Wednesday, September 28, 2016

Missing Afghans Raise Terrorism Fears - Washington Free Beacon

This could be a very serious situation, and one that has happen before, most turn out to be either a method of just wanting to stay in America, but the timing is suspect. There are a number of programs run by DOD and the State Department under the auspices of varies Agency's like the Marshall's service, among others, a number of Contractors provide both in country training as well as overseas, one of the largest programs is the ATAP (Anti Terrorism Assistance Program) Which CTI has conducted Training for various countries from South American to the Mid East. Vetting of the student is up to the Sponsoring Agency, in this case it would appear to be DOD, but could well be the State Department. In most cases this is the first time for them to be in the US and they are allowed in a lot of freedom to explore the areas around their station of training. On long weekends the oversight of the Students is often no more than their word of where they will be. Most are trained in protective or defensive areas, but others do receive offensive training to include the use of weaponry from firearms to tanks.
from CTI Consulting http://ift.tt/2drX6Ek
via IFTTT

Tuesday, September 27, 2016

House asks feds to stop mailing postcards with Social Security numbers on them | Washington Examiner

For private industry to do something like this would be grounds for at minimum a civil lawsuit, federal fines and possibly criminal referral, plus the Government pays a lot of money on ad's to fight social security fraud, and disclosure of your number is a key part of the fraud. Not sure how this was allowed to happen. .
from CTI Consulting http://ift.tt/2dx72J4
via IFTTT

Saturday, September 24, 2016

Backing Out of the Kill Zone – Some Thoughts | ISDA, Inc.

This video was out there for a while, and is fake, but does tell you a bit about how high tech video is now days, so as the old adage says do not confess to anything, even if they have pictures. Hmm, but lets get to the real part of the article, one if they will let you sign up to the news letter from ISDA Pulse Newsletter do so , even if you can never get to their driving school, which if you live in the RGV around McAllen Texas, and are worth near a million or over you should go,, now, the Pulse Newsletter has really good hints and advice. In this case getting out of the kill zone in reverse, it looks easy, it look safe, it is neither. But like anything else you need to know how you and your real car handle travelling in reverse. Try it at 5 miles an hour, in a very big empty parking lot, and still be very careful. If that goes OK, then read the article again, and see if your vehicle has the reverse governor than limits it to around 10 miles an hour. By the way 10 miles an hour is about the speed limit your skill set can handle. Vehicles tend to flip over at very low speeds in reverse. It has to do with steering and the center of gravity of the vehicle. Wide based vehicles that are low to the ground are best. High vehicles like SUV's are in general considered the worst. But read the article, these are the pro's listen to what they say, and then if you are going to practice, do so carefully. But I do recommend you practice, very slowly, and in a very big area with nothing in it. I have seen people try and practice at 5 miles an hour in their driveways get into real trouble quickly. Even two and four lane roads are a real danger for this type of practice to start with, perhaps to end with. Pick a really big parking lot with nothing else there. If you get above 20 miles an hour in any type of SUV, or Pickup, please expect to flip over, not kidding here. If you can get up to 10 miles an hour consider yourself an expert, till you can go through the ISDA school. Even then 10 miles an hour is going to be a reasonable limit. Let me give you a big hint, read the article, near the end is the key point. If you sit there in a bad situation for even 3 seconds instead of backing up at 5 miles an hour you have lost a lot of time. When you see the situation, which takes training itself, start to act. If you are wrong, then good practice, if you are right, then, every second you are moving gets you out of the KILL ZONE. Getting out of the Kill Zone is key, different experts have different distances for the zone, but to me every foot is critical. I will say in my training for using explosives to ambush vehicles, the kill zone we planned for was 64 feet. The main reason is that at 30 miles an hour the key vehicle you are attacking is only in a kill zone that large for 1.5 seconds, at 10 miles an hour around, most people will be out of a normal not Governmental kill zone in the same amount of time. So sitting there for 3 seconds trying to make up your mind, is far more dangerous than a quick 5 mile an hour decision.
from CTI Consulting http://ift.tt/2cZ6woW
via IFTTT

