Thursday, March 31, 2016

Ransomware on the Rise in the Healthcare Sector: Watch Out for Samsam and Maktub Locker

TrentonScottH : RT @HIMSS: 2 new #Ransomware strains reported to be infecting hospital systems >> https://t.co/ukGh5vSzaZ #HITsecurity https://t.co/7dmRseNvl2
from CTI Consulting http://ift.tt/1MFHad1
via IFTTT

Twitter / ?

TrentonScottH : RT @HIMSS: 2 new #Ransomware strains reported to be infecting hospital systems >> https://t.co/ukGh5vSzaZ #HITsecurity https://t.co/7dmRseNvl2
from CTI Consulting https://t.co/7dmRseN
via IFTTT

Cybersecurity Scare Rocks Local Hospitals - The Kojo Nnamdi Show

TrentonScottH : RT @ICITorg: Thanks 4 having us Kojo! #Cybersecurity Scare Rocks Local Hospitals Kojo Nnamdi Show https://t.co/0Zxw7JNckh @kojoshow @wamu885 #ransomware
from CTI Consulting http://ift.tt/1UFMJLm
via IFTTT

Rethinking the 'Spillover' Effect of Mexican Violence

Mexican drug trafficking organizations have affiliates in at least 1,286 cities in the U.S., of which 143 are directly report to cartel leaders. At the top of the list is Sinaloa Cartel, which operates in 75 cities, followed by the Gulf Cartel (37), the Zetas (37), the Juarez Cartel (33), the Beltran Leyva Organization (30), the Familia (27), and the Tijuana Cartel (21). All are committing crimes at an every increasing rate. Most if not all are not attributed to the Mexican Cartels they are local drug gangs fighting for turf. Not true says Mexican Drug Cartel Analysts, they are most often in direct contact with the Leaders of the various Mexican Drug Cartels. Now DEA knows this they have maps on which Cartels hold which turf in the US Cities, as well as what Cartels are moving in on another's turf. In fact most Cartels have their pet Gangs in the US, who they fund and place strategically to muscle turf away from other Cartels. One such gang was paid to move into San Antonio's turf the middle of last year, and then into the small border town of McAllen late last year. The gang was only a vicious LA street gang before one of the Cartels made them an offer they could not refuse.
from CTI Consulting http://ift.tt/1RONLRi
via IFTTT

Mexico's Jalisco Cartel Used Fake Company to Lure Recruits: Official

The fake security company known as Segmex,used one US citizen who was allegedly responsible for recruiting private security guards and body guards, they where sent off to a training camp to learn more weapons usage, then on to being Hit Men for the Cartel. It all came to light after a botched kidnapping by a group of the fake security company, where they got caught. Please be careful of any Body Guard recruitment from Mexico.
from CTI Consulting http://ift.tt/1VcP4vK
via IFTTT

Shepard Smith on Twitter

TrentonScottH : RT @ShepNewsTeam: UPDATE: Single gunman in custody, several wounded in Greyhound station shooting in Richmond, VA https://t.co/dcOOmkgr23
from CTI Consulting https://twitter.com/ShepNewsTeam/status/715624212979802112/photo/1
via IFTTT

Long Before Brussels, ISIS Sent Terror Operatives to Europe

TrentonScottH : Valuable insight into how these groups operate: How ISIS Built the Machinery of Terror Under Europe’s Gaze https://t.co/bCSPTEnVEa
from CTI Consulting http://ift.tt/1PEwKEX
via IFTTT

Tuesday, March 29, 2016

Insider Threats are the hardest ones to stop. But we need to give it some thought, it is one of the biggest loss factors in Business these days. FEMA has a number of courses on the subject, but the basics are fairly easy to master and will provide you a good line of defense.


via CTI Consulting http://ift.tt/1ZJm0gd

Hijacker in suicide vest forces EgyptAir jet to land in Cyprus | Daily Mail Online

The man says he has a suicide belt, it will be interesting to see what it actually was made of. Notice the Wires in his right hand, which could be his version of a detonation switch. Before anyone gets to excited about making in thru security with this device,so far it looks like money belt type carrier with what looks to be a flask of some type in the left pouch. All could be brought on board legally and then put together in the rest room to look like this. We will just have to wait to see
from CTI Consulting http://ift.tt/21QIawD
via IFTTT

Capitol Police investigating two suspicious packages

It is time to dust off those Mail and Package bomb procedures for you Agency or Business. The disruptions to a business or Government entity are a huge cost to all of us. With basic plans and training, the disruptions can be marginalized. CTI's blog has a few policy and training advice you can use, or email CTI for even more information. www.ctic.co is the blog and my email is Rich@cticonsulting.us.
from CTI Consulting http://ift.tt/1StEzlv
via IFTTT

