Skip to main content

Airline Safeguards Against Pandemic

Federal officials concerned about avian influenza want airlines to collect personal information about domestic and international passengers to help track a potential epidemic. Dr. Marty Cetron, the Center for Disease Control and Prevention's Director of Global Migration and Quarantine, said, "What we're asking for is the authority to collect the information in the context of modern travel on airlines. There are just a number of cases where acting quickly with electronic access to passenger information is going to make a lot of difference." The CDC wants to be able to easily find, notify and recommend treatment to airline passengers who have been exposed to avian influenza as well as such diseases as plague, dengue fever or SARS.

The CDC plan calls for airlines to obtain the following passenger information: name, address, emergency contact numbers and flight information. Airlines would have to keep the data for 60 days and transmit to CDC within 12 hours, if asked.

(Assocoated Press)

Comments

Popular posts from this blog

Police Report: May 8-11

Friday May 8th : 3400 block of 11 Newton Street : At about 2 pm officers responded for the report of a woman who had been assaulted by her boyfriend. The boyfriend allegedly punched the woman in the mouth and choked her. She told the officers that she did not want any police assistance and refused to tell the officers what had occurred. She was referred to the District Court Commissioner if she decided to press charges at a later time. Saturday May 9th : Nothing significant to report. Sunday May 10th : 4500 block of Eastern Avenue (BP station) : At about 11 am officers responded for the report of a stolen auto. The officers met with the victim/owner who told them that he left the keys to his 2002 Lincoln on the front seat when he went inside to pay for gas. When he came out of the store he saw his Lincoln being driven up Eastern Avenue towards Rhode Island Avenue by a black male (no further description). A check of the area for the stolen car proved negative and a lookout for it was gi

Police Report: June 9-10

June 9th : 2500 block of Allison Street : At about 1 pm officers took a report of a citizen robbery . The victim told the officers and PGPD robbery detectives that she arrived to meet a client when she was approached by two black males. One of the men approached her from the front; the second came up behind her and placed her in a head lock. The second man demanded the keys to her gold 2005 Honda Accord (MD tags 9FA Y36). The victim complied and the two got into her car and fled the scene. The victim described her assailants as black males about 19-20 years of age. The first man was about 5’8” tall with shoulder length dreadlocks and was wearing a white t-shirt, long jean shorts, white socks and tennis shoes. The second man was about 5’10” tall, also had shoulder length dreadlocks and was wearing a white navy hat. The officers also discovered a white 2004 Chevrolet Express van that is believed to have been driven to the scene by the two suspects. A check of the vehicle’s registration

Boston Marathon/West, Texas Spam Campaigns

There is a new spam campaign in circulation using the Boston Marathon bombings that occurred on April 15, 2013 as a lure. Users are sent an e-mail encouraging them to a watch a video of the explosion. When the user clicks on the enclosed link to watch the video malware is installed on the user’s computer.   The following URL patterns have been found in these e-mails: http://[IP-address]/boston.html   http://[IP-address]/news.html   When the user clicks on one of the links the Kehlios worm is installed on the user’s system which has the capacity to send spam; carry out Distributed Denial of Service Attacks; and steal online currency such as bitcoins. Most major anti-virus vendors have signatures for detecting this malware so users should keep their antivirus programs up-to-date.   In addition to the Boston Marathon spam campaign, a West, Texas plant explosion spam campaign has also sprung up. This spam campaign uses similar exploitation techniques as the Boston Marathon spam campaign p