Wednesday, December 30, 2015

Mexican Prosecutor: Vigilantes Infiltrated by Criminals

I think this is really true, and is a problem, but I also think the Government of Mexico wants to control both the bad guys and the good guys, and the Vigilantes are usually not under the control of either. Bad guys are in the Vigilantes, but it is a move in the right direction by all involved. What I think is a real crime is that the Police and Military came in and took the weapons from a Vigilante group that took back their town and ranches. they made a point of saying that they did not take them till they had rousted the local Cartel. Now less than a week later the Cartel was back and took revenge on mainly unarmed people, now they did have some guns, but no where near what the Cartel had. Do not take away the weapons from the Vigilantes, but if you find a bad guy prosecute them.
from CTI Consulting http://ift.tt/1QW4pR9
via IFTTT

Stay Safe: Firearms and Weapons Attack

This is the UK version of how to deal with an Active Shooter, I worry about putting it out because they have a different mantra for dealing with this, so it can be confusing. This UK version goes Run, Hide, Tell, the fight part is not really discussed. I think it is a wrong way to deal with this, but it is what people in parts of the UK are being taught, so Security Practitioners that may end up in the UK are in need of knowing what clients and even security staff may have been told.
from CTI Consulting http://ift.tt/1OkJ80T
via IFTTT

Tuesday, December 29, 2015

Is Chlorine Gas a Threat in Your Community?

In almost every Community in the USA and actually every community in the world Chlorine is a possible threat. Having done mandated EPA risk studies of water and waste water plants all around the USA it is still a problem, but getting less so all the time. Chlorine is being phased out for less dangerous chemical, or at least not as easy to make dangerous. Still many smaller plants have systems that are not outdated, but still not to the level of newer bigger plants. Then there are the transportation of the chemicals to and from plants, as well as to companies that use Chlorine either in making another product or added to another product. Security Staff of all types need to have a working knowledge of the danger, and a knowledge of how to protect themselves and others if than are around a suspect spill, or release of any type. It is hoped that an online class on this threat is developed sometime soon, as part of the FEMA series, the NFPA Coffee break series does have at least one brief on the subject. But in any case CTI will develop a blog post on the subject, at www.CTIC.co The first defense is to get away from any possible release of Chlorine, most of the time it will be a survival reflex to get away from it. First responders are probably the most in danger since they walk into these situations. Get you and your client out and away as soon as possible.
from CTI Consulting http://ift.tt/1Ojta7m
via IFTTT

Gulf Cartel Denies Responsibility for Wave of Kidnappings and Terror near Texas Border

http://ift.tt/1QVXg3j This as one local magazine says McAllen Texas is one of the safest cities in the US. In 2016 we need to really deal with the crime stat problem in the USA, but really look at it in the Texas Border areas.
from CTI Consulting http://ift.tt/1JHLHot
via IFTTT

Drone Buzzes Obama's Motorcade in Hawaii

This is one that all Protection Teams are going to face more and more, and they need to come up with a set of options to deal with them. Back in the early 80's the Japanese had a terrorist cell that used model airplanes for a number of fairly unsuccessful attacks in Japan and had reportedly gave a cell in the USA the technology and go word. It was answered with a three pronged approach, Uniformed Officers and Agents of the US Secret Service added bird shot loads to their shotgun rounds was one. Jamming signals and override controls where others. I do not know if anyone tested bird shot rounds for 38's or 9 mm's for effectiveness, but tests should be done. Shotguns are not allowed in many jurisdictions, but warning the local Police to the threat, may allow them to be in the area with the proper loads in their weapons. I know of a few instances where very long range super soaker water guns, have been used around pools for impromptu defense of medium sized drone, much like the one shown in the picture. It should also be pointed out, to date, these small model plane and drone attacks have not been effective. Their payload is small, and a motorcade moving at speed should have limited exposure to the device. But we all need to be aware and think of answer to this growing problem. As always if people have any thoughts on how to handle this type of threat, please let us know.
from CTI Consulting http://ift.tt/1Owgjk9
via IFTTT

Exclusive - Islamic State ruling aims to settle who can have sex with female slaves

There is really a lot to be learned from reading this article. Fatwa's are handed down by Religious leaders, and have the rule of Law behind them. This is a bad one, but the actual Fatwa is available as a link in the article. Everyone should read it, as they should the ones on killing and or handling Christians, or attacking the US. In the eager minds of the followers of ISIS these Fatwas give them the authority they can quote for committing atrocities on all of us, even non ISIS Islamic followers. I predict that some clown will kidnap a female here in the US under the authority of a Fatwa like this, even though it does not really fit the situation.
from CTI Consulting http://ift.tt/1kpIkMa
via IFTTT

La Familia Mexican drug cartel founder killed - BBC News

Shades of Sonny in the God Father one movie, he was found at a toll plaza, but investigators say he was killed somewhere else and dropped there. Unsure of who killed him, there is a rumor that he was going to bring back the Templar Cartel, which was a pain in the neck to the other cartels, both for it's violence as well as its theft of drugs from other cartels. It also was looking at the territory that two other Cartels have taken over since the demise of the La Familia and then Templar cartels held. All in all no real loss for the Cartel world, or the rest of the world, to include the Mexican Government. Torture was mentioned, which points a little more to the other Cartels, trying to figure out what he was up to.
from CTI Consulting http://ift.tt/1Zzlbqt
via IFTTT

TSA To Make Nude Body Scanners Mandatory -- No Right to Opt-Out!

I have no real problem with the whole body scanners, but can understand those that do: Studies are being conducted every day on the effects of the body even the bacteria in the body being bombarded with everything from x-rays to giga hertz and other waves on it. Here is just one study, using a lot smaller waves on the body. This is trying to see what effects medical devices have on the body, but also looks at security devices as well. The problem is we just do not fully know. Analysis of Magnetically-coupled Human Body Communications S. A. Rocke , Daniel Ringis , Jeevan Persad Department of Electrical and Computer Engineering, The University of the West Indies, St. Augustine Campus, Trinidad and Tobago Human body communications (HBC) uses the human body as a transmission medium to connect sensors and actuators in, on or in close proximity to the human body. The HBC approach offers tremendous potential for the design and implementation of emerging personalized healthcare systems, as well as security, and multimedia communications applications
from CTI Consulting http://ift.tt/1UfaaXK
via IFTTT

Remote Sensing of Electromagnetically Penetrable Objects: Landmine and IED Detection R. Eze 1,... -

In this world of Explosive Devices, Technology is moving is some very exciting ways, This Methodology is not prime time yet, and both Investors and EOD technicians are keeping an eye on this as a big break thru in finding Land Mines, but also other IED's using Electromagnetically Sensing of objects. It is way to basic a statement but think of a metal detector on steroids. There are virtually millions of land mines out there in the world causing problems for every country. As the land mines got more sophisticated, they started to incorporate anti traditional metal detector defenses. This technology is working on a way to detect them remotely anyhow. IED's (Improvised Explosive Devices) have similar traits that this technology can be very effective at finding them. The uses are endless, remote detectors for suicide bombers, one of the hardest problems Law Enforcement as well as the Military are facing theses days. Once again this is not the silver bullet, but it is progress in making us all safer, look for these tools to be available to us soon. One of the most interesting parts of this, is where it is being developed, not MIT, but City University of New York - LaGuardia Community College, Long Island City, NY, USA 2 Regis High School, New York, NY, USA, So all you high school students and Community Collage students take heart, this effort, and perhaps yours could end up saving thousands of lives.
from CTI Consulting http://ift.tt/1kqf9bM
via IFTTT