Friday, September 23, 2016

Suspicious Vehicle Prompts Evacuation At LaGuardia Airport « CBS New York

Suspect vehicles are always a problem, and in front of an Airport Terminal is even more of a problem. What do you do with it, TSA said for a while tow it away, and that is the method used when they can convince a tow truck driver to hook up and tow away a vehicle the bomb dog just sat on, showing it thought there was a bomb in it. Now for a bit of time one TSA official told the Airport Security to lie to the tow truck driver if needed. But that stopped quickly, So now what do you do with it, evacuations from the area around the Vehicle is advised, but that causes huge air traffic problems. This why so many airports have such control of the front of the Terminal, once a car is left it quickly becomes a critical problem.
from CTI Consulting http://ift.tt/2d4zqo8
via IFTTT

Spokane, Washington, chlorine accident exposes 30

This was one cylinder on a recycling plant conveyer that ruptured, 8 people where in critical condition, only saved when Brave Firefighters ignored the danger to themselves and went into bring people out. Most Fire Departments train on how to deal with chemical releases like this but it still is very dangerous work.
from CTI Consulting http://ift.tt/2dpyJGs
via IFTTT

Chlorine Gas: An Evolving Hazardous Material Threat and Unconventional Weapon

NIH the leading Government Health study and advanced health protection Agency, has been involved in the study of the health risks of chlorine exposure, both accidentally and now more concern is about terrorist attacks. If exposed make sure everyone possibly involved are monitored for at least 48 hours. Some people have had delayed reaction to even small amounts of the chemical. Washing off the chemical is the first advice given, but even that can be hazardous if in confined breathing situations. Storage can be critical since the chemical can have even more dangerous reaction when mixed with other chemicals, ammonia being one, and since both are used in cleaning products are often stored in closets and storage sheds together. EP teams need to be aware of the potential problems, a place that should always be checked is where pool cleaning and maintenence supplies are kept.
from CTI Consulting http://ift.tt/2cbjgoz
via IFTTT

Actuator Closes Chlorine Containers in Case of Emergency | Water & Wastes Digest

Here's the totally non effective for an attack emergency shut off valve for chlorine tanks big and small. It does what it was designed for, but it actually offers more leverage to knock the valve stem off the tank, and does nothing for a side rupture of the tanks. By far the most dangerous to the public. Keeping these cylinders safe is an almost impossible problem, but security of them is critical. As mentioned previously, a quick risk assessment of the danger, leads to the transportation of the tanks. Even a violent crash with the truck could have very bad consequences. Choosing the most densely crowded part of the trucks travel would require a little surveillance, which is part of any terrorist attack.
from CTI Consulting http://ift.tt/2dpu1Zi
via IFTTT

No matter what, don’t use Google’s new Allo messenger app, says Edward Snowden

Beware of all applications out there, there's a movement to start suing vendors like Target and CVS that require sales to be linked to their app's yet often exposes the user to vulnerabilities. The move is to make vendors more responsible for the app's, ,which are often made for vendors with out any real testing or a due diligence of the app vendor, who can be paid by third parties for the data they capture. Google sells information about you already, here is more for them to sell, be careful.
from CTI Consulting http://ift.tt/2cT5oTM
via IFTTT

Yahoo Says Hackers Stole Data on 500 Million Users in 2014

Probably the biggest takeaway from this issue is the time frame of the event vs the exposure of the event. How many security vulnerabilities are out there that we do not know about yet, that are comprising our Internet business and private life. Many Experts are saying we are just seeing the tip of the iceberg. Most are either not discovered or the hacked vendors and government, Federal, State, or Local included are not telling. Companies can lose clearances, which means losing business, or even bankrupt the companies. Be careful, but also be realistic, take a look at what could be out there if you're hacked. Just assume for an hour or so that you have been hit, what could come back to bite you. Painful to consider, but you really need to do it.
from CTI Consulting http://ift.tt/2d4fsJX
via IFTTT

Thursday, September 22, 2016

White House staffer's email hacked revealing Michelle Obama's schedule | Daily Mail Online

