TrentonScottH : RT @HIMSS: 2 new #Ransomware strains reported to be infecting hospital systems >> https://t.co/ukGh5vSzaZ #HITsecurity https://t.co/7dmRseNvl2
from CTI Consulting http://ift.tt/1MFHad1
via IFTTT
Thursday, March 31, 2016
Twitter / ?
TrentonScottH : RT @HIMSS: 2 new #Ransomware strains reported to be infecting hospital systems >> https://t.co/ukGh5vSzaZ #HITsecurity https://t.co/7dmRseNvl2
from CTI Consulting https://t.co/7dmRseN
via IFTTT
from CTI Consulting https://t.co/7dmRseN
via IFTTT
Cybersecurity Scare Rocks Local Hospitals - The Kojo Nnamdi Show
TrentonScottH : RT @ICITorg: Thanks 4 having us Kojo! #Cybersecurity Scare Rocks Local Hospitals Kojo Nnamdi Show https://t.co/0Zxw7JNckh @kojoshow @wamu885 #ransomware
from CTI Consulting http://ift.tt/1UFMJLm
via IFTTT
from CTI Consulting http://ift.tt/1UFMJLm
via IFTTT
Rethinking the 'Spillover' Effect of Mexican Violence
Mexican drug trafficking organizations have affiliates in at least 1,286 cities in the U.S., of which 143 are directly report to cartel leaders. At the top of the list is Sinaloa Cartel, which operates in 75 cities, followed by the Gulf Cartel (37), the Zetas (37), the Juarez Cartel (33), the Beltran Leyva Organization (30), the Familia (27), and the Tijuana Cartel (21). All are committing crimes at an every increasing rate. Most if not all are not attributed to the Mexican Cartels they are local drug gangs fighting for turf. Not true says Mexican Drug Cartel Analysts, they are most often in direct contact with the Leaders of the various Mexican Drug Cartels. Now DEA knows this they have maps on which Cartels hold which turf in the US Cities, as well as what Cartels are moving in on another's turf. In fact most Cartels have their pet Gangs in the US, who they fund and place strategically to muscle turf away from other Cartels. One such gang was paid to move into San Antonio's turf the middle of last year, and then into the small border town of McAllen late last year. The gang was only a vicious LA street gang before one of the Cartels made them an offer they could not refuse.
from CTI Consulting http://ift.tt/1RONLRi
via IFTTT
from CTI Consulting http://ift.tt/1RONLRi
via IFTTT
Mexico's Jalisco Cartel Used Fake Company to Lure Recruits: Official
The fake security company known as Segmex,used one US citizen who was allegedly responsible for recruiting private security guards and body guards, they where sent off to a training camp to learn more weapons usage, then on to being Hit Men for the Cartel. It all came to light after a botched kidnapping by a group of the fake security company, where they got caught. Please be careful of any Body Guard recruitment from Mexico.
from CTI Consulting http://ift.tt/1VcP4vK
via IFTTT
from CTI Consulting http://ift.tt/1VcP4vK
via IFTTT
Shepard Smith on Twitter
TrentonScottH : RT @ShepNewsTeam: UPDATE: Single gunman in custody, several wounded in Greyhound station shooting in Richmond, VA https://t.co/dcOOmkgr23
from CTI Consulting https://twitter.com/ShepNewsTeam/status/715624212979802112/photo/1
via IFTTT
from CTI Consulting https://twitter.com/ShepNewsTeam/status/715624212979802112/photo/1
via IFTTT
Long Before Brussels, ISIS Sent Terror Operatives to Europe
TrentonScottH : Valuable insight into how these groups operate: How ISIS Built the Machinery of Terror Under Europe’s Gaze https://t.co/bCSPTEnVEa
from CTI Consulting http://ift.tt/1PEwKEX
via IFTTT
from CTI Consulting http://ift.tt/1PEwKEX
via IFTTT
Tuesday, March 29, 2016
Insider Threats are the hardest ones to stop. But we need to give it some thought, it is one of the biggest loss factors in Business these days. FEMA has a number of courses on the subject, but the basics are fairly easy to master and will provide you a good line of defense.

via CTI Consulting http://ift.tt/1ZJm0gd
Hijacker in suicide vest forces EgyptAir jet to land in Cyprus | Daily Mail Online
The man says he has a suicide belt, it will be interesting to see what it actually was made of. Notice the Wires in his right hand, which could be his version of a detonation switch. Before anyone gets to excited about making in thru security with this device,so far it looks like money belt type carrier with what looks to be a flask of some type in the left pouch. All could be brought on board legally and then put together in the rest room to look like this. We will just have to wait to see
from CTI Consulting http://ift.tt/21QIawD
via IFTTT
from CTI Consulting http://ift.tt/21QIawD
via IFTTT
Capitol Police investigating two suspicious packages
It is time to dust off those Mail and Package bomb procedures for you Agency or Business. The disruptions to a business or Government entity are a huge cost to all of us. With basic plans and training, the disruptions can be marginalized. CTI's blog has a few policy and training advice you can use, or email CTI for even more information. www.ctic.co is the blog and my email is Rich@cticonsulting.us.
from CTI Consulting http://ift.tt/1StEzlv
via IFTTT
from CTI Consulting http://ift.tt/1StEzlv
via IFTTT
Cartel-related violence once again explodes in Mexican border city of Reynosa | JammedUp News
After a brutal weekend in Reynosa, the Federal Govt is sending in 600 soldiers to try and address the violence. There is a rumor that the Gulf Cartel as moved it command base to Reynosa from Matamoros, about 40 miles away. With the enhanced presence of the troops, it may well be they will fall back to Matamoros again.