Monday, December 28, 2015

Private Jets Tagged With Graffiti at LA Airport

This is a problem, but just to be fair, Van Nuys GA airport has as good or better security than any GA airport in the country. Most GA airports have virtually no security with planes that cost as much or more than the ones at Van Nuys, The level of security and the set up for the airport has always been high, since it has at times been a commercial airport. Van Nuys this kind of vandalism can and does happen virtually every day at GA airports. Planes are stolen, remember the bare foot bandit that kept stealing planes and landing them at other airports, to just steal another one. Then there is the guy that stole the plane and flew it into the White House. GA security is more the owners problem than the airports. Most corporate aircraft are kept under lock, alarm and often CCTV controlled and operated by the aircraft owners. If these very valuable planes are damaged, it is almost 100% of the time the owners problems. CTI just did a study for one State of all their GA airports, and having done a security study of Van Nuys in the past, I can tell you the airport meets or exceeds security for any GA airport I have seen. Some come close, but in every case it was because they had been a commercial airport in the past, like Van Nuys. If I was the planes owner or the FBO they used in Van Nuys, I would check with their security, or fire them. The repaint job for the plane, probably will cost more than a full time security guard standing near the plane, or the rental of a security hanger.
from CTI Consulting http://ift.tt/1OUKVGm
via IFTTT

191 Million US Voter Registration Records Leaked In Mystery Database

This is the scary part of big databases of any type. 2016 is going to be one of the scariest years yet. We are behind in being able to secure data, and I think the big thing is we never will be able to secure this data as well as we think it should be. In voter situations many are volunteers, they are given passwords as well as access to what many of us consider confidential data bases. They often do not, they see it as open, since they have access, and act that way with it. Here is one that is not talked about a lot, and that is theft of computers, or even hard drives. Government agencies, law firms, corporations and yes voter agencies lose or have them stolen everyday, if they are lost, then reporting them is not a real issue, if stolen, they usually have to be reported, and the paper work involved with that can be mind bending, not to mention the reporting to people that may have data stolen. Lost is a good category, since they, the computers or hard drives may show up. I know of computers that have been lost for years, once a company can write off the computer tax wise, it no longer has asset value, and just disappears from the books. I no damning reports come of it, the no harm no foul. If someone is hurt, then it reappears from the lost, and is reported stolen, and articles like this are written. It happen in the old paper days as well, when the Justice Department got rid of some old file cabinets, the contractors saved some money by just dumping them in a vacant lot in Wash. DC. No problem till files showed up in the hands of a Reporter, who wrote a big story on what was turned over to him. The big problem is that one fairly small hard drive can have the info of thousands of file cabinets and can be searched much easier.
from CTI Consulting http://ift.tt/1mm0PCq
via IFTTT

Court challenge to TSA change in full-body scans

I think we need to take a look at this, for two reasons, one why is TSA making this move, second there are still unanswered medical questions. I have no problem with the full body scanners, but I can understand the folks that do. If we find in 5 years that 5% of the population had problems with this type of radiation or even micro wave radiation, it will be too late to turn back the clock.
from CTI Consulting http://ift.tt/1IsJClg
via IFTTT

Vehicle Dynamics Institute

Great Information
from CTI Consulting http://ift.tt/1VmzeNI
via IFTTT

Sunday, December 27, 2015

Mexican drug cartels 'operating in the UK, France and Netherlands'

Interesting to hear our ICE/DHS agents talking to Law Enforcement from other countries. I wish they would or could talk that openly and freely with our Local Law Enforcement and City leaders. They really need to hear the straight talk on the Cartels.
from CTI Consulting http://ift.tt/1PrxX7B
via IFTTT

Saturday, December 26, 2015

Granite City: Is the Neapolitan mafia running Aberdeen?

Just when we thought we were out, they show up again, most say they never went very far. But it does show that dogged prosecution like they did in Italy can move the old Don;s to another location. Looks like Scotland is the new Sicily for the Mafia.
from CTI Consulting http://ift.tt/1t0pfmf
via IFTTT

London global money-laundering centre for the drug trade, says crime

As it is so well said in this article Mexico is the heart of the Drug trade and London is the financial head. England is starting to make economic gains, and for one housing prices are going up, and it may be hand in hand with the London Banks working with the Cartels. London Leaders are very fearful of the type of financial bust that could bring down the sitting Government. Others seem to be in a state of denial that nothing is wrong, sort of like the USA and Mexico. Mexico is looking at the EU and if they can the rest of the world as their market place, they know how to broker deals for product and match markets. If they can launder money for all of it, then they can offer the deal of the century to other criminal organizations, make the money clean to the world. It gives pause as we start a new year, that this little problem we have on the border of Texas, is just part of what is a world wide problem.
from CTI Consulting http://ift.tt/1QOxePn
via IFTTT

How Mexico's criminal gangs are 'contaminating democracy'

Money Laundering is pivotal to making a criminal enterprise successful. It is kind of interesting that this article comes out of London, which just took the unofficial title as the money laundering capital of the world. Still as this article points out the Government of Mexico is so mired in the Cartels money that some, perhaps many believe that it is beyond redemption. But as the article points out, even the good guys are making money from the Cartels and are not sure how they are going to handle it. Perhaps the US Government can find some bad guys to buy down our debt, or not. What does Mexico do next, perhaps this growing movement of activists trying to take down the corrupt government practices is just what is needed. Sort of the Arab Spring of Central and South America.
from CTI Consulting http://ift.tt/1OdB6qE
via IFTTT

North Dakota oil boom lures Mexico's cartels - CNN.com

Cartel expansion is getting explosive, recent inroads to Span and the rest of the EU are just part of it. It already has roots in every State and most Cities in the USA. A recent post on the expansion into the very wealthy Montgomery County Maryland by the the MS-13 street gang, affiliated with the Gulf Cartel of Mexico points this out, among others, but the Gulf Cartel is getting to be the mainstay of MS-13 in fact the Gang is being bankrolled into new territories by the Cartel. Like any good business the Cartels follow the money, and the Oil boom of North Dakota is seeing a lot of money. Taking a play from the popular TV show Sons of Anarchy, Motorcycle Gangs are providing the transportation of the Drugs from the West Coast and it is rumored Chicago into the North Dakota area. Prostitution rings controlled by the Cartels and Gangs affiliated with them are the ground troops, at least in the beginning. Now actual mid level Cartel members are taking over, which could be why the FBI is taking such a notice. Looking for ways to give up and coming Cartel members more of a role, the Cartels are starting to exert more hands on control of operations. The street gangs are still used as ground troops, but local area control is more and more by hardened Cartel members. The Mafia had the same problem back in the 60's and 70's, the room to expand to keep talent happy was limited in the New York and Chicago families. So they started to expand and reward up and comers with areas they could control, like Florida and Pennsylvania. Now the Cartels are taking a page from the Mafia book and giving territories to Cartel member's that show promise. Keep you eyes open for a new Cartel coming to your town. Down here on the border we are seeing another type of expansion, Gangs that have proven their ability to control and enforce areas are being brought to the Rio Grande Valley to be controlled enforcers for the Cartels. The Cartels have shown a little to much of themselves in the valley as enforcers and this upset the balance of power and denial by the local Governments, so the Cartel bosses has decided it is best to have a more hands off role in enforcement, but still have their big homes and large life styles on the USA side of the border, where for them it is safer for them and their families. As one local in the know person has said, it used to be the Cartels had their girlfriend families over here in the US and their real families over in Mexico, in the past few years that has changed a lot.
from CTI Consulting http://ift.tt/1kkRJV6
via IFTTT

Friday, December 25, 2015

Is It OK to Shoot Down Your Neighbor's Drone?

