As a part of activating the emergency operations center, officials at the Emergency Management Agency stayed connected with local administrators through an 800-MHz statewide communication system, which includes two-way radio, text and numeric paging capabilities. The handsets from Motorola Inc. allow officials to contact all local emergency coordinators at once as well as the National Guard. Alaska reported a heavier than normal caller volume following the terrorist attacks of Sept. 11. General Communications Inc. of Anchorage, which provides telecommunications and Internet services to the state government, that same morning began to monitor all incoming and outgoing Internet and telephone communications over the company's fiber-optic and satellite networks. Officials at the Emergency Management Division use Microsoft Access to log, track and communicate about activities between the emergency operations center and the intelligence center during events. Once a lead is called into the emergency center, workers enter the information into the database, which is then relayed to a collections manager in the intelligence center, who assigns investigators to the matter. 'Long before Sept. 11, hackers and crackers were a problem,' said David Huddleston, manager of the Emergency Management Department's information systems management division. Division staff back up data daily, store copies of everything off site and run mirrored servers. Before the attacks of Sept. 11, tools were already in place to enhance security in the state's Information Technology Department, said Kiran Kernellu, IT Department spokeswoman.California officials used unspecified 'hardware and software devices' to detect, record and repel damaging network traffic, Kernellu said. After the attack, IT Department officials put the state's systems administrators and security specialists on heightened alert. After September's attacks, Colorado put into effect plans that had already been set up to increase IT security in the state, said CIO Bob Feingold. The plans were activated and overseen by the Colorado Bureau of Investigation and Public Safety Department. 'But we've always examined our networking infrastructure for viruses and hacking attempts,' he said. 'That's been going on long before these terrorist incidents.' The Statewide Emergency Telecommunications Office relied on its recently upgraded 911 system to keep track of emergency situations around the state. The system uses Palladium 9-1-1 System software from Lucent Technologies of Murray Hill, N.J., to record and track emergency calls and vehicles, and provide computer-aided dispatching. Officials at the Emergency Management Agency rely on EIS/GEM Version 8.2 from Essential Technologies Inc. of Rockville, Md., to log, track and communicate among the three sections of their 28,000-square-foot emergency operations center. The Emergency Management Agency has no LAN. On the day of the attack, Andrew Jackson, chief of the operations center, set up an instant messaging system through Yahoo! Inc. of Sunnyvale, Calif., so agency coordinators could communicate quickly and keep the noise level to a minimum. In the aftermath of disasters, the Emergency Management Division expedited recovery payments to counties for residents through digital signatures. The state-developed Process Automation and Paperless Routing System uses public-key infrastructure software from Entrust Inc. of Plano, Texas, to allow county officials to use digital signature certificates to represent their authority when signing documents. The Emergency Management Office uses Lotus Notes 4.6 to route and record requests for assistance to agencies and partner volunteer groups. The agency that receives the request keeps a running log of how the program handles requests and then compiles and prints situation reports. Hawaii took a big hit in lost tourist dollars after Sept. 11. 'The hotel occupancy rate dropped drastically,' said Charlie Tarnay, head of the Information and Communication Services Division's systems security section. But the state's IT officials were prepared. The IT staff already had a computer backup procedure in place, Tarnay said. The department also uses a series of magnetic security cards to control access to secured areas. Less than a month before the attacks of Sept. 11, Idaho's IT Resource Management Council approved a policy that requires each agency to submit a business recovery plan each year as part of its overall IT plan. The Emergency Management Agency encouraged local officials to take stock of their disaster response capabilities by using the Illinois Local Capabilities Assessment for Readiness. The Microsoft Excel tool, available at , helps emergency response agencies identify strengths and weaknesses in 13 functional areas, so the agencies can develop improvement plans. To manage the aftermath of September's attacks, Emergency Management Agency officials used Tracsys software from Applied Computer Systems Inc. of Los Alamos, N.M.The program, which runs under Sun Microsystems Solaris, lets supervisors log, forward and track requests for information or assistance. CIO Richard Varn said the attacks have given new urgency to state projects to integrate criminal justice systems. At the same time, state officials will press the federal government to improve the security of systems that generate identity documents such as passports, which can be easily counterfeited, he said. Kansas CIO Don Heiman called for an update on the state's disaster recovery plans created for the year 2000 rollover. The Kansas IT Office is 'joined at the hip' with the state's attorney general and emergency management officials, Heiman said. The Governor's Office for Technology has scaled back by about 50 percent its additional security measures instituted on Sept. 11, said acting security director Mark McChesney. In the immediate aftermath of the attack, officials ordered Kentucky State Police officers to guard the state data center and stepped up network monitoring. 