Cartel-related violence once again explodes in Mexican border city of Reynosa | JammedUp News

After a brutal weekend in Reynosa, the Federal Govt is sending in 600 soldiers to try and address the violence. There is a rumor that the Gulf Cartel as moved it command base to Reynosa from Matamoros, about 40 miles away. With the enhanced presence of the troops, it may well be they will fall back to Matamoros again.
from CTI Consulting http://ift.tt/1PDb0JN
via IFTTT

Hostages Flee Hijacked Plane, Suspect Arrested

Great news for all, now let's find out what really happened
from CTI Consulting http://ift.tt/1SjfMhA
via IFTTT

Islamist Terror Growing in Lethality and Geography, IPT Analysis Finds

The numbers are pretty revealing, and show the problem as growing in both death tolls and just plain violence. How to reverse the trend will take all of us, being more aware of our security on a day to day basis.
from CTI Consulting http://ift.tt/22J5DFI
via IFTTT

EgyptAir crisis: Egyptian plane hijacked, taken to Cyprus; most passengers released

Still a lot of this story to be determined yet, but in some cases taped soap blocks, wrapped on the plane with black electrical tape, have been the bomb. Preliminary information says there was an Egyptian Air Marshal on board, but even if true there's not a lot they can do about a bomb. Updates as we get them.
from CTI Consulting http://ift.tt/1pXA4H2
via IFTTT

Monday, March 28, 2016

US Capitol Locked Down Due to Potential Threat

TrentonScottH : Capitol gunman set off metal detector at Visitors Center screening checkpoint, drew his weapon and started shooting https://t.co/jsBxyVlug8
from CTI Consulting http://ift.tt/1ohvgKE
via IFTTT

The Daily Beast on Twitter

TrentonScottH : The Capitol Visitor Center, where today's incident took place, was installed after the '98 shooting. https://t.co/2D0CMNfnn8
from CTI Consulting https://twitter.com/thedailybeast/status/714532777455173632
via IFTTT

· The UTRGV CJ dept. is sponsoring Social Justice & Peace 2016 on April 8th, 1-5PM @ the Library Theater/Edinburg: Featuring award winning documentary Inside Peace and a special class on Dealing with Active Shooters on Campus with counter-terrorist expert Rich Roth !


via CTI Consulting http://ift.tt/1LULy7P

CyberheistNews Vol 6 #13 [ALERT] Last Week Was A Ransomware Horror Show. Here Is The Roundup!

Ransom ware is taking many new forms, and is getting far too expensive for many to deal with.
from CTI Consulting http://ift.tt/1LU4ROy
via IFTTT

Scam Of The Week: Phishing Email Uses Accurate GPS Data To Catch Speeding Drivers

Watch out for this email scam, it looks very real, please pass along, it can be devastating.
from CTI Consulting http://ift.tt/1SqKUOB
via IFTTT

Sunday, March 27, 2016

News from The Associated Press

Good work Atlanta Airport, most people do not know that Uber drivers are not finger printed, as the artical says with out it, it is hard to believe what the guy reports, or even says his name is. The catch 22 is in many cases you can not get finger print checks done. So I am not sure Uber can run prints by themselves.
from CTI Consulting http://ift.tt/1PyFIDI
via IFTTT

Saturday, March 26, 2016

Marsha Gay Reynolds 'may not have known about the 70lbs of cocaine in her bag' | Daily Mail Online

Now think about this, she did not wrap these packages, she just carried them, and from what the authorities are saying, she has done this before. Since she did not know what was in the packages, or at worst thought it was drugs, it just as well as could have been explosives. Now 11 ounces took down the Pan Am 103 Plane, can you imagine what 70 pounds would do. If the bad guy wanted to limit his chances of getting caught with explosives, the package of 30 pounds of Explosive and 40 pounds of drugs could be used.
from CTI Consulting http://ift.tt/22CudrO
via IFTTT

Guard at ‘terror target’ Belgian nuclear site killed, access badge stolen – media — RT News