TrentonScottH : Is It OK to Shoot Down Your Neighbor's Drone? In a word, no (but the laws may change on that) https://t.co/WfXXocGYEu
from CTI Consulting http://ift.tt/1flNJBR
via IFTTT

Recap: Ask This Former DEA Agent Anything About Fighting Drug Cartels In Mexico

Good read, these are the folks that have been on the front line in the fight against the Cartels, and they will tell you the real war on terror is the Cartels, and though the border cities are the front line, they are in every City of American in one way or another. Spain and the rest of the EU are starting to see Mexican Cartel action in a big way. Cartels use the internet as well, mainly for human trafficking prostitution is the face of it, but now slavery of women is reaching epidemic proportions. But for recruitment they use gangs and even bankers to expand. Unlike ISIS they the Cartels often do not want publicity and even go as far as to threaten even kill reporters that dare report on their activities. We do not have Mosques to track and report these terrorists, we have stock brokers and other businessmen who chose which dealer they want to do business with. This then means that rival cartel's threaten and kill other dealers to gain part of the action. More and more cartels are killing the users as well if they do not chose the leading cartel to buy from. Two pool parties have been shot up in the last years, to teach kids that buying from a rival cartel is not a good thing. One Cartel operator explained that like in any business you control expenses as best you can, then you have to work on controlling the market place, as in any business cost and quality are critical factors, but unlike a normal business the call for greater profits often work on the market with threats and controls like location location location. Cartels through the gangs they sponsor stake out territory in the US it is corners and blocks, in Mexico they use what is called a plaza system. One Cartel runs a Plaza normally associated a set of routes into the US, much of the violence is for control of the Plaza, in the US it is a corner, or in some cases even buildings. A rumor floating from another cartel operator is that the profits from just one Bank or Stock Broker's company Head Quarters can beat three even four street level corners, and far less chance to get caught. The same intelligence capabilities used on the ISIS and other radical Islamist groups can provide big problems for the Cartels, who are getting more and more sophisticated in countering Intelligence activities, of Police and Federal Law Enforcement. Like the take down of the Colombian Cartels we need to bring real DOD intelligence capabilities to the lead. Unfortunately the USA got a lot more co-ordination from the Colombians than we are getting from Mexico. There are two big problems with Mexico, one is corruption, every time intelligence is shared with Mexico there is the chance it will end up in the hands of the cartels. In one case a road stop by a good policeman found a folder of Intelligence from the US given to the Mexican authorities less than three hours before the stop. The other problem is the Mexican Government bodies are not inclined to lose the undercover money given to them by the Cartels. Add to this the Cartels turn a bit of a blind eye to the Mexican Government raiding the tax coffers of the very profitable US, China, German, and Korean businesses operating labor operations in Mexico, and the new Oil business, all providing Mexico with enough money to really help the Mexican Citizens, so they do not have to flee Mexico for the USA. In oil there is enough to go around it looks like, since the Cartels and corrupt Mexican Government are both making money off the oil boom. The Cartels are making enough that in at times is more than their drug business, the Zetas are branching out to Gas Stations. It allows them to sell stolen oil, launder the money for that plus the drug business. Side profits are coming from credit card scams and Identity theft.
from CTI Consulting http://ift.tt/1m9T2HH
via IFTTT

Censor or die: The death of Mexican news in the age of drug cartels

The Terrorism going on in Mexico is worse than all the radical Jihadists put together. What is worse is one of the reporters from the US highlighted in this article, has been chased by armed gunmen on this side of the border. They had parked their company van in a US Police station parking lot, to stay safe. They returned from the assignment of getting information on the Cartels to find a dark SUV with people inside parked next to their vehicle. Knowing more about the local police (I must add that these are US City Police) than most of us, they did not feel comfortable about going to the police for help. Their story is in a Breitbart news release. The real story here is that the USA feels it can ignore this problem in Mexico, and by doing so the violence is moving with greater speed into the US infecting our Governments and Law Enforcement, and to some extent our press. The USA has turned a blind eye to what is going on in Mexico, the Mexican President even feels he can chastise the USA for not taking better care of his citizens in the USA, here illegally I may add. The death toll is high, but the fear of both the Mexican Citizens and the US Citizens is not measurable in any statistics, it is a real problem. The press is a civilizations last bastion of strength against criminals both outside and inside of Governments, when they are not able to do their jobs, either from owners with biases or threats from outsiders, we all lose. In Nazi Germany the first moves were to control the Press, the next was to collect the weapons from the citizens. Mexico already has some of the strictest gun laws in the world, and now the Press is under censorship both from the Cartels and the Government. Using fear and intimidation to control the areas they operate in, to include more and more inside the USA the Cartels use more and more covert controls and make sure citizens on both sides of the border do not report crime. Hence the crime figures are going down, and Governments close their eyes to the eyes to the real crime problem. The Texas DPS wrote a threat assessment back in 2013 showing how crime in the USA is not reflective of what is actually occurring. Pointing to the FBI crime reporting system is totally out of touch with reality. In the border towns along the Mexican border, crime reporting is even worse, and for economic reasons the City fathers on both sides of the border do not want the actual crime figures to be known. Reynosa Mexico used to be a lot like Mission and McAllen Texas. Now days Reynosa is a virtual ghost town next to the old days when the Cartels started to make their presence known. Like McAllen and Mission these days, they turned a blind eye to what the Cartels did and when they did open them they found themselves part of the problem, not able to find a way out. We have a terrorist threat on our border, that claims more lives than the entire middle east and north Africa. Legalizing drugs will not solve the problem, the Cartels already have found they can sell cheaper and with out the paper trail of legal drugs, they can match or go under the price of the legal systems, even to the point of using tax stamps on the drugs, like they already do for cigarette sales in the US and have many other ways to make illegal money to the point that for many small cartels, the drug sales are a dwindling part of their business. The Mafia did not go away after prohibition was repealed and the Cartels are far more entrenched in the USA than our own Mafia ever was. We need to take the fight to them, and protecting free speech for the Press should be the first goal.
from CTI Consulting http://ift.tt/1YGG6Wm
via IFTTT

Thursday, December 24, 2015

The Philosophy of Security: Iran Charged with Hacking a Dam in 2013, A 2015 Report Says

From what has been released and that is not much at this time, it could be part of the Stuxnet code that has been rumored to have come from the USA and or Israel to damage their Nuclear Armament Program, being released back at us. We know the Chinese have made full scale mock ups of USA systems like power grids, water treatment and waste water treatment and are constantly developing systems to attack our critical infrastructure. Yes we are doing the same, but they have very few systems on a grid or linked up like ours. Plus many of our systems are older and much more vulnerable, since they have been around a lot longer. Everyone is scrambling to find the silver bullet to protect their systems, but the target changes everyday, perhaps every second of every day. Cyber attacks from all sides are the wave of the future, and may already be installed on a computer or router near you. Have a happy new year, 2016 should be interesting.
from CTI Consulting http://ift.tt/1ZriR4O
via IFTTT

Iran Charged with Hacking a Dam in 2013, A 2015 Report Says

Iran Charged with Hacking a Dam in 2013, Report Says



This could be another throwback to the probable USA/Israel attack on the Nuclear development plant in Iran.  Using the fairly sophisticated Stuxnet carrier a small simple malware was inserted into the Iran system.  It controls a very unsophisticated Programmable controller that told the centrifuges used to make military grade nuclear material for bombs to speed up or stop randomly.  The Controller made in the US and other places in the world, has a limited command structure and speed up, slow down, start, and stop are among them.   With timing added, so that intermittently systems using this type of controller would start  or stop, or in the case of the Iran systems change speeds on the centrifuges damaging them beyond repair, even making clean up of the systems a real danger to the operating staff, they are hard to find, and very effective.



The attack was developed so that all it needed was for a small bit of code to be inserted into the Iranian Nuclear system, and it would replicate till in made it to the Programmable controller.   It apparently worked very well, and beat the sort of demarcation line that most of the power grid, water filtration, waste water, and yes our dams use.  That is if you can keep the system off the Internet so no one has a chance to insert the code, that would keep a system safe.  By the way this is the same first or last line of defense all countries, including the USA, use to secure their critical infrastructure.  But the stuxnet could be inserted in to flash drives or even CD's used to maintain these critical systems.  Once in the system it went wild, and there is part of the crux of our problem.    



To insure the bad code got into the Iranian system, a lot of devices like Flash drives where corrupted, and finally one made it into the Iranian system.  It could have been on a flash drive some worker had made to hold MP-3 files so he or she could listen to music while working.  Once plugged into the computer at their work desk the bad code was off and running.  The code could have made it into the system during an update, much harder since many companies will analyse the code before inserting it into the system.   But if after being analysed, the code was put on to a new empty flash drive, the flash drive could have had the bad code on it.  The paths into a system are almost endless.



