters happen, and taking steps to be prepared is common sense.
Fires, floods, earthquakes, windstorms, power outages, terrorist attacks and other natural and manmade disasters happen. 
It's a story as old as the Bible. 
Do you and your family and neighbors a favor and make sure you are prepared. Even if it never happens, it's like insurance. 
You never know you need it until you need it and then it is too late to get it. Mitigate and smile.

Natural and Manmade Disasters Happen Daily

Like volcanoes, other natural disasters have create monumental catastrophes. We have been dealing with these events for thousands of years. There are valuable lessons, principles, procedures, and policies learned from dealing with these natural disasters that we can apply to civil defense (now called homeland defense).
One article I wrote in Hazard Monthly (June 1984, p. 12) was titled, How FEMA Works With/Battles/Is Guided by Congress. It outlined the Byzantine process of how emergency management funding works its way through the House and Senate. The lessons then apply today. Here are a few quotes:
"At times, a program my be authorized and no funding is set aside to make it go. In that case, the program is as good as dead.
Accounts you read in the media oftentimes do not distinguish between
 authorizations and appropriations. Yet, they're quite different and can cause much confusion if not clarified from the very beginning.
If you have any questions about any of these programs, contact a staffer on the particular Committee or Subcommittee that deals with it."
Funny...even though since 9/11 billions of dollars have been authorized, appropriated, and spent in this area, after being neglected so in the 1980's and 1990's, the valuable civil defense lessons, principles, procedures, and policies learned from our past experience (from early exploration in this continent to the present day) must be relearned each generation. 
And if you read the Old and New Testament, the lessons are all there. 
It is human nature to want to ignore the painful lessons and to celebrate the fun lessons, but life is a mix and we need to prepare for, respond to, and mitigate life's emergencies, mindful of the past and anticipating the future.
One lesson I learned is how well prepared many of my fellow American's (in this case the Church of the Latter Day Saints (LDS)) are for such natural and man-made disasters. 
And because they are so well prepared for other disasters, they are prepared for the full threat matrix.
For example, I navigated a mountain outside Salt Lake City in the early 1980's and viewed the entire city under water. 
Because of the LDS experience and history, they take survival seriously, to their credit. In this case, because they had sandbags, shovels, plastic sheeting, food, water, etc. preplaced, they worked together to channel the Great Salt Lake that was overflowing at the time through the city and down to Lake Provo. 
Result? 
Very few injuries and they returned to normal quickly. A case study of how to do it right.
For those who are so negative as to believe there is nothing we can do to prepare for and beat this current terrorist threat, 
I suggest you consider that some in the World Trade Center who experienced the 1993 bombing relocated to a safer location. What did they figure out that it took a second lesson for others to learn?

Additional Emergency Preparedness Tips

Natural and manmade disasters, terrorism, toxic trail derailments, tornadoes, floods, fires, all will hit the U.S. again. 
The good news is you can take steps to protect your family from these events.
Take terrorism as an example.
Israeli Juval Aviv has written two books: Staying Safe: The Complete Guide to Protecting Yourself, Your Family, and Your Business and The Complete Terrorism Survival Guide: How to Travel, Work and Live in Safety.
Some of his advice:
Since mass transportation is the next attack, take a bottle of water, a small towel and a flashlight. What happened in London is exactly a point to look at. 
Those people who were close to the bombs died, then others were injured or died from inhaling the toxic fumes or getting trampled. 
The reason you take a bottle of water and a towel is that if you wet the towel and put it over your face; you can protect yourself against the fumes and get yourself out of there.
  • Don't be bashful. If your gut feeling tells you when you walk onto a bus there is something unusual or suspicious, get out and walk away. You may do it 10 times for no reason, but there will be one time that saves your life. Let your sixth sense direct you.
  • Be wary of someone paying an usual amount of attention to a prominent landmark; someone nervous or jumpy or trying to access off-limit areas; someone trying to hide something.
  • Keep an eye out for unattended items when using mass transit or in airports.
  • Try to break your routine. If you travel during rush hour every day, try to get up a little earlier and drive to work or take the train when it's still not full. Terrorists are not going to waste a bomb on a half-empty train.
  • Don't rely solely on the government to provide you with crisis or threat information -- do your own research, too. (Our Department of Homeland Security has done a miserable job of providing us any information, e.g. what the difference between the color codes is.)
  • Have a plan on where/when to meet family members in case of attack; map assorted evacuation routes from home/work.
  • Keep extra copies of your passport/birth certificate/social security card, other records. Keep copies in storage or with relatives, friends. Carry copy of your passport when traveling overseas.
  • Never order room service in foreign hotels. Workers may poison the food or spit in food meant for Americans.
    Never check luggage at curbside check-in at airports; carry luggage on board with you. Carry as few bags as possible.
  • Spend as little time at the airport as possible. Avoid heavily glassed areas.
  • When traveling abroad, don't advertise your corporate affiliation or title on luggage or other items. 
  • Stay in an American chain hotel; security is usually tighter.
  • When in a foreign country, don't advertise you're American by speaking loudly, holding up maps, exchanging currency at airports, showing American flags, etc
  • Avoid crowded areas. Avoid public transportation and major tunnels and bridges during heavy commuting times.
  • Never stay in a hotel with an underground parking garage and never park in such a garage -- terrorists love car bombs.
  • Store a decent amount of cash someplace in case ATMs malfunction. Carry only essential money cards and identification.