from CTI Consulting http://ift.tt/1PDb0JN
via IFTTT
from CTI Consulting http://ift.tt/1PDb0JN
via IFTTT
Hostages Flee Hijacked Plane, Suspect Arrested
Great news for all, now let's find out what really happened
from CTI Consulting http://ift.tt/1SjfMhA
via IFTTT
from CTI Consulting http://ift.tt/1SjfMhA
via IFTTT
Islamist Terror Growing in Lethality and Geography, IPT Analysis Finds
The numbers are pretty revealing, and show the problem as growing in both death tolls and just plain violence. How to reverse the trend will take all of us, being more aware of our security on a day to day basis.
from CTI Consulting http://ift.tt/22J5DFI
via IFTTT
from CTI Consulting http://ift.tt/22J5DFI
via IFTTT
EgyptAir crisis: Egyptian plane hijacked, taken to Cyprus; most passengers released
Still a lot of this story to be determined yet, but in some cases taped soap blocks, wrapped on the plane with black electrical tape, have been the bomb. Preliminary information says there was an Egyptian Air Marshal on board, but even if true there's not a lot they can do about a bomb. Updates as we get them.
from CTI Consulting http://ift.tt/1pXA4H2
via IFTTT
from CTI Consulting http://ift.tt/1pXA4H2
via IFTTT
Monday, March 28, 2016
US Capitol Locked Down Due to Potential Threat
TrentonScottH : Capitol gunman set off metal detector at Visitors Center screening checkpoint, drew his weapon and started shooting https://t.co/jsBxyVlug8
from CTI Consulting http://ift.tt/1ohvgKE
via IFTTT
from CTI Consulting http://ift.tt/1ohvgKE
via IFTTT
The Daily Beast on Twitter
TrentonScottH : The Capitol Visitor Center, where today's incident took place, was installed after the '98 shooting. https://t.co/2D0CMNfnn8
from CTI Consulting https://twitter.com/thedailybeast/status/714532777455173632
via IFTTT
from CTI Consulting https://twitter.com/thedailybeast/status/714532777455173632
via IFTTT
· The UTRGV CJ dept. is sponsoring Social Justice & Peace 2016 on April 8th, 1-5PM @ the Library Theater/Edinburg: Featuring award winning documentary Inside Peace and a special class on Dealing with Active Shooters on Campus with counter-terrorist expert Rich Roth !

via CTI Consulting http://ift.tt/1LULy7P
CyberheistNews Vol 6 #13 [ALERT] Last Week Was A Ransomware Horror Show. Here Is The Roundup!
Ransom ware is taking many new forms, and is getting far too expensive for many to deal with.
from CTI Consulting http://ift.tt/1LU4ROy
via IFTTT
from CTI Consulting http://ift.tt/1LU4ROy
via IFTTT
Scam Of The Week: Phishing Email Uses Accurate GPS Data To Catch Speeding Drivers
Watch out for this email scam, it looks very real, please pass along, it can be devastating.
from CTI Consulting http://ift.tt/1SqKUOB
via IFTTT
from CTI Consulting http://ift.tt/1SqKUOB
via IFTTT
Sunday, March 27, 2016
News from The Associated Press
Good work Atlanta Airport, most people do not know that Uber drivers are not finger printed, as the artical says with out it, it is hard to believe what the guy reports, or even says his name is. The catch 22 is in many cases you can not get finger print checks done. So I am not sure Uber can run prints by themselves.
from CTI Consulting http://ift.tt/1PyFIDI
via IFTTT
from CTI Consulting http://ift.tt/1PyFIDI
via IFTTT
Saturday, March 26, 2016
Marsha Gay Reynolds 'may not have known about the 70lbs of cocaine in her bag' | Daily Mail Online
Now think about this, she did not wrap these packages, she just carried them, and from what the authorities are saying, she has done this before. Since she did not know what was in the packages, or at worst thought it was drugs, it just as well as could have been explosives. Now 11 ounces took down the Pan Am 103 Plane, can you imagine what 70 pounds would do. If the bad guy wanted to limit his chances of getting caught with explosives, the package of 30 pounds of Explosive and 40 pounds of drugs could be used.
from CTI Consulting http://ift.tt/22CudrO
via IFTTT
from CTI Consulting http://ift.tt/22CudrO
via IFTTT
Guard at ‘terror target’ Belgian nuclear site killed, access badge stolen – media — RT News
This is why reporting badges stolen or lost is so important. TSA is often bad mouthed because they have such a low tolerance to people that do not report lost or stolen badges. It can be the keys to the system. Even a bag handler at an airport has a lot of access to critical areas of airports as do Security Guards, maintenance workers and others. How about other targets like malls, have you lost any badges for back areas of the mall, Court Houses, your business. Every time CTI has been called in to audit a businesses card access system, at minimum over 5% can not be accounted for. When we check to see if the card has been used, about 2% of the time we see times they have been used to get into the building, usually after hours and involved in some loss to the business. Hospitals have been targeted a lot, because of the ability to get into areas where drugs or personal property can be stolen. Want to stop bad guys, do an audit on the expensive access control system you installed, after the audit, see if any of the cards that are not supposed to be active, have been used. One of the biggest issues CTI has seen was when an access control system fails or is brought down for Maintenance, back up data has been used to bring the system back up. Any badge deletions down recently usually have not made it to the back up data. In one case for a small medical building, 20 badges not recovered by taken out of the system when people where fired or down sized, came back into the system after a crash of the access control system. Two former employee's figured out their badges where working again, and started stealing everything from drugs to computers and printers from the facility. It will take a few hours to conduct the audit, and CTI would strongly suggest you use a third party, since the access control company you are using will probably not report negative events on themselves, there is too much liability involved for them.