'For the past nine months we've been looking at security in a lot more detail,' said Allen Doescher, assistant commissioner of the Administration Division. Division officials are assessing physical security, network security and the possibility of establishing a state-level security office. In the first few hours after the attacks, Emergency Management Office workers mapped the state's highly vulnerable areas and critical facilities using the agency's geographic information system. A state technician used ArcView GIS 3.2 from Environmental Systems Research Institute of Redlands, Calif., to plot the data and help identify critical infrastructure. XXXSPLITXXX- State emergency operations center workers contacted 30 state, federal and nongovernmental agency representatives in less than 20 minutes to staff the center using an automatic dialing system from Dialogic Corp. of Parsippany, N.J. The system calls the emergency workers at home, at the office and via pagers. Officials at the Emergency Management Agency conferred with officials at the main command center at Logan International Airport using videoconferencing. The Trinicom 5100 Plus System from Sony Corporation of America of New York, runs over an Integrated Services Digital Network line. Officials in Michigan have been 'dusting off their Y2K books,' said CIO George Boersma, referring to planning documents prepared for the year 2000 date rollover. 'They are an excellent resource for what to do' in a disaster situation, he added. Minnesota agencies reviewing their security systems after the attacks expressed renewed interest in network tools provided through the Administration Department's Technology Office, commissioner David Fisher said. The office uses TruSecure risk management software from TruSecure Corp. of Herndon, Va. The Mississippi Emergency Management Agency activated its EM/2000 system from Specialized Disaster Systems International Inc. of Lake Ozark, Mo. The software includes a Lotus database management system running on a Domino server from IBM Corp., with data about the emergency response resources of the state's 82 counties. Officials activated the state's emergency operations center in Jefferson City on a full-scale, 24-hour basis for three days after the attacks. Center personnel used SoftRisk emergency management software from SoftRisk Technologies Ltd. of Toronto to track incident reports. Montana has become vigilant about computer viruses, said Mike Boyer, chief of the computing technology services bureau. 'We're very diligently trying to keep people 'patched' with the most current virus protection,' Boyer said. Nebraska's data security plans didn't really change after Sept. 11, said CIO Steve Schafer. Last month the state held a meeting with agencies to discuss the security of Nebraska's networks, focusing on firewalls and what Schafer called 'perimeter security''keeping the network secure from outside attacks. On the day after the attacks, Emergency Management Division officials set up two radio communications networks'an 800-MHz and a high-band amateur. Officials used the ACU-1000 Intelligent Interconnect System from JPS Communications Inc. of Raleigh, N.C., to link all the systems so officials at the highway patrol, transportation department and fire division could communicate on either network. The Emergency Operations Center used its new event logging system in a true emergency situation for the first time. The center's computer specialists created the Web system using Microsoft's Active Server Pages. The State Police Web site lists all state residents who were reported missing to local and township police departments in the wake of the attacks. The police received more than 100 calls daily from media outlets before they put the list online and trimmed the number of calls to fewer than 10 in two days. As a border state, New Mexico has some special security concerns. 'We did some asking 'What if?' ' said Orlando Romero, Public Safety Department CIO. The department had been installing a virtual private network, but the events of Sept. 11 caused Romero and his team to step up the process, he said. Computer specialists at the State Technology Office used geographic information systems software to give other state officials information on where every state office in Manhattan was located. The computerized map information also was used to coordinate transporting emergency generators by the Transportation Department from state offices around the city to the disaster site. The state Emergency Management Office, most of the county emergency offices, many of the state's vehicles, seven weather service stations and 20 statewide radio stations relied on satellite phones to communicate during the crisis. Officials use phones made by Hitachi America Ltd. of Brisbane, Calif., Motorola Inc. and Sony Corporation of America of New York. North Dakota is staying the course in terms of security, said Dan Sipes, associate director of administrative services for the IT Department. 