This is why reporting badges stolen or lost is so important. TSA is often bad mouthed because they have such a low tolerance to people that do not report lost or stolen badges. It can be the keys to the system. Even a bag handler at an airport has a lot of access to critical areas of airports as do Security Guards, maintenance workers and others. How about other targets like malls, have you lost any badges for back areas of the mall, Court Houses, your business. Every time CTI has been called in to audit a businesses card access system, at minimum over 5% can not be accounted for. When we check to see if the card has been used, about 2% of the time we see times they have been used to get into the building, usually after hours and involved in some loss to the business. Hospitals have been targeted a lot, because of the ability to get into areas where drugs or personal property can be stolen. Want to stop bad guys, do an audit on the expensive access control system you installed, after the audit, see if any of the cards that are not supposed to be active, have been used. One of the biggest issues CTI has seen was when an access control system fails or is brought down for Maintenance, back up data has been used to bring the system back up. Any badge deletions down recently usually have not made it to the back up data. In one case for a small medical building, 20 badges not recovered by taken out of the system when people where fired or down sized, came back into the system after a crash of the access control system. Two former employee's figured out their badges where working again, and started stealing everything from drugs to computers and printers from the facility. It will take a few hours to conduct the audit, and CTI would strongly suggest you use a third party, since the access control company you are using will probably not report negative events on themselves, there is too much liability involved for them.
from CTI Consulting http://ift.tt/1Rtv0ml
via IFTTT

Friday, March 25, 2016

How Islamic Jihad Hacked Israel’s Drones - The Daily Beast

This has been going on for years, even the Mexican Drug Cartels are hacking or more precisely watching the video feeds from our drones. Here is one to think about, so is the American Govt. watching the video feeds of the few but growing drones the Cartels are using. I am not sure if the Palestinian had just watched the video feed, that he could have been arrested. But they again just having the electronic equipment to do it is illegal in the Gaza Strip. Although I am not sure this guy was in the strip. Once you know the video feed frequency, capturing the video is not all that hard. If you buy a rf video receiver from a hobby shop and just move around with it, I am pretty sure you would come up with someone's video feed fairly soon. If you have say an Icom receiver, price about a thousand bucks and run the receiver into a video monitor, you should be able to get a lot of video to look at. The bigger problem now days is the IP video cameras we all seem to be buying, there is one web site on line that you can go to and view over 9 thousand video cameras all over the world, if you purchase a pass to the web site they will allow you to down load the software to gain access to even more video feeds on the Internet. Most are from people that have installed cameras with out any protection, like a simple password on them. It maybe up to millions the site has available at this point, you get to pick the type of camera you want to see, factories, homes, doctors offices, federal agencies. Then narrow the search down to specific areas or towns in the world. Back to the Israel story, every Government has the capability to do this type of video capture, when Qaddafi was on the run in Libya they showed some of his spying capability, it really was pretty awesome, but one piece caught my attention and that was an Icom receiver hooked up to a monitor, hmm. But the Mexican Cartels have been doing it for years as well. Their tech lived in McAllen Texas for years and ran a business selling communications equipment, he had over 500 cameras they had installed and access to another 1000 or so that the Mexican Police and even some from the USA Law Enforcement, operating on both sides of the border. Most of his stuff was IP based and readily available over the internet. He aso ran their data and radio communications HUB as well. Most of his work was for the Zeta's but was farmed out to other Cartels as needed. His office or business still exists in McAllen, he is in the witness protection program it is rumored.
from CTI Consulting http://ift.tt/1UPJhMD
via IFTTT

EXCLUSIVE – Top Jihadist Claims Islamic State Has Agents Working in Western Airports

I would have to think that this is true, we have had a number of instances of Islamic Jihadist's working even making plans at our airports, subway systems, and other possible targets. One individual actually worked to get an airport badge that allowed him access to the airport tarmac and had a vehicle loaded with what he thought were explosives going to set it off under a jet bridge at a medium sized airport in the Midwest, luckily the FBI was the supplier of the explosive materials, and had kept him under survallance since he had broached the plan to a known Jihadist on line. We all need to keep an eye on the folks around us, in this case even his son was concerned about his Islamic conversion and his new found views on Jihad. This threat is not going to go away overnight, and bad guys will find other reasons to kill people even after ISIS is gone, if it ever is really gone. Security Awareness is out best defense.
from CTI Consulting http://ift.tt/1pMczAs
via IFTTT

Two suspects named in Mission shooting; victim identified - The Monitor: Local News

The guy in this picture is crossing into Mexico after shooting to death a person in Mission Tx. He had an accomplice in another vehicle who has been charged on weapons violations, but if he makes bail, he will be the next picture of a person going into Mexico. Now the shooting happen a few miles from my Home in Tx and the crossing this guy is using in the picture is less than 4 miles from my home. Since they shot, it is thought another drug dealer, it is no big deal here. But if you had driven up on the shooting and witnessed it, then they shot you, then it may actually become another cross border violence problem, that the local City Fathers tell people just does not happen. You talk about ISIS, here is a Drug Cartel carrying out a hit in the USA, and nothing is done about it. Until they formerly charge the person going back over the border, under this Administrations Policy he will not even be issued a notice to appear by our Border Patrol. This is all just nuts.
from CTI Consulting http://ift.tt/1REbPJW
via IFTTT

Lip-reading technology 'could capture what people on CCTV say' claim researchers - Mirror Online