from CTI Consulting http://ift.tt/1Rtv0ml
via IFTTT
from CTI Consulting http://ift.tt/1Rtv0ml
via IFTTT
Friday, March 25, 2016
How Islamic Jihad Hacked Israel’s Drones - The Daily Beast
This has been going on for years, even the Mexican Drug Cartels are hacking or more precisely watching the video feeds from our drones. Here is one to think about, so is the American Govt. watching the video feeds of the few but growing drones the Cartels are using. I am not sure if the Palestinian had just watched the video feed, that he could have been arrested. But they again just having the electronic equipment to do it is illegal in the Gaza Strip. Although I am not sure this guy was in the strip. Once you know the video feed frequency, capturing the video is not all that hard. If you buy a rf video receiver from a hobby shop and just move around with it, I am pretty sure you would come up with someone's video feed fairly soon. If you have say an Icom receiver, price about a thousand bucks and run the receiver into a video monitor, you should be able to get a lot of video to look at. The bigger problem now days is the IP video cameras we all seem to be buying, there is one web site on line that you can go to and view over 9 thousand video cameras all over the world, if you purchase a pass to the web site they will allow you to down load the software to gain access to even more video feeds on the Internet. Most are from people that have installed cameras with out any protection, like a simple password on them. It maybe up to millions the site has available at this point, you get to pick the type of camera you want to see, factories, homes, doctors offices, federal agencies. Then narrow the search down to specific areas or towns in the world. Back to the Israel story, every Government has the capability to do this type of video capture, when Qaddafi was on the run in Libya they showed some of his spying capability, it really was pretty awesome, but one piece caught my attention and that was an Icom receiver hooked up to a monitor, hmm. But the Mexican Cartels have been doing it for years as well. Their tech lived in McAllen Texas for years and ran a business selling communications equipment, he had over 500 cameras they had installed and access to another 1000 or so that the Mexican Police and even some from the USA Law Enforcement, operating on both sides of the border. Most of his stuff was IP based and readily available over the internet. He aso ran their data and radio communications HUB as well. Most of his work was for the Zeta's but was farmed out to other Cartels as needed. His office or business still exists in McAllen, he is in the witness protection program it is rumored.
from CTI Consulting http://ift.tt/1UPJhMD
via IFTTT
from CTI Consulting http://ift.tt/1UPJhMD
via IFTTT
EXCLUSIVE – Top Jihadist Claims Islamic State Has Agents Working in Western Airports
I would have to think that this is true, we have had a number of instances of Islamic Jihadist's working even making plans at our airports, subway systems, and other possible targets. One individual actually worked to get an airport badge that allowed him access to the airport tarmac and had a vehicle loaded with what he thought were explosives going to set it off under a jet bridge at a medium sized airport in the Midwest, luckily the FBI was the supplier of the explosive materials, and had kept him under survallance since he had broached the plan to a known Jihadist on line. We all need to keep an eye on the folks around us, in this case even his son was concerned about his Islamic conversion and his new found views on Jihad. This threat is not going to go away overnight, and bad guys will find other reasons to kill people even after ISIS is gone, if it ever is really gone. Security Awareness is out best defense.
from CTI Consulting http://ift.tt/1pMczAs
via IFTTT
from CTI Consulting http://ift.tt/1pMczAs
via IFTTT
Two suspects named in Mission shooting; victim identified - The Monitor: Local News
The guy in this picture is crossing into Mexico after shooting to death a person in Mission Tx. He had an accomplice in another vehicle who has been charged on weapons violations, but if he makes bail, he will be the next picture of a person going into Mexico. Now the shooting happen a few miles from my Home in Tx and the crossing this guy is using in the picture is less than 4 miles from my home. Since they shot, it is thought another drug dealer, it is no big deal here. But if you had driven up on the shooting and witnessed it, then they shot you, then it may actually become another cross border violence problem, that the local City Fathers tell people just does not happen. You talk about ISIS, here is a Drug Cartel carrying out a hit in the USA, and nothing is done about it. Until they formerly charge the person going back over the border, under this Administrations Policy he will not even be issued a notice to appear by our Border Patrol. This is all just nuts.
from CTI Consulting http://ift.tt/1REbPJW
via IFTTT
from CTI Consulting http://ift.tt/1REbPJW
via IFTTT
Lip-reading technology 'could capture what people on CCTV say' claim researchers - Mirror Online
Just when you think you have seen and heard everything a CCTV camera can do, now lip reading. I am sure there are some rather large restriction on it ability right now, but it should get better over time. This is just one more design point CTI will have to add to our clients design elements. You gotta love technology it gets better each day. I would not expect this to be ready for wide spread prime time use, but we will keep and eye on it. The legal issues are going to be mind blowing, it will defiantly take CCTV down the same route as audio privacy restrictions.
