<?xml version="1.0" encoding="utf-8" standalone="no"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Business911 International, Inc.</title><managingEditor>noemail@noemail.org (Bob J.)</managingEditor><pubDate>Fri, 6 Mar 2020 14:25:42 -0600</pubDate><generator>TypePad http://www.typepad.com/</generator><link>https://www.business911.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>Copyright Business911 International, Inc.</copyright><itunes:category text="Technology"/><itunes:author>Bob Janusaitis</itunes:author><itunes:owner><itunes:email>noemail@noemail.org</itunes:email><itunes:name>Bob Janusaitis</itunes:name></itunes:owner><item><title>Defending Against COVID-19 Cyber Scams</title><link>https://www.business911.com/2020/03/defending-against-covid-19-cyber-scams.html</link><category>COVID-19</category><category>Federal, State, Local Government</category><category>Homeland Security</category><category>Infrastructure protection</category><category>Local incidents</category><pubDate>Fri, 6 Mar 2020 14:25:42 -0600</pubDate><guid isPermaLink="false">tag:typepad.com,2003:post-6a01157141048a970b0240a4ef4295200d</guid><content:encoded xmlns:content="http://purl.org/rss/1.0/modules/content/"><![CDATA[<p xmlns="http://www.w3.org/1999/xhtml"><a class="asset-img-link" href="https://resiliency.typepad.com/.a/6a01157141048a970b0240a4ef428f200d-pi" style="display: inline;"><img alt="Capture" class="asset  asset-image at-xid-6a01157141048a970b0240a4ef428f200d img-responsive" src="https://resiliency.typepad.com/.a/6a01157141048a970b0240a4ef428f200d-320wi" title="Capture"/></a></p>
<p xmlns="http://www.w3.org/1999/xhtml"><em>03/06/2020 01:53 PM EST</em></p>
<p xmlns="http://www.w3.org/1999/xhtml">Original release date: March 6, 2020</p>
<p xmlns="http://www.w3.org/1999/xhtml">The Cybersecurity and Infrastructure Security Agency (CISA) warns individuals to remain vigilant for scams related to Coronavirus Disease 2019 (COVID-19). Cyber actors may send emails with malicious attachments or links to fraudulent websites to trick victims into revealing sensitive information or donating to fraudulent charities or causes. Exercise caution in handling any email with a COVID-19-related subject line, attachment, or hyperlink, and be wary of social media pleas, texts, or calls related to COVID-19.</p>
<p xmlns="http://www.w3.org/1999/xhtml">CISA encourages individuals to remain vigilant and take the following precautions.</p>
<p xmlns="http://www.w3.org/1999/xhtml">Full article: <a href="https://www.us-cert.gov/ncas/current-activity/2020/03/06/defending-against-covid-19-cyber-scams">https://www.us-cert.gov/ncas/current-activity/2020/03/06/defending-against-covid-19-cyber-scams</a></p>]]></content:encoded><description>03/06/2020 01:53 PM EST Original release date: March 6, 2020 The Cybersecurity and Infrastructure Security Agency (CISA) warns individuals to remain vigilant for scams related to Coronavirus Disease 2019 (COVID-19). Cyber actors may send emails with malicious attachments or links to fraudulent websites to trick victims into revealing sensitive information or donating to fraudulent charities or causes. Exercise caution in handling any email with a COVID-19-related subject line, attachment, or hyperlink, and be wary of social media pleas, texts, or calls related to COVID-19. CISA encourages individuals to remain vigilant and take the following precautions. Full article: https://www.us-cert.gov/ncas/current-activity/2020/03/06/defending-against-covid-19-cyber-scams</description><author>noemail@noemail.org (Bob Janusaitis)</author></item><item><title>Executive Order on Securing the Information and Communications Technology and Services Supply Chain</title><link>https://www.business911.com/2019/07/executive-order-on-securing-the-information-and-communications-technology-and-services-supply-chain.html</link><category>Constitutional, legal issues</category><category>Cyber Security</category><category>CyberSecurity</category><category>Electric grid</category><category>Federal, State, Local Government</category><category>Homeland Security</category><category>Information security</category><category>Infrastructure protection</category><category>Warfare</category><pubDate>Sat, 20 Jul 2019 14:28:44 -0500</pubDate><guid isPermaLink="false">tag:typepad.com,2003:post-6a01157141048a970b0240a499189e200d</guid><content:encoded xmlns:content="http://purl.org/rss/1.0/modules/content/"><![CDATA[<p xmlns="http://www.w3.org/1999/xhtml">By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 <em>et seq.</em>) (IEEPA), the National Emergencies Act (50 U.S.C. 1601 <em>et seq.</em>), and section 301 of title 3, United States Code</p>