Just when you think you have seen and heard everything a CCTV camera can do, now lip reading. I am sure there are some rather large restriction on it ability right now, but it should get better over time. This is just one more design point CTI will have to add to our clients design elements. You gotta love technology it gets better each day. I would not expect this to be ready for wide spread prime time use, but we will keep and eye on it. The legal issues are going to be mind blowing, it will defiantly take CCTV down the same route as audio privacy restrictions.
from CTI Consulting http://ift.tt/1VMYrTC
via IFTTT

IS-914: Surveillance Awareness: What You Can Do

So another lunch hour lost, but another FEMA course taken, this one has really been upgraded since the last time I took it. Once again preparing for a class I am teaching. Surveillance Awareness is critical to our safety and security. With what is taught in this short class, you will be able to detect stalkers, terrorists, drug cartels, even purse snatchers and other violet criminals. You should be able to detect robbers hanging around your home, office, or vehicle checking out what they can steal and when. Everyone in the USA should take this course, it will make us all safer, and our friends and loved ones as well.
via CTI Consulting http://ift.tt/1UpYs0K

Brussels attacks suicide bombers 'targeted nuclear plants' and were plotting to build 'radioactive dirty bomb' - Mirror Online

Ok, what have we learned here, it is important: Teams of Security Specialists need to conduct a risk assessment of every Nuclear Site for Pre Attack surveillance, to include the remote video camera used against the Director of the Brussels plant. Dirty bombs are but one of the plans these attackers could have had for the plant. Sabotage to make it malfunction is another. The key here is that the surveillance was not detected. We really need to get better at this, Training the Security Staff at the plants is a start, training the neighbors, the mailman, the delivery guys, the taxi and but drivers in the area is where we want to be with this. FEMA has a quick 1 hour course every security guard, body guard, and American should take. http://ift.tt/1ZAAm2h The purpose of this course is to make critical infrastructure employees and service providers aware of actions they can take to detect and report suspicious activities associated with adversarial surveillance.
from CTI Consulting http://ift.tt/1UfDtgD
via IFTTT

Thursday, March 24, 2016

Is It Still Safe to Fly? - TheStreet

I was asked by this reporter just that question yesterday, and the answer is still yes it is. I would, but I always do, get past Security Screening as quickly as possible, but that is always good advice. Take advantage of security screening anywhere you are. It may not catch everything every time, but your odds go way up when you are past screening.
from CTI Consulting http://ift.tt/1VKxsbn
via IFTTT

FEMA Courses You Can Take Online

If you have 45 min or less today, you can go online and take this very good FEMA course, take the test and wait (if you pass) a few minutes for them to email you the certificate. FEMA has over 100 courses that you can take to make you and yours safer and more secure. You can talk about it, or you can do something about it. 

Some courses take up to a few hours, most less than two, and you can gain great knowledge in Active Shooter situations, Work Place Violence situations, even how to detect Surveillance by Terrorists and other bad guys. Our you can complain about how no one is doing anything about these Terrorists. Plus if you are looking or a job, or to advance in the job you have, you will have certified courses under your belt that you can add to your resume or even your Linked In page. Or, you can sit back and complain about how your life has stalled. It is all up to you!
Rich Roth via CTI Consulting http://ift.tt/1VKpRtc

In this 2006 bombing attempt in Texas, the bomb makers went to local home improvement stores and beauty supply stores to get the materials for their bomb. Beauty Supply stores have a lot of the main ingredients for lots of different bombs. Thefts from these stores at night, have been the way to get the ingredients cheaply. In some cases the stores did not even report the thefts because they did not know the importance of the supplies stolen,


via CTI Consulting http://ift.tt/1LK9I4K

Explosives will be key clue in Brussels investigation - CNN.com

Looking for the bomb makers, it is possible with just a little training to find them, before an attack. As in all security awareness we look for anomalies. ISIS bomber Zazi was just such an anomaly, as he was a dark-haired, bearded Afghan-American man in his 20s who bought six bottles of Clairoxide hair bleach during one shopping trip at a store in a Denver suburb. Zazi returned to the store a month later and purchased another dozen bottles of Ms. Kay Liquid, which is also a peroxide-based hair bleach. with which he was making TATP to use on New York subways. He was caught becaues he could not remember the exact amounts of chemicals needed for the explosive, and emailed a known ISIS terrorist for help. Interesting is that the bomb Makers hair in Brussels apparently was a few shades lighter since he was dealing with Hydrogen Peroxide, often the main ingredients of hair dye products. So add that to your, something that looks suspect, list. Hair coloring is changing lighter, bald guys like me would be hard to tell. The fumes from making the TATP can be dangerous as well as make you mildly to very sick at times. Another point to your , something that looks suspect, list, they take frequent brakes to take in fresh air. FEMA has an online course for wholesale and retail works on what to look for in the buying practices of individuals at their stores. IS-912: Retail Security Awareness: Understanding the Hidden Hazards, it is highly recommended that store owners take this course, and have as many folks they employ take it as well. The Terrorists are hidden among us and this is how we find them out before and event happens.
from CTI Consulting http://ift.tt/1MzKyRi
via IFTTT