from CTI Consulting http://ift.tt/1VMYrTC
via IFTTT
from CTI Consulting http://ift.tt/1VMYrTC
via IFTTT
IS-914: Surveillance Awareness: What You Can Do

via CTI Consulting http://ift.tt/1UpYs0K
Brussels attacks suicide bombers 'targeted nuclear plants' and were plotting to build 'radioactive dirty bomb' - Mirror Online
Ok, what have we learned here, it is important: Teams of Security Specialists need to conduct a risk assessment of every Nuclear Site for Pre Attack surveillance, to include the remote video camera used against the Director of the Brussels plant. Dirty bombs are but one of the plans these attackers could have had for the plant. Sabotage to make it malfunction is another. The key here is that the surveillance was not detected. We really need to get better at this, Training the Security Staff at the plants is a start, training the neighbors, the mailman, the delivery guys, the taxi and but drivers in the area is where we want to be with this. FEMA has a quick 1 hour course every security guard, body guard, and American should take. http://ift.tt/1ZAAm2h The purpose of this course is to make critical infrastructure employees and service providers aware of actions they can take to detect and report suspicious activities associated with adversarial surveillance.
from CTI Consulting http://ift.tt/1UfDtgD
via IFTTT
from CTI Consulting http://ift.tt/1UfDtgD
via IFTTT
Thursday, March 24, 2016
Is It Still Safe to Fly? - TheStreet
I was asked by this reporter just that question yesterday, and the answer is still yes it is. I would, but I always do, get past Security Screening as quickly as possible, but that is always good advice. Take advantage of security screening anywhere you are. It may not catch everything every time, but your odds go way up when you are past screening.
from CTI Consulting http://ift.tt/1VKxsbn
via IFTTT
from CTI Consulting http://ift.tt/1VKxsbn
via IFTTT
FEMA Courses You Can Take Online
If you have 45 min or less today, you can go online and take this very good FEMA course, take the test and wait (if you pass) a few minutes for them to email you the certificate. FEMA has over 100 courses that you can take to make you and yours safer and more secure. You can talk about it, or you can do something about it.
Some courses take up to a few hours, most less than two, and you can gain great knowledge in Active Shooter situations, Work Place Violence situations, even how to detect Surveillance by Terrorists and other bad guys. Our you can complain about how no one is doing anything about these Terrorists. Plus if you are looking or a job, or to advance in the job you have, you will have certified courses under your belt that you can add to your resume or even your Linked In page. Or, you can sit back and complain about how your life has stalled. It is all up to you!

Rich Roth via CTI Consulting http://ift.tt/1VKpRtc
In this 2006 bombing attempt in Texas, the bomb makers went to local home improvement stores and beauty supply stores to get the materials for their bomb. Beauty Supply stores have a lot of the main ingredients for lots of different bombs. Thefts from these stores at night, have been the way to get the ingredients cheaply. In some cases the stores did not even report the thefts because they did not know the importance of the supplies stolen,

via CTI Consulting http://ift.tt/1LK9I4K
Explosives will be key clue in Brussels investigation - CNN.com
Looking for the bomb makers, it is possible with just a little training to find them, before an attack. As in all security awareness we look for anomalies. ISIS bomber Zazi was just such an anomaly, as he was a dark-haired, bearded Afghan-American man in his 20s who bought six bottles of Clairoxide hair bleach during one shopping trip at a store in a Denver suburb. Zazi returned to the store a month later and purchased another dozen bottles of Ms. Kay Liquid, which is also a peroxide-based hair bleach. with which he was making TATP to use on New York subways. He was caught becaues he could not remember the exact amounts of chemicals needed for the explosive, and emailed a known ISIS terrorist for help. Interesting is that the bomb Makers hair in Brussels apparently was a few shades lighter since he was dealing with Hydrogen Peroxide, often the main ingredients of hair dye products. So add that to your, something that looks suspect, list. Hair coloring is changing lighter, bald guys like me would be hard to tell. The fumes from making the TATP can be dangerous as well as make you mildly to very sick at times. Another point to your , something that looks suspect, list, they take frequent brakes to take in fresh air. FEMA has an online course for wholesale and retail works on what to look for in the buying practices of individuals at their stores. IS-912: Retail Security Awareness: Understanding the Hidden Hazards, it is highly recommended that store owners take this course, and have as many folks they employ take it as well. The Terrorists are hidden among us and this is how we find them out before and event happens.
from CTI Consulting http://ift.tt/1MzKyRi
via IFTTT
from CTI Consulting http://ift.tt/1MzKyRi
via IFTTT
Wednesday, March 23, 2016
Victimization, ways not to be one CPTED is one of the them
I was just in an interview for the Brussels Attack and as always I am asked what can we do to protect ourselves. Here is a great article by Texas DPS, with some ideas of what we should be looking out for and report when we suspect something. May I say, I would always error on the side of thinking something is suspicious. if you are wrong no harm no foul, but if you are right, you may stop the next attack before it really gets going.
from CTI Consulting http://ift.tt/1pIGtpn
via IFTTT
from CTI Consulting http://ift.tt/1pIGtpn
via IFTTT
Attacks On Transportation Targets Like Those In Brussels Have Become Rarer
TrentonScottH : Terrorism against transportation targets make up a small percentage of attacks, but disproportionately more deadly | https://t.co/v6D9FDagXd
from CTI Consulting http://ift.tt/1MCqBt2
via IFTTT
from CTI Consulting http://ift.tt/1MCqBt2
via IFTTT
Brussels attacks suspected ISIS bomb-maker Najim Laachraoui arrested, suicide bombers ID'd as...