<p xmlns="http://www.w3.org/1999/xhtml">Full document: <a href="https://www.whitehouse.gov/presidential-actions/executive-order-securing-information-communications-technology-services-supply-chain/">Executive Order</a></p>]]></content:encoded><description>By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National Emergencies Act (50 U.S.C. 1601 et seq.), and section 301 of title 3, United States Code Full document: Executive Order</description><author>noemail@noemail.org (Bob Janusaitis)</author></item><item><title>Emergency Communications No matter what the emergency......</title><link>https://www.business911.com/2018/12/emergency-communications-no-matter-what-the-emergency.html</link><category>Cyber Security</category><category>CyberSecurity</category><category>Emergency Notification</category><category>Federal, State, Local Government</category><category>Fire-Rescue-EMS</category><category>Homeland Security</category><category>Information security</category><category>Infrastructure protection</category><category>Resiliency, DR, BCP, and COOP</category><pubDate>Sun, 2 Dec 2018 12:12:29 -0600</pubDate><guid isPermaLink="false">tag:typepad.com,2003:post-6a01157141048a970b022ad3c44fc7200b</guid><content:encoded xmlns:content="http://purl.org/rss/1.0/modules/content/"><![CDATA[<header xmlns="http://www.w3.org/1999/xhtml">
<h1>Emergency Communications</h1>
</header>
<div xmlns="http://www.w3.org/1999/xhtml" class="field field-name-body field-type-text-with-summary field-label-hidden">
<div class="field-items">
<div class="field-item even">
<p>No matter what the emergency, communications remain a vital component to keeping America safe, secure, and resilient.</p>
<p><a class="asset-img-link" href="https://resiliency.typepad.com/.a/6a01157141048a970b022ad37e95ce200c-pi" style="display: inline;"><img alt="Capture" class="asset  asset-image at-xid-6a01157141048a970b022ad37e95ce200c img-responsive" src="https://resiliency.typepad.com/.a/6a01157141048a970b022ad37e95ce200c-320wi" title="Capture"/></a></p>
</div>
</div>
</div>
<p xmlns="http://www.w3.org/1999/xhtml"><a href="Emergency%20Communications No matter what the emergency, communications remain a vital component to keeping America safe, secure, and resilient." rel="noopener" target="_blank">https://www.dhs.gov/topic/emergency-communications</a></p>]]></content:encoded><description>Emergency Communications No matter what the emergency, communications remain a vital component to keeping America safe, secure, and resilient. https://www.dhs.gov/topic/emergency-communications</description><author>noemail@noemail.org (Bob Janusaitis)</author></item><item><title>Cooperative Federalism and Low-Altitude Drone Operations</title><link>https://www.business911.com/2017/12/cooperative-federalism-and-low-altitude-drone-operations.html</link><category>Federal, State, Local Government</category><category>Homeland Security</category><category>UAV's</category><pubDate>Thu, 21 Dec 2017 10:25:11 -0600</pubDate><guid isPermaLink="false">tag:typepad.com,2003:post-6a01157141048a970b01b8d2c93cfe970c</guid><content:encoded xmlns:content="http://purl.org/rss/1.0/modules/content/"><![CDATA[<div xmlns="http://www.w3.org/1999/xhtml" class="report__section-wrapper">
<div class="contributor-card">
<div class="contributor-card-wrapper">
<p><span class="contributor-card__contributor-heading">Authors:</span><a class="contributor-card__contributor" href="http://www.heritage.org/staff/jason-snead">Jason Snead</a> and <a class="contributor-card__contributor" href="http://www.heritage.org/staff/john-michael-seibler">John-Michael Seibler</a></p>
</div>
</div>
<section class="article-summary summary more-bottom">
<div class="article-summary__wrapper _min-height">
<p class="article-summary__eyebrow"> SUMMARY</p>
<div class="article-summary__summary">Bipartisan measures have been introduced in the House and Senate proposing a cooperative-federalism approach to the regulation of Unmanned Aircraft Systems. Specifically, below 200 feet in altitude, state, local, and tribal authorities could reasonably regulate the time, manner, and place of drone operation. This authority would permit local governance of low-altitude drone activity in a manner similar to traffic management. President Donald Trump has also signed a presidential memorandum establishing pilot programs for commercial drone operations that would require the participation of state and local authorities. Congress should reject overblown concerns about a regulatory “patchwork” and adopt a cooperative-federalism approach that leverages the unique competencies of state, local, and federal officials to foster a competitive, safe, and innovative drone industry.</div>