Wednesday, March 23, 2016

Victimization, ways not to be one CPTED is one of the them

I was just in an interview for the Brussels Attack and as always I am asked what can we do to protect ourselves. Here is a great article by Texas DPS, with some ideas of what we should be looking out for and report when we suspect something. May I say, I would always error on the side of thinking something is suspicious. if you are wrong no harm no foul, but if you are right, you may stop the next attack before it really gets going.
from CTI Consulting http://ift.tt/1pIGtpn
via IFTTT

Attacks On Transportation Targets Like Those In Brussels Have Become Rarer

TrentonScottH : Terrorism against transportation targets make up a small percentage of attacks, but disproportionately more deadly | https://t.co/v6D9FDagXd
from CTI Consulting http://ift.tt/1MCqBt2
via IFTTT

Brussels attacks suspected ISIS bomb-maker Najim Laachraoui arrested, suicide bombers ID'd as...

TrentonScottH : #BrusselsAttacks suspected ISIS bomb-maker Najim Laachraoui arrested, suicide bombers ID'd as Bakraoui brothers https://t.co/N3EVMGtlnL
from CTI Consulting http://ift.tt/1Sh2ZhU
Trenton Higareda via IFTTT

Brussel and Paris Attacks: Muslim Master Bombmaker who POSED AS MIGRANT is Arrested | Pamela Geller

Good catch, if he's the bomb maker for both the Paris and Brussels attacks, this could be a real blow to terrorist cells through out Europe. It can take a bit of time to get another bomb maker up to speed.
from CTI Consulting http://ift.tt/1ZrMjap
Rich Roth via IFTTT

Tuesday, March 22, 2016

DC Airline Passengers Advised to Be Alert

TrentonScottH : Excerpt from my NBC Washington interview today on US airport security measures | https://t.co/RYahplacuM #BrusselsAttacks #AviationSecurity
from CTI Consulting http://ift.tt/1Ujyj3C
Trenton Higareda via IFTTT

CyberheistNews Vol 6 #12 Scam Of The Week: TurboTax Phishing Attack

This is one to watch for during the tax season
from CTI Consulting http://ift.tt/22tQoAl
Rich Roth via IFTTT

Why still terror risk, after all that security money spent?

It is a matter of diminishing returns. As we move to protect softer and softer targets, there are just not enough security staff to go around - and not enough money even if there were. We need to do two things: one, everyone needs to take part of the responsibility to find the bad guys; and two, we need to attack the terrorists at their source. President Bush made the decision to declare war on the terrorists, and any country that funded or hid them. This took away the support base from most of the terrorist groups bent on attacking the USA, and to some extent the world. When attacking the source and support to terrorists, you bring the war to them and they have to play defense, which is much harder than just choosing soft targets as they find them. We cannot protect everything from a defensive position, there are just too many targets. It takes intelligence and force to beat back this threat, and the USA must take a more proactive mindset - as politically incorrect as that may seem - to bring the terrorists to a stop.
from CTI Consulting http://ift.tt/1RhF81v
Rich Roth via IFTTT

Terrorism and Awareness.

Excellent analysis by CTI's Chicago airports project manager.
from CTI Consulting http://ift.tt/1Rxhlrm
Trenton Higareda via IFTTT

TATP is being reported as the Explosive used in the Brussels attacks

Just a little background, TATP has been around before even C-3, C-4, or Semtex (the main military plasticized explosives) over the years. It was not considered safe to use since it can detonate just from rough handling, like being dropped. So for a soldier carrying this type of explosive, just being shot may be enough shock to detonate the explosive charge.

TATP is fairly easy to make with obtainable chemical materials, but once again it can easily detonate during the mixing process. Another problem is the mixture is time sensitive, it normally starts to lose effectiveness over even a few days (I have fired off C-3 explosive made before WWII without a problem). Do not expect TATP to work even after a week in most cases. So if you look at the timeline of the Brussels attacks, the plan was probably developed over the last few weeks or months. When they decided it was time after the capture of the last Paris bomber, the delay was probably having the TATP made up.