Now these Programmable Controllers are use all over the world in all sorts of systems.  There is a rumor that the Stuxnet was tested by USA experts on a system very similar to the Iranian Nuclear system in the USA just prior to being used in the attack on the Iran Nuclear  Development system.



Access control systems use them for opening and closing gates to an airport. or prison cell doors, or the on off valves to a water treatment system, or , yes, even a small dam in a small village town near New York City.  The intermittent part of the attack is part of it's danger.    If a gate opens out of the blue to a major airport, and then later closes, most of the investigation will center around who could have done it, or was it just a glitch in the system, if it does not happen very often or regularly, then it will probably be written off as a glitch to the system.   They happen all the time.



Now take a power grid, if a programmable controller is infected by this code, it could shut down parts of the grid, causing spikes and other problems up and down the grid, if two or more would happen, our grid could be in real danger.   This is the same with waste water treatment systems, or a small dam.  Say a prison door(s) opened up and prisoners were let loose, or even a traffic light system on a major intersection started going from red to green at times.   Can you think of how you would explain that to the Police that wrote up the accident or the insurance company.  Small time but a real problem.  Here is part of the problem.



When the Stuxnet was released, it went wild like it was supposed to, it did, it is rumored have some direction to it at some point, but it either migrated on its own, or with the help of some hackers, like the Chinese to a very wild child, that would attack any system it could and try and find a Programmable Controller it could release the code to.  So if some experts are right it is flowing around the world now, looking for a system it can work with.  Most of the major systems in most countries, now have a way to delete the system and most of the programmable controllers it could work on have been removed from service.  Still there are systems out there, and even flash drives that have the code on them.  Small dams like this are just the targets this attack may still work on, and many more sophisticated attacks have been developed off the original Stuxnet.  Once hackers saw the elegance of the small code attack and the carrier system used, it is a main development point for them.



Many people coming back from the mid east would find they had picked up a version of the code in their travels.   It is rumored that a similar carrier, a code that just sits and waits for a signal to turn on is in over 80% of the computers in the world, at this point, for what reason, experts can not seem to make up their minds on.   It is now I understand tagged, since removing it is almost impossible, since it will show up again almost immediately.



Remember the first or last line of defense against an attack like this is to keep your system off the internet at all times.   One of the first tests we do is bring up the browser on computers used in these critical systems and try to get on the internet, over 80% of the time we can, meaning the system can be attacked at any time, or could already have malicious code inserted.  Next we look at the browser logs, even it the system is not on the internet when we check, the browser will almost always show, "controlled access" were a vendor has been allowed on the system to enter updates or even security patches to the system.  Once again this is just the attack point the bad guys are looking for, or even just a way word piece of code floating around the internet, perhaps residing in a local router, or even not local to your system router, has the code waiting to be inserted.



Cyber attacks are the wave of the 2016 future, and may already reside on your systems waiting to pounce.  Hmm that printer that just starts up and prints garbage sometimes, is it infected, or those surveillance cameras that turn on and off on their own, or it is all just in your mind.  Have a great new year, it should be interesting. .








Thursday, December 17, 2015

8 Behaviors Successful Leaders Use to Motivate Staff

TrentonScottH : "8 Behaviors Successful Leaders Use to Motivate Staff" #productivity #feedly https://t.co/dvY1RJWoeu
from CTI Consulting http://ift.tt/1P9WpZa
via IFTTT

The Economist

There is definitely a market for anti-drone tech out there at the moment.
from CTI Consulting http://ift.tt/1Pa7b1t
via IFTTT

UPDATE: McAllen school officials report no problems after threatening email

Probably a very good move to not over react to the threats. I think the worded response is perfect, we are mobilized to handle any threat. After nothing has happen this morning the response is looking fantastic. 95% of bomb threats are hoaxes by FBI stats, but the real number is like 99.5% are hoaxes. The key now is to find the persons making the threats. Bomb threat briefing forms are designed to gain as much knowledge from the threat as possible. Email threats as well as other social media threats are getting to be more prevalent than phoned in threats. Because they are hoaxes are by no means reason to not take them seriously. Often threat's are the first salvo of a person with a real grievance, and they may move on to actual events. So finding them is something that should be taken seriously.
from CTI Consulting http://ift.tt/1IbGQAD
via IFTTT

Walt Disney World, SeaWorld, Universal begin using metal detectors at theme parks

Probably a very good move, but for you protection folks, I would take the same stance as the USSS when it went to metal detectors. It did not mean we found all weapons, it did mean they had at least weapons as big as what could have been smuggled in. Do not for a second think your protectee is safe because of the metal detectors or searches. It can be guaranteed that it is not anywhere as good as your Airports security, and we all seem to have doubt of that search. These searches at best give you an edge when defending yourself or clients, but insider threats are still a real problem, as well as sneaking weapons thru, or making them while inside. Be aware and plan, the bad guys are.
from CTI Consulting http://ift.tt/1Ze1oNc
via IFTTT

Unbreakable Encryption Poses Big Problems for Law Enforcement

The story line maybe true but that is about it. CTI's founders have been dealing with this problem from it's beginnings and before. Back when the first PC's hit the market, encryption was an issue. First it was, and I believe still is on the restricted armament list. In other words you had to get NSA's approval to sell encryption programs overseas. A client would come to CTI and ask if we would get NSA approval for overseas sales. These were little firms, the big ones went directly to NSA, as did even the medium sized firms. At first it was not a problem, even CTI would run and A block on encryption program, which shows the randomness or strength of an encryption program. It is basically a page of A's that are then encrypted by what ever program was being used, most were pretty easy to see that they could be broken, many by the way still are. But as the smaller firms and huge firms from over seas, as well as many smaller firms from overseas got better at encryption, the NSA had a problem, now some pretty great encryption was on the free market, made by folks over seas that could not be controlled by NSA. It only got worse thru the years, till where we are now. it is still a restriction to sell some of our encryption overseas, but it is the other way around now, we do not want our encryption programs in the hands of the bad guys. Our, in fact the worlds economy runs on things like Fed Wire, which is the majority of large bank transactions, and no one wants that encryption broken. But even parts of that encryption was developed by Foreign Nationals working in the US. So the fear and problems continue, my last look at Government Encryption in the raw as they say, was in the early 80's, and that was beyond belief and I am sure that is child's play now days. But, back to the encryption problem of today, the US could pass laws, but it is like banning guns, encryption is made all over the world, and you just can not stop it. Another problem is if you force an American firm, that probably has foreign stock holders, or even majority owned by gray stock holders, they will never make another sale overseas if NSA is known to have the ability to decrypt. Not to mention no one will use those programs they will just continue to develop their own. Virtually every Government and big Firm in the world can do this. Many encrypt things and then run a known encryption over that, so Governments think they may have a shot at breaking it, until they really have to, which by the way, there is so much traffic out there in the data stream, it is tough. For a while Intel agencies used the fact that if an encrypted piece of traffic came by, that someone was trying to hide something, and knew what to target. Now days everyone from PR firms to elicit affairs use encryption. Still encryption packages can often be tracked by the type of package signature it uses. So we may not know what is being said at the moment, but we do know who is talking to who, or we did till the meta data restriction came up. Just from my point of view, NSA can break anything, the question is time, if an event is going off then time is most important. Still if we know from where to who or where, we can act. We can go back to dumpster diving to get either the printed encrypted data, which is readable, to attacking the computer or phone, which is just a small computer and reading it off the screen as they do. Yes there is traffic where the message delete's itself after the reader reads it, but that is just deleted at the readers end, NSA still has the data, and one second with the persons phone or nearby access to it, they can bring it back up. I have to admit the meta data can make some of this much faster, which may save lives, but NSA can do it with raw data as well. By the way the stuff you are keeping from our Government in this Meta Data is still available to the vendors like Tmobile and the rest, who can sell it to who ever they wish, so you have not made yourselves any safer. But what you have done is the T mobile folks can warn clients and customers that court orders have been issued for data. Now you have given the possible bad guys the knowledge of an investigation ongoing against them. T mobile is in a constant race for customers and keeping customers, if you don't trust your government think about those Telcom companies, that have huge foreign customers as well as stock holders. Yeah the US citizens really had our press and politicians looking out for us on that one. Making another law to put short cuts in encryption is just stupid, the same hackers that attack us all the time can make a new encryption algorithm in less than a day, or take out the short cut in seconds.
from CTI Consulting http://ift.tt/1HDas2T
via IFTTT