</div>
<section class="key-takeaways">
<div class="key-takeaways__wrapper">
<h3 class="key-takeaways__heading">Full article: <a href="http://www.heritage.org/government-regulation/report/cooperative-federalism-and-low-altitude-drone-operations?utm_source=facebook&amp;utm_medium=social&amp;utm_campaign=thf-fb" rel="noopener noreferrer" style="font-size: small;" target="_blank">http://www.heritage.org/government-regulation/report/cooperative-federalism-and-low-altitude-drone-operations?utm_source=facebook&amp;utm_medium=social&amp;utm_campaign=thf-fb</a></h3>
</div>
</section>
</section>
</div>
<p xmlns="http://www.w3.org/1999/xhtml"> </p>]]></content:encoded><description>Authors:Jason Snead and John-Michael Seibler SUMMARY Bipartisan measures have been introduced in the House and Senate proposing a cooperative-federalism approach to the regulation of Unmanned Aircraft Systems. Specifically, below 200 feet in altitude, state, local, and tribal authorities could reasonably regulate the time, manner, and place of drone operation. This authority would permit local governance of low-altitude drone activity in a manner similar to traffic management. President Donald Trump has also signed a presidential memorandum establishing pilot programs for commercial drone operations that would require the participation of state and local authorities. Congress should reject overblown concerns about a regulatory...</description><author>noemail@noemail.org (Bob Janusaitis)</author></item><item><title>Trump first president to protect electric grid from EMP, cyberattacks</title><link>https://www.business911.com/2017/12/trump-first-president-to-protect-electric-grid-from-emp-cyberattacks.html</link><category>Cyber Security</category><category>CyberSecurity</category><category>Electric grid</category><category>EMP-HEMP</category><category>Federal, State, Local Government</category><category>Homeland Security</category><category>Infrastructure protection</category><category>Resiliency, DR, BCP, and COOP</category><category>Warfare</category><pubDate>Wed, 20 Dec 2017 16:57:28 -0600</pubDate><guid isPermaLink="false">tag:typepad.com,2003:post-6a01157141048a970b01b7c93ebd47970b</guid><content:encoded xmlns:content="http://purl.org/rss/1.0/modules/content/"><![CDATA[<p xmlns="http://www.w3.org/1999/xhtml"><a class="asset-img-link" href="http://resiliency.typepad.com/.a/6a01157141048a970b01b8d2c911a0970c-pi" style="display: inline;"><img alt="EMPst" class="asset  asset-image at-xid-6a01157141048a970b01b8d2c911a0970c img-responsive" src="https://resiliency.typepad.com/.a/6a01157141048a970b01b8d2c911a0970c-320wi" title="EMPst"/></a></p>
<p xmlns="http://www.w3.org/1999/xhtml"><span class="text-muted  mb-half">by <a class="text-muted" href="http://www.washingtonexaminer.com/author/paul-bedard" itemprop="author" itemscope="" itemtype="http://schema.org/Person">Paul Bedard</a> | <a aria-describedby="popover505547" class="article-date text-muted" data-date="2017-12-20T12:03:15-05:00" data-href="/by-date/2017-12-20T12:03:15-05:00" data-original-title="" href="http://www.washingtonexaminer.com/trump-first-president-to-protect-electric-grid-from-emp-cyberattacks/article/2644025#" rel="nofollow" title=""><time datetime="2017-12-20T12:03:15-05:00">Dec 20, 2017, 12:03 PM</time></a></span> </p>
<p xmlns="http://www.w3.org/1999/xhtml">President Trump became the first national leader to call for protecting the U.S electric and communications grid against an electromagnetic attack like one practiced in North Korea.</p>
<p xmlns="http://www.w3.org/1999/xhtml">Deep in his new <a href="https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905-2.pdf" rel="noopener noreferrer" target="_blank">national security strategy</a> released this week, he made good on a campaign promise to move quickly to make the fixes that proponents have long called for.</p>