Rich Roth via CTI Consulting http://ift.tt/1q0otqq

Rich Roth via CTI Consulting http://ift.tt/1VAAw9I

Photo of suspected Brussels Airport Bombers


Rich Roth via CTI Consulting http://ift.tt/1pxiSXT

On preventing another Brussels-style attack in the US

CTI Consulting Vice President Trent Higareda (@TrentonScottH on Twitter) will appear on NBC4 in the DC area, talking about the Brussels attacks and the airport security response in the US.

It's important to note that the adversaries are moving their targets away from the secure areas to the public areas of the airport. It is less about gaining access to a plane anymore than just causing damage, mayhem, and casualties wherever people may congregate. The selection of the American Airlines counter was no coincidence.

But it would be a mistake to try and push the limits and capabilities of the security and response personnel out too far away from the airport - say to the parking lot or beyond. Instead we should concentrate on what works for preventing and mitigating these attacks where we have the greatest capability to act and respond. Intelligence services had already warned of an impending attack in Belgium, that should have warranted a step-up in security. Second, the use of surveillance and behavioral detection is key to risk-based security - singling out those who are either in a surveillance or planning mode themselves, or those acting in any way unusual. Security awareness teaches us not to ignore anything suspicious, out of place, or that gives us unease. These skills should not be cultivated by security and law enforcement alone - they are ones we all need to develop and use.

Lastly, we also need to be aware that terrorists will use whatever means they have at their disposal. In Europe, the terrorists rely on bomb-making expertise and materials gained in Iraq and Syria - things that are much harder to come by in the US, where guns and rifles are more easily obtained (homemade pressure cooker or pipe bombs notwithstanding). The US has also been more successful in infiltrating and monitoring terror cell networks here than the Europeans have, owing greatly to the fact that we are a much more integrated society.

In the meantime, we should expect a period of heightened security around transportation and other critical facilities, but we should continue to be vigilant even after the crisis is no longer fresh in our minds. - TH

Behavioral Detection

When trying to detect terrorists or any bad guys, we would be very interested in the interaction between these people. The gloves on the left hands of these two suspects could be a clear clue to a possible problem, as they apparently hide the string actuator or other detonation device. But if you're looking for people setting up to conduct an attack, it will be their interactions and surveillance methods that can make them stand out. With a little training, these precursors to an attack can be readily detected. Call or email CTI Consulting to set up training for your staff.



Rich Roth via CTI Consulting http://ift.tt/25jjxNA

Brussels Attacks Tear at the Fabric of the European Union | Stratfor

Stratfor has weighed in on the Brussels bombing. It has been years since I have been to Brussels, but many really do not understand the importance of this NATO defense rally point for all of the EU.
from CTI Consulting http://ift.tt/1XK9rQ7
Rich Roth via IFTTT

New York, DC Ramp Up Security in Wake of Deadly Brussels Attacks - ABC News

It is important to remember that it takes time to set up these attacks, and this attack in Brussels had been in the last planning stages long before this last Paris terrorist was captured. To set this up it took weeks if not months. The heads up given by this attack hopefully will allow our security to detect any cells that want make similar attacks. But every one of us can be keeping an eye out for something suspicious or not normal. If you see something, say something. The greatest security strength is our free people looking out for each other. Reporting something does not mean that person is going to be arrested, just looked at to see if there is a problem there.

Bombs have no identity, they kill or injure all around them, so it could be you are saving a loved one, or a friend, perhaps even yourself. It is up to us.

from CTI Consulting http://ift.tt/1pwX0Mi
Rich Roth via IFTTT

What Happens During an Explosion

Remember when an explosion happens, the potential for damage or injury from fragmentation is significant. In the Brussels attacks there are reports that nails had been added to the bombs. The other threat is coming from the ceiling, mainly signs and even the ceiling tiles and frame can become a secondary fragmentation danger. As you can see from the video and pictures available so far, the bombs did not do an immense amount of structural damage. Walls are still standing, even kiosks are standing in the general area around the bomb. The subway car had a lot more damage, but it was a smaller and more contained area where the bomb went off.

The fact is that even with a shortened setup time frame, it will probably take other terrorist cells working in the USA a few days to a few weeks to be able to mount an attack. This is when effective security is needed the most - and in fact you can be the critical piece of our security. The terrorists are always moving to target points and conducting surveillance prior to any attack, and this pre-attack mode is when they are easiest to detect.


Rich Roth via CTI Consulting http://ift.tt/1pZMCx6

Maelbeek Metro photo


Rich Roth via CTI Consulting http://ift.tt/1pZJOQF

Maelbeek Metro photo


Rich Roth via CTI Consulting http://ift.tt/1XJLjNA

Brussels Airport Graphic

The ticket counters in this area of the Brussels Airport are set up in such a way that the terrorists could approach them with out having to queue up for them. Terrorists tend to copy successful attacks, so for at least the next few days, if you do not have to check in bags, using electronic tickets on your phone or printing your boarding passes at home may be a good idea. Remember: the area past security at an airport is far safer than the area before it. Being able to go directly to the security screening area will allow you to get to that safer area more quickly.