Most of this does not read right, some of the information looks to be correct, like what the staffers are paid. The people being protected, are not usually shown in security setup photos, the event has not happen yet. The steps up stairs are something that does show up in both staffer and security advance work, so for some in the EP field you may learn a little bit. I have no reason that a staffer would have the First Ladies Passport, it is not something a staffer would have. I don't think this photo of the passport is altogether a bad thing, it is probably available to govt officials both in and out of the US, that would have had to pass it on to a some functionary, and copies get made, but I doubt this is a valid photo, maybe, but what difference would it make. I have shown up in Wikkileaks when they hit the Governments information. Damaging, not really in my case, but I did know what was being said about me from two different Governments. We really need to be careful on what we put in emails, anyone can get hit. Or they can hit someone you emailed too, so be careful.
from CTI Consulting http://ift.tt/2ddw4AX
via IFTTT

Bombings suspect: An ordinary American terrorist

There's a trend here we need to pay a lot of attention to. The FBI has a consultant that has been delving into this problem for a while. His group has developed a report that is on the FBI website of an 8 point set of characteristics we may want to look for. Like now. I discounted portions of it for a while, but it is proving to be more accurate on these 2nd generation Home Grown bad guys than any other method to date. The post on the FBI report can be found in the www.CTIC.co blog.
from CTI Consulting http://ift.tt/2d2kXJq
via IFTTT

Research: One in 50 Employees is a Malicious Insider

Two things here, one the data in the study shows that it is not only people leaving your firm or Agency that you need to worry about. Workers that intend to stay are perhaps the real problem. They can see a second stream of income, and want to ride it for as long as possible. Two, it's not just cyber threats, malicious insiders, are copying keys, misdirection of assets and just supplies. I have been involved in the detection of insider threats, after the easy stuff is found, you start looking at inventory, looking for trends. School starting, leads to big up ticks in office supplies going missing, Christmas season leads to big up ticks in battery and packaging supplies going missing. Drug sale's can lead to constant theft of things like aluminum foil, small packing supplies like baggies, even digital scales. It looks like small stuff, but in one USA Government Agency the take for one quarter of a year was in the hundred thousand dollar range and over a 1/4 of the maintenance and supply budget. Stock inventory showed that 80 plus percent of key items went missing, and many small items where not even being inventoried.
from CTI Consulting http://ift.tt/2cYFxXr
via IFTTT

5 Revelations From OPM Data Breach Report

The OPM attack was and is the most devastating cyber attack to date. As government employees and contractors evolve and rise through the ranks, their entire background, to include financial and clearance information, facts, that even many families and friends do not know about them. Now held to be used when and as needed by Chinese espionage agents, or even sold or given to people or organizations for gain, perhaps only to embarrass at a critical point in a career. So far this is the biggest hit we in the USA know about, and it will be with us for decades. You can not put this problem back in the jar, it is out there.
from CTI Consulting http://ift.tt/2ddfVeL
via IFTTT

Wednesday, September 21, 2016

Detecting Emotions With Wireless Signals

The question will be, is this legal in walk up conversations, or in interview situations. Technology wise it looks to be viable, and could be a boon to investigators.
from CTI Consulting http://ift.tt/2diy5rq
via IFTTT

Chemical agent possibly found on rocket fired at US troops in Iraq

If this is true our troops could be in unique danger, mustard gas can cause long term health issues that can never be truly cared for completely. The military have access to chemical resistant gear, but it is beyond hot to wear in country all the time. The EU should be preparing to deal with this type of attack, it could well be they will face it in the next round of attacks. It is possible the USA would be soon after. It is the type of attack that could change the way a lot of folks look at the world of terror.
from CTI Consulting http://ift.tt/2cSzipA
via IFTTT

Researchers hack Tesla Model S with remote attack

The only reason this story is so important, is that Tesla is very security smart company, much more than most of the car technology firms working smart cars. Now read what they can do to, now think about them hitting other cars, it really gets scary.
from CTI Consulting http://ift.tt/2cBroQ6
via IFTTT