<p xmlns="http://www.w3.org/1999/xhtml">Full article:<a href="http://www.washingtonexaminer.com/trump-first-president-to-protect-electric-grid-from-emp-cyberattacks/article/2644025" rel="noopener noreferrer" target="_blank"> http://www.washingtonexaminer.com/trump-first-president-to-protect-electric-grid-from-emp-cyberattacks/article/2644025</a></p>]]></content:encoded><description>by Paul Bedard | Dec 20, 2017, 12:03 PM President Trump became the first national leader to call for protecting the U.S electric and communications grid against an electromagnetic attack like one practiced in North Korea. Deep in his new national security strategy released this week, he made good on a campaign promise to move quickly to make the fixes that proponents have long called for. Full article: http://www.washingtonexaminer.com/trump-first-president-to-protect-electric-grid-from-emp-cyberattacks/article/2644025</description><author>noemail@noemail.org (Bob Janusaitis)</author></item><item><title>Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources</title><link>https://www.business911.com/2017/11/cybersecurity-cybercrime-and-national-security-authoritative-reports-and-resources.html</link><category>Cyber Security</category><category>CyberSecurity</category><category>Federal, State, Local Government</category><category>Homeland Security</category><category>Information security</category><category>IT Governance</category><category>Warfare</category><pubDate>Mon, 20 Nov 2017 10:54:03 -0600</pubDate><guid isPermaLink="false">tag:typepad.com,2003:post-6a01157141048a970b01b8d2c026ed970c</guid><content:encoded xmlns:content="http://purl.org/rss/1.0/modules/content/"><![CDATA[<p xmlns="http://www.w3.org/1999/xhtml">Summary<br/>As online attacks grow in volume and sophistication, the United States is expanding its cybersecurity efforts. Cybercriminals<br/>continue to develop new ways to ensnare victims, whereas nation-state hackers compromise companies, government agencies, and<br/>businesses to create espionage networks and steal information. Threats come from both criminals and hostile countries, especially<br/>China, Russia, Iran, and North Korea.<br/>Much is written on this topic, and this CRS report directs the reader to authoritative sources that address many of the most<br/>prominent issues. The annotated descriptions of these sources are listed in reverse chronological order, with an emphasis on<br/>material published in the past several years. This report includes resources and studies from government agencies (federal, state,<br/>local, and international), think tanks, academic institutions, news organizations, and other sources:</p>
<p xmlns="http://www.w3.org/1999/xhtml">Full document: <a href="https://fas.org/sgp/crs/misc/R44408.pdf" rel="noopener noreferrer" target="_blank">https://fas.org/sgp/crs/misc/R44408.pdf</a></p>]]></content:encoded><description>Summary As online attacks grow in volume and sophistication, the United States is expanding its cybersecurity efforts. Cybercriminals continue to develop new ways to ensnare victims, whereas nation-state hackers compromise companies, government agencies, and businesses to create espionage networks and steal information. Threats come from both criminals and hostile countries, especially China, Russia, Iran, and North Korea. Much is written on this topic, and this CRS report directs the reader to authoritative sources that address many of the most prominent issues. The annotated descriptions of these sources are listed in reverse chronological order, with an emphasis on material published in...</description><author>noemail@noemail.org (Bob Janusaitis)</author><enclosure length="528790" type="application/pdf" url="https://fas.org/sgp/crs/misc/R44408.pdf"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Summary As online attacks grow in volume and sophistication, the United States is expanding its cybersecurity efforts. Cybercriminals continue to develop new ways to ensnare victims, whereas nation-state hackers compromise companies, government agencies, and businesses to create espionage networks and steal information. Threats come from both criminals and hostile countries, especially China, Russia, Iran, and North Korea. Much is written on this topic, and this CRS report directs the reader to authoritative sources that address many of the most prominent issues. The annotated descriptions of these sources are listed in reverse chronological order, with an emphasis on material published in...