Monday, April 29, 2013   

Complete DHS Daily Report for April 29, 2013

Daily Report

Top Stories

 • An explosion at a Shakopee energy plant forced a 1-mile evacuation of residents and visitors and caused the indefinite closure of the plant. – WCCO 4 Minneapolis/Associated Press (See item 1)

1.               April 25, WCCO 4 Minneapolis/Associated Press – (Minnesota) Shakopee Energy Plant explosion damaged two silos, cause still unknown. Koda Energy, a joint venture with Rahr Malting Company, plant explosion forced a 1-mile evacuation of residents and visitors in Shakopee April 25, and caused the indefinite closure of the plant. Inspectors are investigating the fire that damaged 2 biomass fuel silos and their conveyor system, as well as the truck unloading facility. Source: http://minnesota.cbslocal.com/2013/04/25/grain-elevator-explosion-fire-reported-in-shakopee/

  • A software glitch that prevented trading in options on two important indexes shut down The Chicago Board Options Exchange for most of April 25. – Reuters See item 5 below in the Banking and Finance Sector

 • The U.S. Army Corps of Engineers is working to repair a lock damaged during recent heavy flooding and a section of the Illinois River is expected to remain closed for several weeks. – Reuters (See item 10)

10. April 25, Reuters – (National) Damaged Illinois River lock may hinder barges for weeks. A northern section of the Illinois River is expected to remain closed for several weeks as the U.S. Army Corps of Engineers works to repair a lock damaged during recent heavy flooding. Severe flooding has halted the loading of corn and soybean barges at terminals along the waterway and delivery points. Source: http://news.yahoo.com/damaged-illinois-river-lock-may-hinder-barges-weeks-224703428.html

 • The captured Boston Marathon bombing suspect indicated failed plans to attack sites in New York City with various bombs before realizing the vehicle that he and the other suspect allegedly hijacked was low on fuel. – Associated Press (See item 31)

31. April 26, Associated Press – (Boston) Authorities say bomb suspects planned NYC attack. The captured Boston Marathon bombing suspect indicated failed plans to attack sites in New York City with a pressure-cooker explosive and five pipe bombs before realizing the vehicle that he and the other suspect hijacked was low on fuel. Source: http://news.yahoo.com/authorities-bomb-suspects-planned-nyc-attack-064445645.html

Details

Banking and Finance Sector

4. April 26, WCMH 4 Columbus – (Ohio) 6 arrested in Westerville skimming investigation. Six suspects in a credit card skimming ring were arrested in Westerville. The suspects’ allegedly recruited workers at area businesses to skim customers’ card data, then used the data to create fraudulent gift cards. Source: http://www.nbc4i.com/story/22083095/6-arrested-in-card-skimming-investigation

5. April 25, Reuters – (International) CBOE dark for much of day due to software glitch. The Chicago Board Options Exchange was shut down for much of the day April 25 due to a software glitch that prevented trading in options on two important indexes. Source: http://www.reuters.com/article/2013/04/26/cboe-delay-idUSL2N0DC1QB20130426

6. April 25, WHAS 11 Louisville – (Kentucky) ‘Bad Hair Bandit’ pleads guilty to series of robberies. The individual known as the “Bad Hair Bandit” pleaded guilty to robbing four Kentucky banks in 2011. Source: http://www.whas11.com/news/local/Bad-hair-bandit-pleads-guilty-to-series-of-robberies-could-face-up-to-24-years-204746731.html

Information Technology Sector

28. April 26, TechWeek Europe – (International) Researchers warn over Apple Safari flaw. Researchers at Rapid7 highlighted a flaw in Apple’s Safari browser that could allow attackers to hijack users’ sessions or extract information and files if a victim opens a malicious webarchive file. Source: http://www.techweekeurope.co.uk/news/apple-safari-webarchive-vulnerability-114516

29. April 25, Dark Reading – (International) Possible exploit avenue discovered for DarkLeech web server attacks. A Cisco Systems researcher found that a script targeting a Horde/IMP Plesk Webmail vulnerability may be the avenue of attack used by the DarkLeech campaign targeting servers running Apache 2.2.2 and up. Source: http://www.darkreading.com/attacks-breaches/possible-exploit-avenue-discovered-for-d/240153697

Communications Sector

30. April 25, Verona-Cedar Grove Times – (New Jersey) Temporary cell tower in Cedar Grove will save wireless connections. A Cedar Grove PSE&G power line scheduled to go offline to begin upgrades May 17 is projected to cause a gap in Verizon wireless coverage to residential areas, and prompted the local planning board to approve the installation of a temporary 150-foot Verizon cell phone tower that should prevent loss of coverage for the current service area. Source: http://www.northjersey.com/news/204614821_Temporary_cell_tower_in_Cedar_Grove_will_save_wireless_connections.html


Department of Homeland Security (DHS)
DHS Daily Open Source Infrastructure Report Contact Information

About the reports - The DHS Daily Open Source Infrastructure Report is a daily [Monday through Friday] summary of open-source published information concerning significant critical infrastructure issues. The DHS Daily Open Source Infrastructure Report is archived for ten days on the Department of Homeland Security Web site: http://www.dhs.gov/IPDailyReport

Contact Information

Content and Suggestions: Send mail to cikr.productfeedback@hq.dhs.gov or contact the DHS Daily Report Team at (703)387-2314

Subscribe to the Distribution List: Visit the DHS Daily Open Source Infrastructure Report and follow instructions to Get e-mail updates when this information changes.

Removal from Distribution List:     Send mail to support@govdelivery.com.


Contact DHS

To report physical infrastructure incidents or to request information, please contact the National Infrastructure
Coordinating Center at  nicc@dhs.gov or (202) 282-9201.

To report cyber infrastructure incidents or to request information, please contact US-CERT at  soc@us-cert.gov or visit their Web page at  www.us-cert.go v.

Department of Homeland Security Disclaimer

The DHS Daily Open Source Infrastructure Report is a non-commercial publication intended to educate and inform personnel engaged in infrastructure protection. Further reproduction or redistribution is subject to original copyright restrictions. DHS provides no warranty of ownership of the copyright, or accuracy with respect to the original source material.