TrentonScottH : #BrusselsAttacks suspected ISIS bomb-maker Najim Laachraoui arrested, suicide bombers ID'd as Bakraoui brothers https://t.co/N3EVMGtlnL
from CTI Consulting http://ift.tt/1Sh2ZhU
Trenton Higareda via IFTTT
from CTI Consulting http://ift.tt/1Sh2ZhU
Trenton Higareda via IFTTT
Brussel and Paris Attacks: Muslim Master Bombmaker who POSED AS MIGRANT is Arrested | Pamela Geller
Good catch, if he's the bomb maker for both the Paris and Brussels attacks, this could be a real blow to terrorist cells through out Europe. It can take a bit of time to get another bomb maker up to speed.
from CTI Consulting http://ift.tt/1ZrMjap
Rich Roth via IFTTT
from CTI Consulting http://ift.tt/1ZrMjap
Rich Roth via IFTTT
Tuesday, March 22, 2016
DC Airline Passengers Advised to Be Alert
TrentonScottH : Excerpt from my NBC Washington interview today on US airport security measures | https://t.co/RYahplacuM #BrusselsAttacks #AviationSecurity
from CTI Consulting http://ift.tt/1Ujyj3C
Trenton Higareda via IFTTT
from CTI Consulting http://ift.tt/1Ujyj3C
Trenton Higareda via IFTTT
CyberheistNews Vol 6 #12 Scam Of The Week: TurboTax Phishing Attack
This is one to watch for during the tax season
from CTI Consulting http://ift.tt/22tQoAl
Rich Roth via IFTTT
from CTI Consulting http://ift.tt/22tQoAl
Rich Roth via IFTTT
Why still terror risk, after all that security money spent?
It is a matter of diminishing returns. As we move to protect softer and softer targets, there are just not enough security staff to go around - and not enough money even if there were. We need to do two things: one, everyone needs to take part of the responsibility to find the bad guys; and two, we need to attack the terrorists at their source. President Bush made the decision to declare war on the terrorists, and any country that funded or hid them. This took away the support base from most of the terrorist groups bent on attacking the USA, and to some extent the world. When attacking the source and support to terrorists, you bring the war to them and they have to play defense, which is much harder than just choosing soft targets as they find them. We cannot protect everything from a defensive position, there are just too many targets. It takes intelligence and force to beat back this threat, and the USA must take a more proactive mindset - as politically incorrect as that may seem - to bring the terrorists to a stop.
from CTI Consulting http://ift.tt/1RhF81v
Rich Roth via IFTTT
from CTI Consulting http://ift.tt/1RhF81v
Rich Roth via IFTTT
Terrorism and Awareness.
Excellent analysis by CTI's Chicago airports project manager.
from CTI Consulting http://ift.tt/1Rxhlrm
Trenton Higareda via IFTTT
from CTI Consulting http://ift.tt/1Rxhlrm
Trenton Higareda via IFTTT
TATP is being reported as the Explosive used in the Brussels attacks
Just a little background, TATP has been around before even C-3, C-4, or Semtex (the main military plasticized explosives) over the years. It was not considered safe to use since it can detonate just from rough handling, like being dropped. So for a soldier carrying this type of explosive, just being shot may be enough shock to detonate the explosive charge.
TATP is fairly easy to make with obtainable chemical materials, but once again it can easily detonate during the mixing process. Another problem is the mixture is time sensitive, it normally starts to lose effectiveness over even a few days (I have fired off C-3 explosive made before WWII without a problem). Do not expect TATP to work even after a week in most cases. So if you look at the timeline of the Brussels attacks, the plan was probably developed over the last few weeks or months. When they decided it was time after the capture of the last Paris bomber, the delay was probably having the TATP made up.

TATP is fairly easy to make with obtainable chemical materials, but once again it can easily detonate during the mixing process. Another problem is the mixture is time sensitive, it normally starts to lose effectiveness over even a few days (I have fired off C-3 explosive made before WWII without a problem). Do not expect TATP to work even after a week in most cases. So if you look at the timeline of the Brussels attacks, the plan was probably developed over the last few weeks or months. When they decided it was time after the capture of the last Paris bomber, the delay was probably having the TATP made up.

Rich Roth via CTI Consulting http://ift.tt/1q0otqq
On preventing another Brussels-style attack in the US
CTI Consulting Vice President Trent Higareda (@TrentonScottH on Twitter) will appear on NBC4 in the DC area,
talking about the Brussels attacks and the airport security response in
the US.
It's important to note that the adversaries are moving their targets away from the secure areas to the public areas of the airport. It is less about gaining access to a plane anymore than just causing damage, mayhem, and casualties wherever people may congregate. The selection of the American Airlines counter was no coincidence.
But it would be a mistake to try and push the limits and capabilities of the security and response personnel out too far away from the airport - say to the parking lot or beyond. Instead we should concentrate on what works for preventing and mitigating these attacks where we have the greatest capability to act and respond. Intelligence services had already warned of an impending attack in Belgium, that should have warranted a step-up in security. Second, the use of surveillance and behavioral detection is key to risk-based security - singling out those who are either in a surveillance or planning mode themselves, or those acting in any way unusual. Security awareness teaches us not to ignore anything suspicious, out of place, or that gives us unease. These skills should not be cultivated by security and law enforcement alone - they are ones we all need to develop and use.
Lastly, we also need to be aware that terrorists will use whatever means they have at their disposal. In Europe, the terrorists rely on bomb-making expertise and materials gained in Iraq and Syria - things that are much harder to come by in the US, where guns and rifles are more easily obtained (homemade pressure cooker or pipe bombs notwithstanding). The US has also been more successful in infiltrating and monitoring terror cell networks here than the Europeans have, owing greatly to the fact that we are a much more integrated society.