State admits: ISIS terrorists trying to pose as refugees

No kidding, vetting will never be an exact process, but vetting of people from Syria is even harder. ISIS as well as other bad guys have had access to both records storage, what there is of them, and records makeup and processing. That is how known terrorists keep getting into the EU, and yes into the USA. It is getting harder with so many biometrics being used for passports and other ID. But if you travel a lot, you know that you can often find port's of entry that only have visible verification of passport photos. Then you have entry via Canada and Mexico that can be used. While working for the Palistinians, they wanted to make their own passports, so they contacted a company that said they sell to the USA, that is the one they wanted. I looked at it, it had smart chip capability, and most of our security features. In the end they used EU grant money to order them. I was working for our USAID, so left shortly after Hamas gained control of the Gaza Strip. I never saw the finished product.
from CTI Consulting http://ift.tt/2cVeNXB
via IFTTT

Tuesday, September 20, 2016

New York bombing: Suspect Ahmad Rahami 'may have been radicalised after visiting Afghanistan', as video emerges of him dragging bag in Chelsea

It is being reported that the explosive used was HMTD or Hexamethylene triperoxide diamine (HMTD) is a high explosive organic compound, it normally would require a bit more training to make, and it is a lot more powerful than the burning powers used in the Boston Marathon Bombing. Still there are some questions, HMTD can be set off with a Christmas bulb light, but normally a bomber would not count on it. But that could also be the reason so many of his bombs did not go off. The other questions would be why there was not more damage to the plastic trash can down on the New Jersey shore. Not to mention this stuff can go off if you drop it, so why did not the one bomb that went off, set the others off. As I said questions still are out there. For the bomb in New York that did go off, burning powders would not have sent the metal trash dumpster over a hundred feet though the air, but if made correctly the HMTD if made correctly could have. Still questions of why we did not see fragmentation holes in the trash can. It is possible the trash can was thrown because the device was set outside the dumpster, I still would have expected more ripping and fragmentation holes in it. HMTP can have very different effects depending on how and when it was made. It does not store well, and is very dangerous to make, so it often is not made correctly, causing different levels of explosive power. TATP is usually a more effective home made explosive, as we saw in Paris and Brussels. But he may not have been able to get the training on it. It is known the bomb trainer for the Paris bomber was killed a few years ago, so perhaps the person available to train this bomber was more familiar with HMTD. AQ has a bomb manual available on line in both English and other language's, it describes making both of the peroxide based explosives. So the bomber can have read the manual which is dangerous since it like the Inspire Magazine are not real clear on the dangers of letting the cooling of certain steps vary by a few degrees or time, of making the explosive, and can both detonate or not work in the end.
from CTI Consulting http://ift.tt/2cJRG5z
via IFTTT

A timeline of Edward Snowden leaks - Business Insider

Information we should all know, only because that Snowden has already told the rest of the world. I personally have no problem with what the NSA does, or the rest of our intelligence folks do. I do know China, Russia, even Israel is trying to do the same to us. Germany with all its crying over what we got from her phone, is trying just as hard to get our phones as well. Hillary's misuse of email and phone had to be a laugh to the rest of the world, elitists like her just do not seem to think anyone would dare go after her, or her husband, which just makes it all so easy for the opposition. Many Globalists think this is a good thing we all know what the other guy is doing, yet cry foul when our Government does it. For some reason the public does not seem to have a real problem with Facebook, Google and others to have vast amounts of data, which they admit they sell constantly, yet worry about our Government, yes there are bad guys in our Government, but I know a lot of them have been caught, and truly dealt with. It is funny that when Government data is used even against bad guys illegally, the data is thrown out, but never mind, please read this article, it is eye opening, even as little as there is so far. But know this when Snowden went to China, they did steal it all from him, so they have the data, the same with Russia, they have all the data. Right now we are the ones that do not know what all he has given them, and that is a bad thing.
from CTI Consulting http://ift.tt/2cDUuOn
via IFTTT

An unassuming life before a suspect’s rampage in a Minnesota mall - The Washington Post