Homeland Security Parable Poem

Homeland security, done right, has many aspects of civil defense woven into its planning.
My Homeland Security Parable poem was published by Lynx Eye, Pam McCully and Kathryn Morrison Editors, c/o Scribblefest Literary Group, 581 Woodland Drive, Los Osos, CA 93402 Volume XII, Nos. 1 & 2, Summer 2005, pages 5-7. In it, I try to convey the spirituality behind civil defense. Hope you like it.

Homeland Security Parable

Here's the secret to homeland security.
My truck blew a tire
On a suicide curve
In a forest so remote
My cell phone would not work
And I was stuck in a forest.
The wind chill factor was minus 5.
I had to pick up
my eight-year old Eamon
In a half hour from day care
Or I would be charged
a year's mortgage payment.
When I tried to get the spare tire off
The underside of the truck carriage,
It was frozen solid and would not budge.
My clothes became filthy in forest dirt
As I tried in vain for 45 minutes to remove the tire.
I went into the truck to get warm and think.
I had water and beef jerky in the truck cabin,
So I still had time. I had a full tank of gas for heat.

But the phone... I tried to call my wife. No signal.
I tried to call my brother. No signal.
Then...eureka! What about 911?
They must have a stronger skip tower.
It just makes sense. I called 911.
Where are you?
In Bennet Regional Park.
You want the Park Police
No...wait... but he transferred me.

Park Police...I'm stuck in Bennet Regional Park...

You want the regional Park Police.
We're the federal Park Police.
No...wait...I can't get a signal
From my cell phone where I am.

Can you call my wife and tell her
To pick up Eamon and to call USAA
To get me a tow truck out here
Sure. He took the information.
An hour later, she and the tow truck arrived.
But it was not over.
The tow truck took me to Pep Boys
Where no one spoke English and, worse,
No one wanted to fix the flat.

On to Wal-Mart where they stated
Emphatically they were closing in 10 minutes.
I told the truck driver to take me to God's Country,
Mount Airy, where I moved 3 weeks after 911
When I saw biological attack circle maps
Did not reach when they hit Washington, D.C.
On the way the driver said,

Wait. In Damascus there's a garage I know
Where the guy is in my AA group.
You can't say anything because
It's all supposed to be anonymous.
You said you do volunteer civil defense, right?
Yeah. I answered.

Well then he has to help you. He's a firefighter.
Law enforcement has to help each other
When they're in a fix like you are.
But I'm not law enforcement! I protested.
I'm a volunteer for homeland defense.

Doesn't matter. He said. He has to help you.
A few minutes later, the firefighter
Who owned the garage opened the door,
My truck was in, and fixed, in minutes.
I returned the next day and bought
Four new tires from the same man.

That's the secret to homeland defense.
You depend on other people,
And they depend on you.
Some call it the golden rule.