Wednesday, December 16, 2015

Team led by Middle Eastern Woman Caught Surveilling U.S. Facility on Mexican Border - Judicial Watch

This can be very serious or nothing, but it still has to be taken seriously, or we could be missing a key to the next attack. I would hope a CIA type investigator had a chance to talk with all of them. An investigator with knowledge of which buttons to push, and what reactions to look for. CBP has some of the behaviorists in the business (they may not know it) but this situation really does take a person aware of the cultural and religious issues to have any chance to read them.
from CTI Consulting http://jwatch.us/4YqV8h
via IFTTT

Gleeful ISIS Gloats About Los Angeles Bomb Scare

This is the price of responding to a bomb threat, if you can use a 25 cent piece to cause panic like this, then they claim a win. Actually I am not sure the LA school district had it wrong. Part of the risk assessment is, have they shown the capability to attack? In LA you would have to answer that one as a big yes. The key will be, how they handle the next threat. Remember bomb threats are a hoax over 95% of the time., and ISIS has never made a threat before a bombing in the past. Everyone needs to dust off those bomb threat plans, make sure bomb threat forms are at the locations of where people take calls, provide Briefings on Bomb threats and how to evaluate them. Perhaps even a table to exercise to make sure the plan is working. All this can be done in less than an hours. If you are in the MIssion Tx. area contact CTI, we will do free briefings for the next two days. I am sure many of the ESI graduates can find the time as well, and they are all over the US. Here is a link to the CTI blog, bomb threat forms can be made from the down load as well as how to handle mail and package suspect Items. with the Christmas season on us, there are going to be a lot of packages being mailed around. ISIS/AQAP have in the past placed bombs in UPS and FedEx packages for delivery. http://ift.tt/1H7PMqh
from CTI Consulting http://ift.tt/1NRGEa8
via IFTTT

Tuesday, December 15, 2015

CTI Consulting

Have a great Christmas and New Year, do not make it a great one for the bad guys, be aware.
from CTI Consulting http://ift.tt/1QLeRsQ
via IFTTT

How Not to Get Phished (and be a cyber-crime victim) Before the Holidays! - Executive Chronicles

This Christmas Holiday season is also the season for scams, both cyber and old school phone, mail and in person. Have a great time this Christmas just be aware of the bad guys as you do.
from CTI Consulting http://ift.tt/1QLeRsQ
via IFTTT

News from The Associated Press

CTI has worked with School systems, to Courthouses all over the world and everything in between. Both school systems made the right choices in this case. LA had just had a local incident and its citizens are a little raw, New York City on the other hand has made a valid decision based on a risk analysis. Emotions are a part of the factor, and can not be disregarded, but if LA continued to react in the same way on future calls, then the Terrorists win. This type of threat is right out of the ISIS/AQAP Fatwa playbook, so expect even more coming down the road. If we tend to overreact then expect even more. Inspire Magazine did a whole segment of one issue on the fact they spent $4,200 on two bombs and cost the Aviation industry around $2 billion reacting to it. Think of how they will exploit a zero cost email to the amount of cost both monetarily and operationally. A school system shutting down gave who ever made the threats a lot of press. As long as you have a basis for making a valid risk analysis, decisions to not shut down the school system can be justified. The key is to have a way to justify your decisions with definable risk assessments.
from CTI Consulting http://ift.tt/1YiHFJU
via IFTTT

t.co / Twitter

TrentonScottH : RT @nytimes: Breaking News: Schools in Los Angeles will be closed because of a bomb threat called in to a school board member https://t.co/QG860qe7cH
from CTI Consulting https://t.co/
via IFTTT

LAUSD Closes All Schools Amid 'Credible Threat' of Violence to 'Many Schools'

TrentonScottH : Both LA and NYC schools received specific threats; only LA threat deemed credible. The source should be considered | https://t.co/PPFeM2io8U
from CTI Consulting http://ift.tt/1YhHXk7
via IFTTT

Monday, December 14, 2015

Head of White House “Nudge Unit” Maya Shankar Speaks about Newly Formed Social and Behavioral...

Ford wants you to buy a new truck, preferable theirs and spend millions to develop adds that promote that feeling as you watch them. NLP, has been around for a lot of years, I got my first certification about 10 years ago, but the White House has taken it to a whole new level. They have picked a few areas where they would like to bend the minds a bit of the American Citizens, EPA had a few targeted areas, for the Nudge Unit to work on, the IG of the EPA just finished a report that shows the project was illegal and that is just the start. Bending the minds of the Citizens to what the White House wants to push forward is well within their rules, it just is not legal. The EPA findings are here: http://ift.tt/1SXUSpW
from CTI Consulting http://ift.tt/1qVDkP7
via IFTTT

Consumerist.com


from CTI Consulting http://con.st/k2Y0snZ
via IFTTT

Friday, December 11, 2015

ISIS May Have Passport Printing Machine, Blank Passports

This probably very true, it has been going on for years, when Saddam first took over Kuwait the first thing they did was capture the equipment and blanks and start printing passports. This should be disturbing, many countries use the same machines the US does, bought from the same company. Yes there are some differences, but not many. I know the Palestinians in the Gaza strip were looking at the same machine the US uses for small amounts of passports. Now that was the Fatah Party, I would assume Hamas got hold of the Units when they took over, but perhaps not the Person for Fatah that bought the machine is no longer in Gaza. The machines can easily meet UN standards, and would and do be able to pass through many passport checks, maybe not the USA one's but certainly most of African and former ----Stans of the old Soviet Union. Libya, had the machines as well, and you know Iran has versions from many countries now. It is one of the first things you grab as you hit a foreign country, and Iran has hit a lot. As in any of these things all the big boys like US, China, Russia, even France and Germany have blank passport and machines to match any country, it is just basic spy work. So as you can see this just helps muck up the vetting process even more. If you can hold a country long enough you can even insert bogus back grounds for people to match the Passports. Ramsi Yoseff in jail here in the US is believed to be a product of the Saddam invasion into Kuwait, many terrorists are running around the world on back grounds developed from the Kuwait invasion. So now take that on the road, and you can see Iran, has been doing it, as well as ISIS in what we hope is a much smaller way. In Kuwait it is rumored that some backgrounds went all the way to birth certificates, but I have never seen it proven, but it makes sense. Saddam knew that the more he helped any terror organization the better it was for him. If nothing else things like this muddied up the water enough that he could pull his games, and make friends with terrorist organizations that would hit the US at times. He was personally one of the big funders of Suicide Bombers in Palestine and Israel. As you go deeper and deeper into the vetting process, it get to be very murky. A young student in Virginia, was found with some of the best gear for making fake ID's in his dorm room. There are at least 4 active experts in providing Mexican ID's and US ID's for Mexican, or people coming thru Mexico, and this does not even start to count all the fly by night groups all along the border of Mexico making pretty good ID's often off of stock stolen or bought from Mexican offices.
from CTI Consulting http://ift.tt/1QhYK7o
via IFTTT

CAIR Office Evacuated Due To 'Foreign Substance' Found In Mail

It's important for companies to have procedures in place for when this sort of thing happens, especially if they don't have a dedicated mail facility.
from CTI Consulting http://ift.tt/1jRaMX0
via IFTTT

Wednesday, December 9, 2015

How do you detect a drone? Use Yellowjackets-Tablet for Wi-Fi security

Great Post Yellowjackets equipment is used by counterespionage and spys for detecting devices out there. This one I had not seen before. But it appears to be taking its WiFi detector and adding a bit of protocol analysis for drone control signals.
from CTI Consulting https://youtu.be/9mhWJ5SOwic
via IFTTT