Securitas Security Services was the firm that employed Adan as a Security Guard, that makes another of the worlds largest security companies that have had terrorists in their ranks. After the Pulse shooting the ISIS/AQ put out a 4 page supplement magazine praising the terrorist for joining a Security Guard Company. So I would expect a lot of want to be terrorists joining the ranks of Security Companies in the future, if they have not already. The Federal Government needs to develop a way to help these companies to vet their recruits.
from CTI Consulting http://ift.tt/2cZEECK
via IFTTT

Monday, September 19, 2016

CNN - Breaking News, Latest News and Videos

TrentonScottH : New York, New Jersey bombings: Suspect in custody after shootout with police, sources say - https://t.co/atg7wV1xBh https://t.co/O7wLkvAOPj
from CTI Consulting http://www.cnn.com/
via IFTTT

NY, NJ bombings: Same man wanted; terror cell likely involved, officials say

TrentonScottH : New York, New Jersey bombings: Suspect in custody after shootout with police, sources say - https://t.co/atg7wV1xBh https://t.co/O7wLkvAOPj
from CTI Consulting http://ift.tt/2cKtkbZ
via IFTTT

Chelsea bomb suspect caught after shootout with cops

Good work all Law Enforcement involved
from CTI Consulting http://nyp.st/2cyaoKE
via IFTTT

Ahmad Rahami sued local police in New Jersey | Daily Mail Online

The suspect in the recent bombings had an ongoing legal action with the Local Police and Local Community, claiming that the early closure of their restaurant was anti Islam. Locals claim it was a noise issue after 10 PM. With that going on local police had a pretty much hands off approach to the Suspect, and his family. A family member or members was stopped coming across the bridge from NY to NJ, this is what led to this suspect being developed. It maybe the last set of bombs was the last of his bombs as he prepared to run. At least that is the hope. The bombs used look to be directly developed from the Guidance gained from the first Inspire Magazine. On page 40 it describes the pipe bombs, a few pages later is describes the pressure cooker bomb. The use of the trash containers usage in virtually all the bombs is a normal situation for bomber as well.
from CTI Consulting http://ift.tt/2cKkqex
via IFTTT

FBI putting out wanted poster for suspect in Chelsea bombing, ABC News reports

TrentonScottH : RT @ABC7NY: More details about the search for Ahmad Khan Rahami https://t.co/uDgjrkYmxl
from CTI Consulting http://ift.tt/2cKIWdV
via IFTTT

Sunday, September 18, 2016

UPDATED WITH PHOTO: Fox Reports Second Device in New York City is Likely Pressure Cooker Bomb

Weekend Update, The pipe bombs in New Jersey are being reported to be black powder devices, three wired together only one went off. If you look on page 40 of the 1st edition of the Inspire magazine there is a picture of three pipe bombs wired together. If you flip through a few more pages you will see a pressure cooker bomb, so it would appear the bomber is a reader of Inspire. The second device appears to be wired to a cell phone, which makes working on the bomb a bit of a problem if people can see people working on the device. One phone call can set it off, so bomb tech's are very careful working around them. We really need more information on the devices found, at this point I am getting counterpointing info on all of them.
from CTI Consulting http://ift.tt/2d9MmcK
via IFTTT

Saturday, September 17, 2016

Fox News on Twitter

TrentonScottH : RT @FoxNews: Reports: 2nd device had cell phone attached to it. #Manhattan #Chelsea #ChelseaExplosion https://t.co/81u4ZY20bJ
from CTI Consulting https://twitter.com/FoxNews/status/777369343877222400/photo/1
via IFTTT

New York explosion leaves dozens injured

TrentonScottH : RT @cnnbrk: At least 29 people hurt in NYC explosion; 24 of them have been hospitalized, officials say. https://t.co/LNAJBK7PjT https://t.co/vfnB3kJYqu
from CTI Consulting http://ift.tt/2cSBTjM
via IFTTT

Twitter / ?