Rich Roth via CTI Consulting http://ift.tt/1ZnXalV

Brussels Airport explosions leave many dead and second ‘attack’ hits Metro station | Daily Mail Online

The American Airlines ticket counter was apparently the first target of the terrorists. This is one of the soft spots of any airport. The last drill CTI conducted for a major airport involved the ticket counters area.

As the results of the drill showed, the chaos and lack of response capabilities to these attacks are very evident. We have many protocols that can be used to ramp up security at and beyond the screening checkpoint, but far fewer prior to that.

Many airports and TSA have people trained to recognize terrorists and other bad guys setting up to conduct these types of events in the planning stage, and hopefully will recognize pre-attack surveillance prior to an event here in the USA.

from CTI Consulting http://ift.tt/1Mk9SzZ
Rich Roth via IFTTT

Things to Watch in Belgium

Alert levels around the world have risen, as other terrorist cells want to get on the board with their own attacks. Looking at the tweets and other social media outlets, calls are going out for others to engage like these Belgium groups have.
from CTI Consulting http://ift.tt/1LDzPuh
Rich Roth via IFTTT

Saturday, March 19, 2016

Interpol Advises More Border Vigilance After Abdeslam Arrest - Bloomberg Business

Vigilance should be the operative word for the US as well, but instead we are opening our borders more. There is danger out there and we need to be aware of it, and taking more precautions.
from CTI Consulting http://ift.tt/1VndDXe
Rich Roth via IFTTT

Wednesday, March 16, 2016

Brothers accused of callously filming fatal shootout with Pr. Geo.’s police due in court

What a tragedy, all three brothers deserve and will get jail time. An officer is dead at the hands of another officer, which will stay with him forever as well. So many people in the brothers' lives could have noticed something and stopped it - we all need to pay more attention to those around us, and take action as needed.
from CTI Consulting http://ift.tt/1Mngd8x
Rich Roth via IFTTT

Tuesday, March 15, 2016

Metrorail Will Shut Down All Day Wednesday for Emergency Investigation of Equipment | NBC4 Washington

Maintenance or faulty equipment suspected, not terrorism, but nothing is being ruled out. Three fires from some source on Monday, and a death last year from a similar problem, have workers wondering.
from CTI Consulting http://ift.tt/1U5hb1g
Rich Roth via IFTTT

Cartel Firefight near Texas Border Kills 10

This just after McAllen (the largest US city near this incident) made a big point of meeting with the Mexican officials and jointly stating how crime was down on both sides of the border, and that it was safer than ever to do business in Reynosa. The gunfire could be heard in Texas, and although no one reported bullets striking this side, at times it was well with in range of Texas homes and people. An official Mexican report of 10 killed would normally indicate the death toll was at least double, and they were not able to hide the 3-hour gun battle ranging all over the city. Cartel pulled blocking actions, using cars, often set on fire to impede police pursuit. Tires where also set on fire, sometime to block roads, other times to show other Cartel members rally points and escape routes. Having worked in the Gaza strip, I can say it rarely gets this bad over there. There really needs to be some action taken by the USA to make our citizens safer.
from CTI Consulting http://ift.tt/21qfxWK
Rich Roth via IFTTT

Monday, March 14, 2016

Sniper kills ISIS executioner during beheading class

Sometimes you should not smile, but you just gotta :)
from CTI Consulting http://ift.tt/1pGEvFE
Rich Roth via IFTTT

EEOC raises the stakes with retaliation rule update | Business Insurance

This will not be a plus for employers, but you need to understand how this can affect your company.
from CTI Consulting http://ift.tt/1QXLVLp
Rich Roth via IFTTT

In Ankara Bombing, Suspicion to Fall on Kurdish Militants

This is the reason arming Kurds can be dicey, their war with Turkey is real and bloody
from CTI Consulting http://ift.tt/1RgKXPO
via IFTTT

Sunday, March 13, 2016

Bomb-sniffing dog discovers 2 Hellfire missiles bound for Portland | OregonLive.com

This story is still unfolding, but if Portland is the landing point the user could be terrorists on both ends of the spectrum. From Skin head to Radical Islam. It was a good find, but the fear is that to many sales like this are being made all over the world. Between the breakup of the Soviet Union to the breakups in the Middle East to many weapons are just laying around till found by profiteers and put on the black market This device would take some technical no how to be used effectively, but there are enough people with the technical expertise, to make it at least work in someway.
from CTI Consulting http://ift.tt/1V4uMEY
via IFTTT