ISIS proudly display military equipment - including TANKS

We need you folks that know Military Weapons and Technology to open your minds to what they can do with these weapons and technology to use them against us in a Homeland or European ISIS attack. As the artical points out, if they use them there, they will be bombed out of the existence. What we and your colleagues need to know is their options to reuse technology to attack us here. Things like weapons parts, radar, can it be taken out and used against us. Fusing systems on exploding weaponry, what can they use on us. It is not thought that they have torpedo type devices, in the USSS we went thru a whole project of looking at the fusing systems they could reuse to attack, us. The same was done for landmines, grenades and rockets. What else is there, think about barrels for weapons, optics, both night and targeting that they can use. Tanks I am told they have very sophisticated electronics in them, what can be reused against us. Military weaponry and technology is not a strong area for many of us, including me, so we need your expertise, I know the bad guys are using what expertise they can find to use this equipment to attack us.
from CTI Consulting http://ift.tt/1mas4QP
via IFTTT

Tuesday, December 8, 2015

Man cut the home's electricity before a break-in near Edinburg

This is not some criminal master mind here, but this is where social media can shine. Some one out there can recognize this guy, if not by the picture of his face than by the way he moves. CTI has gotten identification and in the end the Police got the bad guy, from a lot worse video. The ID came from a former coworker watching the way he moved, got him in the first 10 seconds into the video. Could not arrest off the video but it gave the Police its suspect. When confronted by a family member that started crying when he watched the video with the suspect, he confessed.
from CTI Consulting http://ift.tt/1NEqXDb
via IFTTT

Wife and son of northeast Colombia politician killed in assassination attempt

Ambushes close to home are always a problem, the closer you get to your home the less route options you have, plus studies have shown that is when we tend to let our guard down, we are near the finish line. Always look for areas along your route where a lone person can have the time to recognize the car, and set up for a kill. Doing route surveys are always a good idea. Google earth your start and stop points, then let it pick a route, it should also show you other options for routes, a good place to start. What Google will not do, is areas close to your home or office, that you will have to trace out yourself, and then run them.
from CTI Consulting http://ift.tt/1YWjTpe
via IFTTT

Monday, December 7, 2015

News from The Associated Press

It would appear the investigation has found hand gun ranges that have been used by the Shooters, long gun ranges are not as prevalent in the area, but Investigators believe that they have found one. No one seems to know when the long gun range was last used. but Investigators think the couple used a friends back yard to dry fire their long guns. Once again not reported to anyone, even though it has to look strange two civilians practicing with long guys in a back yard. Once again it is reported and the photo's seem to show laser aiming devices on both long guns, that would allow them to paint the target and have a good idea where the bullet would be going with out having to bring the weapon up to sight down the barrel. This allows for a lot less training for fairly accurate shooting. No one knows what ever targets the couple had planned, but the long barrels and flash suppressors attached actually detract from indoor shooting, and are more in line with outdoor and longer range shooting planning.
from CTI Consulting http://ift.tt/1loUNRC
via IFTTT

Act

Great Active Shooter Poster and booklet. I like CTI's a little better, but this is very well done. Every Office, building, even home, would do well to have this Poster up and everyone briefed on the attacked booklet.
from CTI Consulting http://ift.tt/1XWNZqn
via IFTTT

KRGV

Probably a good move on the part of the school system due to the ongoing threats. But remember in the ISIS and AQ magazines they tell their followers to phone in bomb threats if it disrupts the citizens from carrying on with their lives. The school system, actually all Government and Private businesses need to review their bomb threat plans, and up date them. In addition anyone that normally answers the phones need to have a bomb threat phone call briefing and bomb threat forms conducted and available. Police and CTI also can provide these briefings as well as help you review your bomb threat plans.. One form is avaiable here: http://ift.tt/1H7PMqh
from CTI Consulting http://ift.tt/1SJGxxd
via IFTTT

McAllen School Evacuated after Receiving a Threat

In the face of what we are going through the world, an evacuation is probably a good move. But the school system needs to update its bomb threat plans, and retrain people that normally answer the phone on dealing with bomb threats. Every Government and Private sector facility need to take a moment to review bomb threat plans, and what training is needed for people that answer the phones. If according to ISIS plans, they can call in threats to disrupt our way of life, then that is a valid plan. So we need to develop plans to responsibly deal with threats, or we will have to shut down businesses and meetings all over as a response to these threats.
from CTI Consulting http://ift.tt/1SJGxxd
via IFTTT

Saturday, December 5, 2015

When we lost the NSA tracking meta data, this is what we lost.

 It may not look like much, but if you look at the center dot being just one phone or computer used by the Cal terrorist couple, and then look at all the people they called or called into them, in almost real time, then look at all the possible suspects. Yes you can eliminate many of them quickly, but look at a Pizza parlor plot that was stopped because all at once many suspects had been found to call the same pizza parlor, some from States, even countries away.

Now as each node starts to make calls, most will be to friends and family members to tell them what is going on, but a few nodes will branch out to numbers we do not know of yet, and some will turn out to be bad guys, because as the web grows, finally it will hit numbers of known bad guys, so we will have further information on other groups.

Now take a program developed by a young female professor to analyse corporations for determining communications links, that are the life blood of the company. She was able to look at how a highly effective node in a corporation worked, and then used that template to find other efficient nodes in a corporation, she was helping companies all over better understand their key communications links, she could even point to the key players, often not the ones the corporations thought were key, and show how they made the corporation grow and evolve.

Now take a Government Agency. Like one or two of the three letter ones, and hire the lady to do the same with terrorist cells and other criminals, like the cartels. In fact hire her so much she only works for them now. Now look at those nodes, think of all the phone and internet traffic out there each a little node point.

Now have analysts tell her in that galaxy of nodes out there which ones we know are terrorist cells. She then makes a template of those communications, the times of the calls and messages is almost as critical as the numbers and IP addresses used, because of throw away phones and bogus internet accounts.

Now you have a template and you run it against the galaxy of node traffic, and every once in a while the template detects a new similar traffic pattern, and we may have a terrorist cell, or a drug organisation or the financing of either.

Now, the three letter agencies can still do this, but it will take a lot longer, and most of the information will be useless by the time they get to them, because cell phones will be thrown away, IP addresses no longer used, but yes they will yield some data, but we have suffered a serious loss going to the private companies holding the info. Now there are some work around methods, and hopefully they are being used, but there is a handcuff on our intel that does not need to be there.

It is a lot like encryption, NSA can break them, but it is the time involved, the USA still has German traffic from WWII that they have not gotten around to decryption, but it is not a high priority. Sort of like two terrorists talking to each other, or others last week about killing 14 people, which was probably just the start of the plan of killing, but to decrypt the traffic now is a much lower priority. Now if we could detect a terrorist cell by the node template, no wait that will take a bit of time now that NSA can not look at all of it real time, but if we could then decryption of the traffic, would take on a whole new priority.