'We're just trying to be a little more vigilant,' Sipes said. 'We're pushing harder on finalizing our security policy framework and other initiatives we already had on the plate.' The Emergency Management Agency uses a video projection system to transmit data from paper, white boards or maps to five 16-foot screens so employees all over the center can view the images simultaneously. The EV-8000AF from Elmo Manufacturer Corp. of Plainview, N.Y., also can display information through a video switch or slides. While the emergency operations center went on 24-hour alert after the attacks on New York and Washington, D.C., state officials did not see a direct impact on their region. The center's main function, however, is to warn residents and local officials about weather hazards. Security tops Oregon's IT agenda, said CIO John Lattimer. Oregon is getting ready to launch a new state portal, which may include security features such as public-key infrastructure and digital certificates. When the hijacked United Airlines plane crashed in Somerset County, state police sent their Mobile Command Post almost immediately. The command post is a motor-home-size vehicle outfitted with cellular phone and radio communications equipment, as well as five IBM ThinkPad notebooks running Microsoft Windows NT. Officials secured Internet access and the use of state and national law enforcement databases through telephone lines and 56K modems.Troopers also used notebooks from IBM and Toshiba Corp. of Tokyo with grid mapping software to document the location of evidence. Having had no serious emergency since the hurricane of 1954, officials don't use specialized software but run the emergency operations center using WordPerfect from Corel Corp. and Microsoft Office applications such as PowerPoint. Center employees log major events using Corel's QuattroPro and use a poster printer for paper up to 36 inches wide. The University of South Carolina provided the Emergency Management Office with software to allow state agencies and counties to request assistance and track those requests during emergencies. The system runs over a secure intranet and can be accessed through the office's LAN or remotely via the Web. South Dakota backs up all state information systems at a site in the Colorado hills, CIO Otto Doll said. The state's Synchronous Optical Network is tough enough to survive 'cuts in fiber, blackouts, all that sort of thing,' Doll said. In the days after the Sept. 11 attacks, Office of Information Resources staff members reassessed the information security capabilities and physical security aspects of the state's data and telecommunications centers. Information systems chief Vic Mangrum said officials performed a 'gap analysis' to find security weaknesses. Texas officials noticed a lot more intrusive network activity in the weeks following the Sept. 11 attacks. 'We've had more intrusions, more perimeter violations and more viruses,' CIO Carolyn Purcell said. Fortunately the state performed a security analysis of its systems last year and took corrective measures then, Purcell said. Utah's disaster recovery plan hasn't changed since Sept. 11, according to CIO Phillip Windley. The state has adopted some new measures to protect government data but Windley did not provide details. The year 2000 rollover laid the foundation for the state's new emergency measures. 'Some of what we have and use is clearly a product of Y2K planning,' he said. Within hours after the attack, the Emergency Management Office constructed a database of volunteer resources, such as manpower and equipment that residents wanted to donate to the rescue effort. Items entered into the Microsoft Access database were grouped by similar resources. Officials from Arlington County, Va.'s, Technology Services Department were on call 24 hours a day after the attack on the Pentagon. Staff members supported rescue workers' and federal officials' technology needs by setting up a field office of the emergency operations center with networked computers and printers and e-mail access. Washington has been 'heavy into disaster recovery plans' since 1990 or so, said Mike Curtright, assistant director of the computer services division in the Information Services Department. After Sept. 11, the department took stricter measures about verifying the identities of people who enter the data center, he said. The Emergency Services Office is training employees on a new Web system to handle all communications and event logging. The office is installing E Team software from eteam.com of Canoga Park, Calif., and linking it to ArcView and ArcInfo from Environmental Systems Research Institute of Redlands, Calif., to map the state's critical infrastructure. State IT officials from the new Electronic Government Department and the Administration Department will serve on the terrorism preparedness task force formed by Gov. Scott McCallum. The task force will review the terrorism readiness of the state's IT infrastructure, among other functions. The Olympic Games, long an attraction for terrorists, are coming February to Salt Lake City, which is only about 40 miles from Wyoming's border. 'That's one reason we're dusting off some of our plans from the year 2000 rollover,' said Bob Bezek, coordinator of the Wyoming Emergency Management Agency.