</itunes:subtitle><itunes:author>Bob Janusaitis</itunes:author><itunes:summary>Summary As online attacks grow in volume and sophistication, the United States is expanding its cybersecurity efforts. Cybercriminals continue to develop new ways to ensnare victims, whereas nation-state hackers compromise companies, government agencies, and businesses to create espionage networks and steal information. Threats come from both criminals and hostile countries, especially China, Russia, Iran, and North Korea. Much is written on this topic, and this CRS report directs the reader to authoritative sources that address many of the most prominent issues. The annotated descriptions of these sources are listed in reverse chronological order, with an emphasis on material published in...</itunes:summary><itunes:keywords>Cyber Security, CyberSecurity, Federal, State, Local Government, Homeland Security, Information security, IT Governance, Warfare</itunes:keywords></item><item><title>Dispatchers facing delays answering 911 calls in Harris County</title><link>https://www.business911.com/2017/09/dispatchers-facing-delays-answering-911-calls-in-harris-county.html</link><category>Dispatch centers and PSAP's</category><category>Federal, State, Local Government</category><category>Fire-Rescue-EMS</category><category>Homeland Security</category><category>Infrastructure protection</category><category>Local incidents</category><category>Resiliency, DR, BCP, and COOP</category><pubDate>Wed, 20 Sep 2017 16:52:39 -0500</pubDate><guid isPermaLink="false">tag:typepad.com,2003:post-6a01157141048a970b01bb09c56c0e970d</guid><content:encoded xmlns:content="http://purl.org/rss/1.0/modules/content/"><![CDATA[<p xmlns="http://www.w3.org/1999/xhtml"><img alt="Image result for 911 phone pic" src="https://lh4.ggpht.com/6E0upWO07dyDhf5KdPPXt-jCc9-FNlqx68xsLBSPZlH1W0FGx3YOYmvszHnkZCod9oA=w300"/></p>
<p xmlns="http://www.w3.org/1999/xhtml">Weeks after Harvey, the Harris County Sheriff's Office says they are facing delays answering 911 calls. In some cases, it could take minutes to speak with an operator.<br/><br/>The sheriff's 911 operators were relocated to the Greater Harris County 911 Emergency Center after flooding at the sheriff's emergency dispatch center.</p>
<p xmlns="http://www.w3.org/1999/xhtml">Full article: <a href="http://abc13.com/dispatchers-facing-delays-answering-911-calls-in-harris-co/2436636/" rel="noopener noreferrer" target="_blank">http://abc13.com/dispatchers-facing-delays-answering-911-calls-in-harris-co/2436636/</a></p>
<p xmlns="http://www.w3.org/1999/xhtml"> </p>]]></content:encoded><description>Weeks after Harvey, the Harris County Sheriff's Office says they are facing delays answering 911 calls. In some cases, it could take minutes to speak with an operator. The sheriff's 911 operators were relocated to the Greater Harris County 911 Emergency Center after flooding at the sheriff's emergency dispatch center. Full article: http://abc13.com/dispatchers-facing-delays-answering-911-calls-in-harris-co/2436636/</description><author>noemail@noemail.org (Bob Janusaitis)</author></item><item><title>Study Finds FEMA Flood Maps Missed 75% Of Houston Flood Damage Claims Between 1999 And 2009</title><link>https://www.business911.com/2017/09/study-finds-fema-flood-maps-missed-75-of-houston-flood-damage-claims-between-1999-and-2009.html</link><category>Current Affairs</category><category>Federal, State, Local Government</category><category>Infrastructure protection</category><category>Local incidents</category><category>Resiliency, DR, BCP, and COOP</category><pubDate>Wed, 20 Sep 2017 16:10:47 -0500</pubDate><guid isPermaLink="false">tag:typepad.com,2003:post-6a01157141048a970b01bb09c56928970d</guid><content:encoded xmlns:content="http://purl.org/rss/1.0/modules/content/"><![CDATA[<p xmlns="http://www.w3.org/1999/xhtml"> </p>
<p xmlns="http://www.w3.org/1999/xhtml"> </p>
<div xmlns="http://www.w3.org/1999/xhtml" class="wp-caption alignnone" id="attachment_4042">
<div class="article-body-image"><img class="i-amphtml-fill-content i-amphtml-replaced-content" src="https://blogs--images-forbes-com.cdn.ampproject.org/ii/w1200/blogs-images.forbes.com/trevornace/files/2017/09/flood-houston-1.jpg?width=960"/>
<p class="article-photo-credit">Marcus Yam/Getty Images <span class="show-more">Flooding along Interstate 10 in Houston as a result of</span> Harvey</p>
</div>
</div>