Police Officer Shot In Prince George's County

TrentonScottH : RT @cbsbaltimore: #UPDATE: 1 suspect in custody in Prince George's police shooting: https://t.co/O1yGqd2DHh
from CTI Consulting http://ift.tt/1pov51D
via IFTTT

DHS Bulletin Focuses on Terror Threat to DC Hotels

At the risk of crying Wolf, this is a threat that needs to be taken seriously, and although it is showing DC as the target, remember soft targets are a real threat as well. Hitting a hotel or convention center in middle to small town America would be terrifying to other small towns. If only in your mind, run a risk analysis of Hotels and Convention centers in your. Then figure out how the bad guys would conduct pre attack survalance. Keep an eye on those points as you conduct your normal travel. You may be the one to stop the next attack.
from CTI Consulting http://ift.tt/1plerA0
via IFTTT

Thursday, March 10, 2016

FBI bugged binders to spy on Russians in New York - Yahoo News

This is not quite old school because of the type of espionage devices used in the binders. But the method of bugging the binders or things like them is an old School method. Keeping track of what the Russians are spying on is critical, and actually gives us a good idea of what they are up to. ESI is giving a course on basic Espionage next month, learning what the opposition both other Governments as well as your clients competitors can and are trying to do is critical.
from CTI Consulting http://ift.tt/1UjCcDz
via IFTTT

via CTI Consulting http://ift.tt/1MaGsyU

via CTI Consulting http://ift.tt/1TQHkRq

First on CNN: U.S. plans to publicly blame Iran for dam cyber breach - CNNPolitics.com

This happen a few years ago, but it is interesting that just now our Government is speaking out. The operational parts of the dam, have apparently done what is recommended and kept their systems off the network hooked up the the internet. Many Agencies and Companies are trying to separate their security networks from the administrative networks that are connected to the internet. This is one of the first tests CTI does when analyzing security networks, or firms or even Government agencies. Attacks can still be successful, as rumored Israel USA attack on the Iran Nuclear bomb program. That attack hit the computers at the Iran sites that where connected to the internet and then infected flash drives, so that when data from the internet connected computers was hand carried over to the secure network, the flash drives contaminated the security Nuclear network. That code is now out there in the wild, and can be used against us in the USA as well.
from CTI Consulting http://ift.tt/24ThDmu
via IFTTT

American Mother Jailed in Mexico After Leading a Militia Against Cartels May Be Freed | VICE News

It is unfortunate, but this is the only way Mexico can be taken back from the cartels, since the Government of Mexico will not. A lot of good people will lose their lives to save Mexico, but in the end it will be how Mexico saves itself. Our hat's are off to this brave lady. Each City that is taken back, and left alone by the Federal forces, who usually come in and take the weapons from the Citizens, the City will be the shining light for other cities to follow. Once a State is taken back, that State will be the shining light for the other States of Mexico. It can happen, the Federal forces need to stay out of it, let these Citizens take down the cartels, but more importantly take back their cities. The Government can try and help by cracking down on the cartels in areas that the Citizens are not standing up for themselves, but leave these Citizens of Mexico alone.
from CTI Consulting http://ift.tt/1Ty7UON
via IFTTT

Alleged Cell Phone Jammer Raised Eyebrows Months Before Arrest « CBS Chicago

You can buy them in Mexico, but please be warned that they are illegal in the US. You can go to jail and lose a lot of money. Most of the time people do not know what has happened. There use by some Government agencies has happen and will happen. If a bomb could be set off by a cell phone jammers have been used in limited cases. They have also been used to drop people off cell towers , so critical government agencies can communicate. It happens during major events like bombings and plane crashes, that so many people use their cell phones that it jams up cell activity, using a jammer for a second drops peoples calls so Police and other emergency response can get on line. So if telling family that you are ok, do it fast, it is possible you will be dropped.
from CTI Consulting http://ift.tt/1TuDahr
via IFTTT

Wednesday, March 9, 2016

I dared expert hackers to destroy my life. Here's what happened next.

TrentonScottH : A compelling story. Social engineering and phishing are probably the two most effective ways to steal personal data. https://t.co/3ICJdnS9W5
from CTI Consulting http://ift.tt/21r62IC
via IFTTT

Thursday, March 3, 2016

FBI — Child ID App

This is a great app for all families to have on their phone. When a child or family member is missing or injured seconds can make all the difference. Have it all available at the touch of your finger.
from CTI Consulting http://ift.tt/1TtbrOz
via IFTTT

Wednesday, March 2, 2016

Pirates Hack Shipping Company To Find Their Targets

High Tech pirates know what to target and when, a lesson all of us in Security need to learn. We need to be aware of all the risks, when developing our security response.
from CTI Consulting http://ift.tt/1Uyqy8i
via IFTTT