Now here is something that will confound my friends and delight my detractors. I do not think a law making a back door to encryption systems is wise, and also it is pretty useless. It is like bad guys and guns, make new gun laws, the bad guys will still get guns, hell they can make them with printers now days. It is the same with encryption programs, the bad guy, and there are a lot of them, like China for instance, will still make encryption with out back doors. So let NSA muddle through, they have other ways to get behind encryption than just force, they will do fine.



via CTI Consulting http://ift.tt/1YRhhsy

Knife Found In Aaron Hernandez's Prison Cell

The only real information of interest here is that when we talk about screening people into events, I would warn you that most people that have been to Prison can make a weapon after screening at an Airport or Court with simple items they can find as they walk along or visit the restrooms, actually as they walk down the aisle of a Plane after boarding. Watching this happen is really an eye opener for most people, as Protection Professionals it is a wake up call for more awareness. Here is the trailer to the CTI video on Disguised Weapons.https://youtu.be/P3Y919CX3sE
from CTI Consulting http://ift.tt/1PIfCUS
via IFTTT

Smooth Visa Process for Woman in Attack Is Focus of Inquiry

Tashfeen Malik the woman in San Bernardino massacre is linked to Pakistan's most notorious radical cleric and mosque known as center for fundamentalists US officials have handed information to Pakistani authorities linking Tashfeen Malik to country's notorious Red Mosque Now we have her joining a radical mosque, changing from western dress, and her friends say many western customs, 3 years ago she changes, as did her soon to be husband another terrorist killer. So the US found out all this very quickly after she helped kill 14 people, yet nothing was found prior. In fact one formal official says even if we knew all this we would not have stopped her from coming, nor would we stop a refugee, that was a member of a radical mosque. It would be a violation of our USA religious freedom to stop a radical Islamist, since that is their right. So all these refugees could even claim they belonged to these radical mosque's and we would not stop them. The bar is higher, we must prove they materially contributed to terrorist actions, to stop them. I leave that issue to our Government and Citizens, and perhaps their votes, but to Protection Professionals just understand we have a lot of possible terrorist folks and threats, the back ground checks by our Government is not going to clear the folks that maybe coming to your Protectee's event as much as you may have thought.
from CTI Consulting http://ift.tt/1LTCokW
via IFTTT

The following all comes from the latest Inspire Magazine vo. 14 all based on Assassination, If you have been to one of my classes, you should remember the threat questions form, look here how they reverse those questions on how to plan an attack. Every EP professional needs to read this Magazine cover to cover, it covers, picking targets, planning on how to attack, even a special part on workplace attacks. It even goes into the spiritual mental preparedness for the attack. Know the enemy, hear how they are thinking. The following are directly from the Magazine. You should bear in mind that every target has a security loophole, however much intense the security precautions he takes. Where? & When? Where can the target be found? This question can be asked in great details: Where does the target reside? Where does he work? Where does he visit for recreational activities? Where does he shop? Another major question is when? The answer to this question specifically describes the actual time he is present in the previously mentioned locations. And the answer to the 'when' question should be according to the year, month, day, hour and minuet. How? How can we generate a desired, simple plan to attain the best of results and be efficient? The answer to this main question is obtained by answering the following: • What is the weak point of the target that can be exploited to penetrate the target? • When is the target in least protection? • Which is the best technique available to execute the operation? • How has the executor prepared for the operation? Is it a Martydom operation, inghimaasi (Immersing onself deep into enemy lines) or an assault? • When the executor of the operation performs an assault, then he must have a retreat plan. He will have to answer two questions: » What is the technique to be used in order to retreat safely? » How will you cover-up your traces and yourself after an operation?


via CTI Consulting http://ift.tt/1RvKLu2

This is from AQ Inspire Magazine 14, it is part of their propaganda program. Now in this case it is a real mistake to belive you would have a better chance of getting a bomb on than a bottle of water, and I do hope this is the path they choose, I will put my money on the TSA, and even if they miss things, which by the way all screeners everywhere miss things. Including Israel, but if your business plan is to rely on a screener missing something, than you are going to get caught. We need to respond to this kind of propaganda, it is part of how we will beat the terrorists.


via CTI Consulting http://ift.tt/1TrSxn3

Friday, December 4, 2015

STC student assaulted on campus

Our prayers for the victim, and hope for a quick recovery. STC has such a large spread out campus that students and staff need to understand they are really going to have to be in charge of their own safety and security. The next best security response is your fellow students and staff, you all need to keep an eye out for each other. There are not enough Police in the world to be in place everywhere you think they are needed. Another misconception is that CCTV cameras will provide real layer of security. They do not, after the fact they may help in catching an attacker, but except for deterrence they are historical evidence. It is true the bad guys do not want to be noticed or caught on video tape, but hiding from them by what you are wearing or the way you are moving is well within their capabilities. The police can help a lot if everyone follows the basic if you see something say something advice. The police do not have to throw everyone up against the car if you report them, but they can drive by and witness the suspect activity, and even stop and ask for ID from them. In most cases that will end the problem. In many cases if you are in a safe area, with other people around you, you may want to take a picture of the suspect activity. I do all the time, and then after a day or so delete the pictures as needed. Basic awareness courses are available through most of the local Police departments, as often are very basic self-defense courses. If not, taking even a few lessons from a Boxing, or Martial Arts studio can help. A basic course is not going to train you to beat up attackers, but it will teach you and more importantly your body and mind that it can take a punch or being thrown to the ground and still survive. This is about all I expect my students to be able to take away from a few lessons. But it is very important, most of us have never been hit or even shoved, so our bodies and minds often shut down quickly to provide a sort of denial defense. A few lessons maybe a big help in making our bodies and minds able to cope better. I know it is hard to understand but basic Yoga breathing training can help you both be more aware of danger around you, and allow you to handle the stress of an attack, much better. If you go to CTI’s blog there are a number of posts that may help you as well as CTI You Tube videos that may help. www.ctic.co Attacks on or around campuses will continue to happen, but if we all work together we can help put a stop to them, and we can help each other survive them.
from CTI Consulting http://ift.tt/1TqjuaP
via IFTTT

My Way News - Thailand's battered image dealt new blow with aviation scare

This kind of FAA rating could be a death blow to Thailand's tourist industry, and if the EU joins in well could be the end. The danger of any rise in terrorist activity can be the TSA/FAA looking at security procedures for any direct to the US flights. Egypt is has to be concerned about the reviews ongoing about it's aviation security procedures after the Russian plane downing. The airport where the flight departed from does not have direct flights to the US, so only the EU really can deal with that airport, but the major airports in Egypt do have direct flights that can come under TSA security regulations. Actually the airport is not, but the Airlines going to the USA are regulated by TSA, who has both yearly and random inspections ongoing. There are a number of TSA inspectors in the region as well. Finding terrorists is a real concern for all countries, but not losing flights because of terrorism can be a direct economic setback to both trade and tourism.
from CTI Consulting http://ift.tt/1THAKJo
via IFTTT

San Bernardino Gunwoman Pledged Allegiance to ISIS, Officials Say

TrentonScottH : Wife may have radicalized San Bernardino shooter, Facebook posting shows apparent ISIS inspiration for attack: https://t.co/tN9pVoyq75
from CTI Consulting http://ift.tt/1lBYZx1
via IFTTT

My Way News - Egypt: 16 killed in firebomb attack at small nightclub

Here to me is the real scare after listening again this weekend, to the Mumbai attack controllers, calling the plays for the attackers in action, they kept telling the attackers, we are watching the news reports, and it is the fires that are getting the most attention, set more fires, set more fires. Yes keep shooting the people, but set more fires, that is what is scaring everyone and is the most effective for our cause. Lesson to be learned here, we need to work fire response into our initial response plans. In our active shooter drills, two things need to happen, one is Fire needs to be involved to see what can be done to help them become more effective, during these incidents. Two is some Police first responders need to be cross trained in basic fire handling capability. In the US Secret Service we all had to go through basic firefighting schools, learning how to work in smoke and fire environments as well as how to use and carry firefighting equipment like breathing gear and fire hoses, not to mention how to attack different types of fire. We knew, no matter what, we would have to go into fire situations alone to keep the President and the office of the President safe. Many Executive Protection teams are also taught basics like the use of fire extinguishers, which ones work best with which fires. Our first responders also need to be prepared. We went through this with basic medical skills and cross training personnel, so they could more effectively work in active shooter situations, we need to do the same with fire, and to some extent bomb response.
from CTI Consulting http://ift.tt/1HKX6Zd
via IFTTT

Thursday, December 3, 2015

Officials: San Bernardino shooter appears radicalized - CNN.com

TrentonScottH : Police found 12 pipe bombs, 2,000 9mm rounds, 2,500 .223 rifle rounds in the San Bernardino shooters' home: https://t.co/ahZq7L0C9A
from CTI Consulting http://ift.tt/1RoHKvy
via IFTTT