In the meantime, we should expect a period of heightened security around transportation and other critical facilities, but we should continue to be vigilant even after the crisis is no longer fresh in our minds. - TH
It's important to note that the adversaries are moving their targets away from the secure areas to the public areas of the airport. It is less about gaining access to a plane anymore than just causing damage, mayhem, and casualties wherever people may congregate. The selection of the American Airlines counter was no coincidence.
But it would be a mistake to try and push the limits and capabilities of the security and response personnel out too far away from the airport - say to the parking lot or beyond. Instead we should concentrate on what works for preventing and mitigating these attacks where we have the greatest capability to act and respond. Intelligence services had already warned of an impending attack in Belgium, that should have warranted a step-up in security. Second, the use of surveillance and behavioral detection is key to risk-based security - singling out those who are either in a surveillance or planning mode themselves, or those acting in any way unusual. Security awareness teaches us not to ignore anything suspicious, out of place, or that gives us unease. These skills should not be cultivated by security and law enforcement alone - they are ones we all need to develop and use.
Lastly, we also need to be aware that terrorists will use whatever means they have at their disposal. In Europe, the terrorists rely on bomb-making expertise and materials gained in Iraq and Syria - things that are much harder to come by in the US, where guns and rifles are more easily obtained (homemade pressure cooker or pipe bombs notwithstanding). The US has also been more successful in infiltrating and monitoring terror cell networks here than the Europeans have, owing greatly to the fact that we are a much more integrated society.
In the meantime, we should expect a period of heightened security around transportation and other critical facilities, but we should continue to be vigilant even after the crisis is no longer fresh in our minds. - TH
Behavioral Detection
When trying to detect terrorists or any bad guys, we would be very interested in the interaction between these people. The gloves on the left hands of these two suspects could be a clear clue to a possible problem, as they apparently hide the string actuator or other detonation device. But if you're looking for people setting up to conduct an attack, it will be their interactions and surveillance methods that can make them stand out. With a little training, these precursors to an attack can be readily detected. Call or email CTI Consulting to set up training for your staff.


Rich Roth via CTI Consulting http://ift.tt/25jjxNA
Brussels Attacks Tear at the Fabric of the European Union | Stratfor
Stratfor has weighed in on the Brussels bombing. It has been years since I have been to Brussels, but many really do not understand the importance of this NATO defense rally point for all of the EU.
from CTI Consulting http://ift.tt/1XK9rQ7
Rich Roth via IFTTT
from CTI Consulting http://ift.tt/1XK9rQ7
Rich Roth via IFTTT
New York, DC Ramp Up Security in Wake of Deadly Brussels Attacks - ABC News
It is important to remember that it takes time to set up these attacks, and this attack in Brussels had been in the last planning stages long before this last Paris terrorist was captured. To set this up it took weeks if not months. The heads up given by this attack hopefully will allow our security to detect any cells that want make similar attacks. But every one of us can be keeping an eye out for something suspicious or not normal. If you see something, say something. The greatest security strength is our free people looking out for each other. Reporting something does not mean that person is going to be arrested, just looked at to see if there is a problem there.
Bombs have no identity, they kill or injure all around them, so it could be you are saving a loved one, or a friend, perhaps even yourself. It is up to us.
from CTI Consulting http://ift.tt/1pwX0Mi
Rich Roth via IFTTT
Bombs have no identity, they kill or injure all around them, so it could be you are saving a loved one, or a friend, perhaps even yourself. It is up to us.
from CTI Consulting http://ift.tt/1pwX0Mi
Rich Roth via IFTTT
What Happens During an Explosion
Remember when an explosion happens, the potential for damage or injury from fragmentation is significant. In the Brussels attacks there are reports that nails had been added to the bombs. The other threat is coming from the ceiling, mainly signs and even the ceiling tiles and frame can become a secondary fragmentation danger. As you can see from the video and pictures available so far, the bombs
did not do an immense amount of structural damage. Walls are still
standing, even kiosks are standing in the general area around the bomb.
The subway car had a lot more damage, but it was a smaller and more contained
area where the bomb went off.
The fact is that even with a shortened setup time frame, it will probably take other terrorist cells working in the USA a few days to a few weeks to be able to mount an attack. This is when effective security is needed the most - and in fact you can be the critical piece of our security. The terrorists are always moving to target points and conducting surveillance prior to any attack, and this pre-attack mode is when they are easiest to detect.

The fact is that even with a shortened setup time frame, it will probably take other terrorist cells working in the USA a few days to a few weeks to be able to mount an attack. This is when effective security is needed the most - and in fact you can be the critical piece of our security. The terrorists are always moving to target points and conducting surveillance prior to any attack, and this pre-attack mode is when they are easiest to detect.

Rich Roth via CTI Consulting http://ift.tt/1pZMCx6
Brussels Airport Graphic
The ticket counters in this area of the Brussels Airport are set up in such a way that the terrorists could approach them with out having to queue up for them. Terrorists tend to copy successful attacks, so for at least the next few days, if you do not have to check in bags, using electronic tickets on your phone or printing your boarding passes at home may be a good idea. Remember: the area past security at an airport is far safer than the area before it. Being able to go directly to the security screening area will allow you to get to that safer area more quickly.