Colorado CIO, Bob Feingold
DELAWARE: SPARKLING SYSTEM
The hole that Sept. 11 tore into the heart of our nation was an especially deep wound for state governments. New York, Pennsylvania and Virginia bore the direct brunt of the terrorists' blows, but state employees from Maine to Hawaii shared their grief, fear and sorrow as our nation's freedom and prosperity were challenged.
GCN/State & Local reporters asked officials in each state what special security measures their state took to protect government data in the wake of Sept. 11. Most states listed security at the top of their IT agenda long before September. For others, it was a wake-up call to tighten data security procedures.
State officials also talked about how technology helped them cope with disaster. New York officials, for instance, relied on geographic information systems to pinpoint state offices in Manhattan. Lacking a LAN, District of Columbia officials improvised an instant messaging system on the day of the attack to communicate quickly and quietly with agency employees.
A motto from Revolutionary War days said it best: United we stand; divided we fall. Several state officials reported that they felt a new spirit of cooperation between agencies, reminiscent of the year 2000 rollover. Turf battles were largely forgotten; state, local and federal agencies worked together to keep citizens calm, safe and sound. These strong, united states are then free to rally round another motto: Don't tread on me.ALABAMALET'S GO TO THE PHONES.ALASKATURN UP THE VOLUME.ARIZONAINTELLIGENT COMMUNICATIONS.ARKANSASREADY TO ROLL.CALIFORNIASECURITY TOOLBOX.COLORADOINCREASED SCRUTINY.CONNECTICUTALWAYS AVAILABLE.DELAWARESPARKLING SYSTEM.DISTRICT OF COLUMBIAIM CONNECTED.FLORIDASIGN AWAY.GEORGIATHE RIGHT ROUTE.HAWAIIALOHA OY.IDAHOROAD TO RECOVERY.ILLINOISREADY FOR NEXT TIME?www.STATE.il.us/iema/news.htm#sitrepINDIANAEXECUTIVE DECISIONS.IOWAINTEGRATION NOW.KANSASY2K UPDATED.KENTUCKYSTILL WATCHFUL.LOUISIANAON DETAIL.MAINEGRAPHICALLY INCLINED.MINNESOTA: IS IT TRULY SECURE?
PENNSYLVANIA: FIRST ON THE SCENE
MARYLANDGETTING THE WORD OUT.MASSACHUSETTSVIDEO STARS.MICHIGANBACK TO THE FUTURE.MINNESOTAIS IT TRULY SECURE?MISSISSIPPIREADY AS PLANNED.MISSOURIHARD RISKS, TOO.MONTANAPATCH WORK.NEBRASKAperimeter patrol.NEVADAON THE RADIO.NEW HAMPSHIREFIRST TIME'S A CHARM.NEW JERSEYMEDIA RELIEF.NEW MEXICOBORDER PATROL.NEW YORKDISSEMINATE, COORDINATE AND ALLEVIATE.NORTH CAROLINAWELL EQUIPPED.NORTH DAKOTAV IS FOR VIGILANCE.OHIONO DOLL HERE.OKLAHOMAWEATHERING THE STORM.OREGONSECURE SERVICE.PENNSYLVANIAFIRST ON THE SCENE.RHODE ISLANDSTAYING LOW-TECH.SOUTH CAROLINACOORDINATED EFFORT.SOUTH DAKOTASONET SURVIVOR.TENNESSEEWHERE'S THE GAP?TEXASDON'T MESS WITH TEXAS.UTAHSON OF Y2K.VERMONTHELP LIST.VIRGINIANO TIME FOR SLEEP.WASHINGTONFIGHTING CYBERTHREATS.WEST VIRGINIAON THE CUSP.WISCONSINTASK AT HAND.WYOMINGCARRYING A TORCH.