It is a little early, but initial reports claim toy remote car controls to remotely set off bombs (of what type of bomb, not known yet). These have been used in the past, but not considered a good idea, by real bomb makers, since it can often be set off by nearby transmitters, and the real problem is if someone is using a toy like the one you are using for the bomb, the kid walking down the street playing with his toy could set it off. Actually the warnings given, to not use two way radios near the device, came from bombers in the US using these cheap remote controls back in the 60's and 70's, that can be set off very easy. Try using your cell phone near a cheap remote control car, often it will set them off.


via CTI Consulting http://ift.tt/1MYs3Id

Who are Syed Rezwan Farook and Tashfeen Malik? - CNN.com

TrentonScottH : RT @CNN: Who are Syed Rezwan Farook and Tashfeen Malik? The couple at the center of the #SanBernardino shootings https://t.co/IcXJ5eaXq8
from CTI Consulting http://ift.tt/1TzcgSH
via IFTTT

Wednesday, December 2, 2015

New breaches revealed in report that says Secret Service is ‘in crisis’

This is a setup, the Obama Administration wants to change the US Secret Service, this is not the first time an Administration has tried to put their stamp on the USSS. I would agree there are problems, but as in the past, the attempt is that the inside track of people that have come up through the ranks and know the job, should be ended. That outside people, with no knowledge of the USSS should be running the Service, this is a specialized service that requires skills of trained protection people, something you can not get out of working any other Government job. I do hope they can hang on until another President is in place, and the Service can get a fair review, before any actions are taken.
from CTI Consulting http://ift.tt/1OHudMV
via IFTTT

California Shooting: Two Suspects Dead

TrentonScottH : San Bernardino shooting suspect Syed Farook travelled to Saudi Arabia last year: https://t.co/3hymZDv1Pn
from CTI Consulting http://ift.tt/1MWROJ4
via IFTTT

t.co / Twitter

TrentonScottH : RT @NBCNews: JUST IN: Suspect in #SanBernardino shooting ID'd as Syed Farook; Another believed to be Farook's brother: Sources https://t.co/XuFyOhXh2T
from CTI Consulting https://t.co/
via IFTTT

Police have killed man and woman connected to San Bernardino mass shooting

TrentonScottH : A tip led police to the Redlands address, from which the suspects fled in the black SUV and the chase began. https://t.co/pvYDCFFohI
from CTI Consulting http://ift.tt/1jz0I4X
via IFTTT

Site of Mass Shooting in San Bernardino

TrentonScottH : A timeline of the San Bernardino shooting: https://t.co/eMbPOFJ6SH
from CTI Consulting http://ift.tt/1HH3Ozn
via IFTTT

Site of Mass Shooting in San Bernardino

TrentonScottH : RT @SuzanneSpecNYT: Timeline and how the San Bernardino shooting unfolded. https://t.co/VJEpv4PN3O
from CTI Consulting http://ift.tt/1Tx2DE2
via IFTTT

Videos from inside San Bernardino shooting locale show police response

TrentonScottH : RT @joastorga: Videos capture police response and evacuation during San Bernardino mass shooting https://t.co/FuyGAvLysv
from CTI Consulting http://ift.tt/1HH2NaA
via IFTTT

At Least 14 Dead, One Suspect in Custody in California Shooting

TrentonScottH : RT @NBCNews: BREAKING: 1 suspect in custody, 2 shot in #SanBernardino shooting that killed at least 14 https://t.co/jUael0Kzyk https://t.co/GnwmVplfl6
from CTI Consulting http://ift.tt/1XIgesF
via IFTTT

t.co / Twitter

TrentonScottH : RT @NBCNews: BREAKING: 1 suspect in custody, 2 shot in #SanBernardino shooting that killed at least 14 https://t.co/jUael0Kzyk https://t.co/GnwmVplfl6
from CTI Consulting https://t.co/
via IFTTT

t.co / Twitter

TrentonScottH : RT @Reuters: BREAKING: @CNN reports police killed one suspect after San Bernardino shooting, in apparent standoff with others: https://t.co/VS6KPCYXCO
from CTI Consulting https://t.co/
via IFTTT

CBS News on Twitter

TrentonScottH : RT @CBSNews: JUST IN: Bomb squad in the process of attempting to neutralize apparent explosive device in San Bernardino, law enforcement source says.
from CTI Consulting https://twitter.com/CBSNews/status/672143708335292417
via IFTTT

The Straits Times on Twitter

TrentonScottH : RT @STcom: Latest: Fox News reporting 12 dead in mass shooting by one to three men in military garb in San Bernadino, California
from CTI Consulting https://twitter.com/STcom/status/672139521232789505
via IFTTT

CNN Breaking News on Twitter

TrentonScottH : RT @cnnbrk: Active shooter reported in San Bernardino, California. https://t.co/KSe7dJpaOy https://t.co/1kvVX4GwMZ
from CTI Consulting https://twitter.com/cnnbrk/status/672141678657032192
via IFTTT

Just a moment...

It will be interesting to see the way it was set to go off. For effectiveness it is usually something to do with the movement or action of the car. One in Porto Rico was a trembler switch, so was one against a medical tool company in New York, often found when looked for, but they can be effective. The other activation is remote control, such as the Orlando Letelier device set off in Washington DC, which once again was very visible if looked for. When you see muck ups like this one, normally someone tried a timer, or we will see something hit the car hard enough to set the trembler switch off. Biggest defense look for it, a 25 dollar inspection mirror with a flash light works well.
from CTI Consulting http://ift.tt/1XuptBQ
via IFTTT

Tuesday, December 1, 2015

Israeli surveillance balloon guarding Paris climate summit

Hit-tech Electronic Surveillance meets Low tech, balloon platform. The IDF have been using these surveillance balloons in Israel for years. Most major events have one nearby providing an over watch capability. There is normally one covering all of the Gaza Strip, usually run out of an IDF base near the Southern edge of Gaza. Here in the Rio Grande Valley balloons are also in use. The nice thing about them is that different surveillance packages can be installed on them as needed. Of course the one most used is the CCTV video surveillance systems. These can be augmented by thermal imaging systems, even radar based systems. Just for a second, think about the camera systems located on Satellites in space, that back in the 1960's could read the words on a paper a person was reading in Red Square, now think of better cameras on a balloon located much closer to earth. They are a great platform to use, and are mobile to some extent. If you look over Mission Tx just up river, there is normally one balloon sitting there, that can see from north of Rio Grande City to very close to all of McAllen. I do not know the number of balloons on the border, just as we do not know the number of Drone's operating on the border, but they are there. It is always surprising how many people are not aware of the balloons being used along the valley, but it is just as surprising how may people in the Gaza strip can hear, and sometimes see the Drones in use over Gaza. The use of surveillance platforms all over the world is going to grow, it is already a billion dollar business just along the border between the US and Mexico, with a bit more along the border between Canada and the US. The used of ground sensors along both borders is another surveillance platform It uses upgraded technology from the ground sensors used along trails in Vietnam back in the the 60" and 70's, and are often the early warning system for CBP along both borders. The Command and Control systems for these Surveillance platforms is where a lot of new technology is being developed. For instance tying the ground based sensors to the cameras and thermal systems on the balloons is getting better and better, add to this the drone platforms, that can be directed almost automatically at times to areas deemed suspect by any of the sensors, means we are getting a very good picture of the problem. This allows for more rapid ground response to the problem spots. In Paris for the climate summit the ability of the balloon with all its sensors is not quite as good as systems that have been installed for some time. Time allows for the technology to adapt to the ground traffic that is normal, which then allows suspect activity to show up better. Add to this the problems of a low (relatively) survallance balloon dealing with multi story buildings in and around the area. The buildings also get in the way of both the thermal, and radar systems often mounted on the balloons, so as always these are not silver bullets, and they can even have limited capability in areas. The nice thing about the balloons is the survallance packages can be changed as needed.
from CTI Consulting http://ift.tt/1NESCWt
via IFTTT