Rich Roth via CTI Consulting http://ift.tt/1ZnXalV
Brussels Airport explosions leave many dead and second ‘attack’ hits Metro station | Daily Mail Online
The American Airlines ticket counter was apparently the first target
of the terrorists. This is one of the soft spots of any airport. The
last drill CTI conducted for a major airport involved the ticket
counters area.
As the results of the drill showed, the chaos and lack of response capabilities to these attacks are very evident. We have many protocols that can be used to ramp up security at and beyond the screening checkpoint, but far fewer prior to that.
Many airports and TSA have people trained to recognize terrorists and other bad guys setting up to conduct these types of events in the planning stage, and hopefully will recognize pre-attack surveillance prior to an event here in the USA.
from CTI Consulting http://ift.tt/1Mk9SzZ
Rich Roth via IFTTT
As the results of the drill showed, the chaos and lack of response capabilities to these attacks are very evident. We have many protocols that can be used to ramp up security at and beyond the screening checkpoint, but far fewer prior to that.
Many airports and TSA have people trained to recognize terrorists and other bad guys setting up to conduct these types of events in the planning stage, and hopefully will recognize pre-attack surveillance prior to an event here in the USA.
from CTI Consulting http://ift.tt/1Mk9SzZ
Rich Roth via IFTTT
Things to Watch in Belgium
Alert levels around the world have risen, as other terrorist cells want to get on the board with their own attacks. Looking at the tweets and other social media outlets, calls are going out for others to engage like these Belgium groups have.
from CTI Consulting http://ift.tt/1LDzPuh
Rich Roth via IFTTT
from CTI Consulting http://ift.tt/1LDzPuh
Rich Roth via IFTTT
Saturday, March 19, 2016
Interpol Advises More Border Vigilance After Abdeslam Arrest - Bloomberg Business
Vigilance should be the operative word for the US as well, but instead we are opening our borders more. There is danger out there and we need to be aware of it, and taking more precautions.
from CTI Consulting http://ift.tt/1VndDXe
Rich Roth via IFTTT
from CTI Consulting http://ift.tt/1VndDXe
Rich Roth via IFTTT
Wednesday, March 16, 2016
Brothers accused of callously filming fatal shootout with Pr. Geo.’s police due in court
What a tragedy, all three brothers deserve and will get jail time. An officer is dead at the hands of another officer, which will stay with him forever as well. So many people in the brothers' lives could have noticed something and stopped it - we all need to pay more attention to those around us, and take action as needed.
from CTI Consulting http://ift.tt/1Mngd8x
Rich Roth via IFTTT
from CTI Consulting http://ift.tt/1Mngd8x
Rich Roth via IFTTT
Tuesday, March 15, 2016
Metrorail Will Shut Down All Day Wednesday for Emergency Investigation of Equipment | NBC4 Washington
Maintenance or faulty equipment suspected, not terrorism, but nothing is being ruled out. Three fires from some source on Monday, and a death last year from a similar problem, have workers wondering.
from CTI Consulting http://ift.tt/1U5hb1g
Rich Roth via IFTTT
from CTI Consulting http://ift.tt/1U5hb1g
Rich Roth via IFTTT
Cartel Firefight near Texas Border Kills 10
This just after McAllen (the largest US city near this incident) made a big point of meeting with the Mexican officials and jointly stating how crime was down on both sides of the border, and that it was safer than ever to do business in Reynosa. The gunfire could be heard in Texas, and although no one reported bullets striking this side, at times it was well with in range of Texas homes and people. An official Mexican report of 10 killed would normally indicate the death toll was at least double, and they were not able to hide the 3-hour gun battle ranging all over the city. Cartel pulled blocking actions, using cars, often set on fire to impede police pursuit. Tires where also set on fire, sometime to block roads, other times to show other Cartel members rally points and escape routes. Having worked in the Gaza strip, I can say it rarely gets this bad over there. There really needs to be some action taken by the USA to make our citizens safer.
from CTI Consulting http://ift.tt/21qfxWK
Rich Roth via IFTTT
from CTI Consulting http://ift.tt/21qfxWK
Rich Roth via IFTTT
Monday, March 14, 2016
Sniper kills ISIS executioner during beheading class
Sometimes you should not smile, but you just gotta :)
from CTI Consulting http://ift.tt/1pGEvFE
Rich Roth via IFTTT
from CTI Consulting http://ift.tt/1pGEvFE
Rich Roth via IFTTT
EEOC raises the stakes with retaliation rule update | Business Insurance
This will not be a plus for employers, but you need to understand how this can affect your company.
from CTI Consulting http://ift.tt/1QXLVLp
Rich Roth via IFTTT
from CTI Consulting http://ift.tt/1QXLVLp
Rich Roth via IFTTT
In Ankara Bombing, Suspicion to Fall on Kurdish Militants
This is the reason arming Kurds can be dicey, their war with Turkey is real and bloody
from CTI Consulting http://ift.tt/1RgKXPO
via IFTTT
from CTI Consulting http://ift.tt/1RgKXPO
via IFTTT
Sunday, March 13, 2016
Bomb-sniffing dog discovers 2 Hellfire missiles bound for Portland | OregonLive.com
This story is still unfolding, but if Portland is the landing point the user could be terrorists on both ends of the spectrum. From Skin head to Radical Islam. It was a good find, but the fear is that to many sales like this are being made all over the world. Between the breakup of the Soviet Union to the breakups in the Middle East to many weapons are just laying around till found by profiteers and put on the black market This device would take some technical no how to be used effectively, but there are enough people with the technical expertise, to make it at least work in someway.