<p xmlns="http://www.w3.org/1999/xhtml">A recent study found that <a href="https://www.fema.gov/" rel="nofollow" target="_top">FEMA</a> failed to capture 75 percent of flood damages within their flood maps between 1999 and 2009. The <a href="https://msc.fema.gov/portal/search" rel="nofollow" target="_top">FEMA flood maps</a> are the primary source for how the government and insurance companies evaluate flood risk and insurance premiums. There are collectively trillions of dollars worth of property that rely on these maps being accurate.</p>
<p xmlns="http://www.w3.org/1999/xhtml">Full article: <a href="https://www-forbes-com.cdn.ampproject.org/c/s/www.forbes.com/sites/trevornace/2017/09/18/fema-flood-maps-missed-claims-harvey-houston/amp/" rel="noopener noreferrer" target="_blank">https://www-forbes-com.cdn.ampproject.org/c/s/www.forbes.com/sites/trevornace/2017/09/18/fema-flood-maps-missed-claims-harvey-houston/amp/</a></p>
<div xmlns="http://www.w3.org/1999/xhtml" class="amp-hidden"> </div>
<p xmlns="http://www.w3.org/1999/xhtml"> </p>]]></content:encoded><description>Marcus Yam/Getty Images Flooding along Interstate 10 in Houston as a result of Harvey A recent study found that FEMA failed to capture 75 percent of flood damages within their flood maps between 1999 and 2009. The FEMA flood maps are the primary source for how the government and insurance companies evaluate flood risk and insurance premiums. There are collectively trillions of dollars worth of property that rely on these maps being accurate. Full article: https://www-forbes-com.cdn.ampproject.org/c/s/www.forbes.com/sites/trevornace/2017/09/18/fema-flood-maps-missed-claims-harvey-houston/amp/</description><author>noemail@noemail.org (Bob Janusaitis)</author></item><item><title>Arkema Chemical Plant media briefing</title><link>https://www.business911.com/2017/09/arkema-chemical-plant-media-briefing.html</link><category>Current Affairs</category><category>Federal, State, Local Government</category><category>Fire-Rescue-EMS</category><category>Homeland Security</category><category>Infrastructure protection</category><category>Local incidents</category><category>Resiliency, DR, BCP, and COOP</category><pubDate>Wed, 13 Sep 2017 18:33:02 -0500</pubDate><guid isPermaLink="false">tag:typepad.com,2003:post-6a01157141048a970b01b7c91fcf37970b</guid><content:encoded xmlns:content="http://purl.org/rss/1.0/modules/content/"><![CDATA[<p xmlns="http://www.w3.org/1999/xhtml"> Great example of handling the media by the HCFMO.</p>
<p xmlns="http://www.w3.org/1999/xhtml">Statement starts at: 1:05</p>
<p xmlns="http://www.w3.org/1999/xhtml">Response to questions starts at" 6:15 </p>
<p xmlns="http://www.w3.org/1999/xhtml"> </p>
<p xmlns="http://www.w3.org/1999/xhtml"><iframe allowfullscreen="" frameborder="0" height="395" mozallowfullscreen="" src="https://cdnapisec.kaltura.com/p/2031081/sp/203108100/embedIframeJs/uiconf_id/36217061/partner_id/2031081?iframeembed=true&amp;playerId=media-preview_2_0_htjqocpx&amp;entry_id=0_htjqocpx&amp;flashvars[streamerType]=auto" webkitallowfullscreen="" width="640"/></p>]]></content:encoded><description>Great example of handling the media by the HCFMO. Statement starts at: 1:05 Response to questions starts at" 6:15</description><author>noemail@noemail.org (Bob Janusaitis)</author></item><item><title>EarthEx</title><link>https://www.business911.com/2017/08/earthex.html</link><category>Electric grid</category><category>EMP-HEMP</category><category>Homeland Security</category><category>Infrastructure protection</category><category>Resiliency, DR, BCP, and COOP</category><category>Science</category><category>Warfare</category><pubDate>Tue, 15 Aug 2017 08:39:05 -0500</pubDate><guid isPermaLink="false">tag:typepad.com,2003:post-6a01157141048a970b01b8d2a03f50970c</guid><content:encoded xmlns:content="http://purl.org/rss/1.0/modules/content/"><![CDATA[<p xmlns="http://www.w3.org/1999/xhtml">Black Sky video: <a href="http://eiscouncil.org/VideoEarthEX" rel="noopener noreferrer" target="_blank">http://eiscouncil.org/VideoEarthEX</a></p>
<p xmlns="http://www.w3.org/1999/xhtml"> </p>
<p xmlns="http://www.w3.org/1999/xhtml"><a class="asset-img-link" href="http://resiliency.typepad.com/.a/6a01157141048a970b01bb09b92849970d-pi" style="display: inline;"><img alt="Capture" class="asset  asset-image at-xid-6a01157141048a970b01bb09b92849970d img-responsive" src="https://resiliency.typepad.com/.a/6a01157141048a970b01bb09b92849970d-500wi" title="Capture"/></a></p>]]></content:encoded><description>Black Sky video: http://eiscouncil.org/VideoEarthEX</description><author>noemail@noemail.org (Bob Janusaitis)</author></item></channel></rss><!-- ph=1 -->