from CTI Consulting http://ift.tt/1V4uMEY
via IFTTT
from CTI Consulting http://ift.tt/1V4uMEY
via IFTTT
Police Officer Shot In Prince George's County
TrentonScottH : RT @cbsbaltimore: #UPDATE: 1 suspect in custody in Prince George's police shooting: https://t.co/O1yGqd2DHh
from CTI Consulting http://ift.tt/1pov51D
via IFTTT
from CTI Consulting http://ift.tt/1pov51D
via IFTTT
DHS Bulletin Focuses on Terror Threat to DC Hotels
At the risk of crying Wolf, this is a threat that needs to be taken seriously, and although it is showing DC as the target, remember soft targets are a real threat as well. Hitting a hotel or convention center in middle to small town America would be terrifying to other small towns. If only in your mind, run a risk analysis of Hotels and Convention centers in your. Then figure out how the bad guys would conduct pre attack survalance. Keep an eye on those points as you conduct your normal travel. You may be the one to stop the next attack.
from CTI Consulting http://ift.tt/1plerA0
via IFTTT
from CTI Consulting http://ift.tt/1plerA0
via IFTTT
Friday, March 11, 2016
Thursday, March 10, 2016
FBI bugged binders to spy on Russians in New York - Yahoo News
This is not quite old school because of the type of espionage devices used in the binders. But the method of bugging the binders or things like them is an old School method. Keeping track of what the Russians are spying on is critical, and actually gives us a good idea of what they are up to. ESI is giving a course on basic Espionage next month, learning what the opposition both other Governments as well as your clients competitors can and are trying to do is critical.
from CTI Consulting http://ift.tt/1UjCcDz
via IFTTT
from CTI Consulting http://ift.tt/1UjCcDz
via IFTTT
First on CNN: U.S. plans to publicly blame Iran for dam cyber breach - CNNPolitics.com
This happen a few years ago, but it is interesting that just now our Government is speaking out. The operational parts of the dam, have apparently done what is recommended and kept their systems off the network hooked up the the internet. Many Agencies and Companies are trying to separate their security networks from the administrative networks that are connected to the internet. This is one of the first tests CTI does when analyzing security networks, or firms or even Government agencies. Attacks can still be successful, as rumored Israel USA attack on the Iran Nuclear bomb program. That attack hit the computers at the Iran sites that where connected to the internet and then infected flash drives, so that when data from the internet connected computers was hand carried over to the secure network, the flash drives contaminated the security Nuclear network. That code is now out there in the wild, and can be used against us in the USA as well.
from CTI Consulting http://ift.tt/24ThDmu
via IFTTT
from CTI Consulting http://ift.tt/24ThDmu
via IFTTT
American Mother Jailed in Mexico After Leading a Militia Against Cartels May Be Freed | VICE News
It is unfortunate, but this is the only way Mexico can be taken back from the cartels, since the Government of Mexico will not. A lot of good people will lose their lives to save Mexico, but in the end it will be how Mexico saves itself. Our hat's are off to this brave lady. Each City that is taken back, and left alone by the Federal forces, who usually come in and take the weapons from the Citizens, the City will be the shining light for other cities to follow. Once a State is taken back, that State will be the shining light for the other States of Mexico. It can happen, the Federal forces need to stay out of it, let these Citizens take down the cartels, but more importantly take back their cities. The Government can try and help by cracking down on the cartels in areas that the Citizens are not standing up for themselves, but leave these Citizens of Mexico alone.
from CTI Consulting http://ift.tt/1Ty7UON
via IFTTT
from CTI Consulting http://ift.tt/1Ty7UON
via IFTTT
Alleged Cell Phone Jammer Raised Eyebrows Months Before Arrest « CBS Chicago
You can buy them in Mexico, but please be warned that they are illegal in the US. You can go to jail and lose a lot of money. Most of the time people do not know what has happened. There use by some Government agencies has happen and will happen. If a bomb could be set off by a cell phone jammers have been used in limited cases. They have also been used to drop people off cell towers , so critical government agencies can communicate. It happens during major events like bombings and plane crashes, that so many people use their cell phones that it jams up cell activity, using a jammer for a second drops peoples calls so Police and other emergency response can get on line. So if telling family that you are ok, do it fast, it is possible you will be dropped.
from CTI Consulting http://ift.tt/1TuDahr
via IFTTT
from CTI Consulting http://ift.tt/1TuDahr
via IFTTT
Wednesday, March 9, 2016
I dared expert hackers to destroy my life. Here's what happened next.
TrentonScottH : A compelling story. Social engineering and phishing are probably the two most effective ways to steal personal data. https://t.co/3ICJdnS9W5
from CTI Consulting http://ift.tt/21r62IC
via IFTTT
from CTI Consulting http://ift.tt/21r62IC
via IFTTT
Thursday, March 3, 2016
FBI — Child ID App
This is a great app for all families to have on their phone. When a child or family member is missing or injured seconds can make all the difference. Have it all available at the touch of your finger.
from CTI Consulting http://ift.tt/1TtbrOz
via IFTTT
from CTI Consulting http://ift.tt/1TtbrOz
via IFTTT
Wednesday, March 2, 2016
Pirates Hack Shipping Company To Find Their Targets
High Tech pirates know what to target and when, a lesson all of us in Security need to learn. We need to be aware of all the risks, when developing our security response.
from CTI Consulting http://ift.tt/1Uyqy8i
via IFTTT
from CTI Consulting http://ift.tt/1Uyqy8i
via IFTTT
Subscribe to:
Posts (Atom)