TrentonScottH : RT @cnnbrk: 2nd device found near area of New York explosion appears to be a pressure cooker with wires, officials say. https://t.co/LNAJBK7PjT
from CTI Consulting https://t.co/LNAJB
via IFTTT

Authorities Investigate Explosion in Manhattan - The New York Times

This is early stages, something looks like it may have exploded in New York City. From the one picture available it would look to be a low explosive or burning type of device or even just something that went bang, we will stay up on it..
from CTI Consulting http://ift.tt/2cIKdjM
via IFTTT

Bomb explodes near Marine Corps race in New Jersey - CNN.com

In one of the first issues of the AQ magazine Inspire, it tells how to make simple pipe bombs as did the Anarchists Cook Book of the 70's. Using what can be found and bought for less than 10$ at any dollar store. It is interesting that we have available to us in the US access to fireworks in many of our states. The bombs made for and detonated at the Boston Marathon where made of products bought at a fireworks stand for less than 50$. Even more interesting is that in another Inspire magazine the subject of fire bombs comes up. With the price of oil and gas so low, many very effective fire bombs can be made for less than 5$ each. Their effectiveness can be much worse than a pipe bomb or even AK-47 in the hands of a Terrorist, disgruntled employee, or person with a mental defect that causes them to strike out at us. Perhaps our best defense at the moment is to understand how to fight fires with what is available. It may even be time to spend a little on the purchase of fire extinguishers. We must prepare for what ever comes at us next, we must be aware of what the planning stages of the bad guys are and detect them before they attack. More and more Police and Security Departments are being taught to detect attacks prior to the event. We all need to be the eyes and ears to help them detect the bad guys sooner.
from CTI Consulting http://ift.tt/2cSQoXt
via IFTTT

Device Explodes at Marine Race on Jersey Shore: Police | NBC New York

Pipe bombs are extremely easy to make and for the most part in the USA not all that effective, but can be very lethal if they are nearby crowds of people. The pressure cooker bomb used at the Boston Marathon was basically a pipe bomb. Like apparently this one, was made of a very low power burning powders, not high explosives. Still the Boston Bombs did kill and injure people near them. If you have ever been to one of my bomb classes either for the ATAP program for the State Department a while ago or for http://ift.tt/2cHMThO , the use of trash cans to hide these devices is often used. If you watch someone carefully put a package or bag in a trash can, please report it. Normally people just throw things in trash cans, but bombers need to be much more careful for fear it would go off. So the next time you see someone taking great care to put a package in a trash can please report, the lives you could save thank you, including me.
from CTI Consulting http://ift.tt/2cx8PBP
via IFTTT

Friday, September 16, 2016

US destroys 'Islamic State' chemical weapons plant in Iraq | News | DW.COM | 13.09.2016

We all need to be aware of these types of attacks. Weaponised Chlorine is very dangerous, and not that hard to make from bulk liquid chlorine which is readily available for theft or diversion in the USA. Mustered gas would be harder to make here in the USA, but it is possible. Cholorine is still used in many of our Water Plants in the USA, it has required enhanced security as well as enhanced communications capabilities to warn surrounding communities of these plants. One of the vulnerabilities not addressed fully has been the transport of the Gas Cylinders to the water plants, often these transports have more chlorine cylinders than used at the plants. One well planned traffic accident in the middle of a city could be devastating. Many of our Hospitals are not ready to handle mass casualties of this type.
from CTI Consulting http://ift.tt/2d3JE5x
via IFTTT

Thursday, September 15, 2016

Bomb Dogs Failed Dozens of Tests at 10 Large U.S. Airports - NBC News

Bomb dog testing, is a very complex business. If you add to this the additional complex scents of TATP and other homemade bomb fillers, it make the job even tougher. Another problem is that it is true the K-9 teams are being used more and more, this takes a toll on both the handler and the dogs. But it also limits training time, which is crucial to maintain the ability of the K-9 team. Bomb dogs are playing a game, when the game is not fun anymore they become less effective, in many cases the handler is the only one that can really tell if the dog is working effectively. The supervisors of the K-9 Units often to not under the needs and limitations of the teams that they supervise. So mix this all together and you have a complex system that is effected by little things, like not separating the training aids from each other all the time, from having the handlers scent on the training aids, even little errors in these things can effect the quality of the training the K-9 teams get, which effects their effectiveness. I suggest everyone take a step back from the negatives here,K-9's are still one of the most effective bomb detection programs available. Even at over 50% testing results, they still are some of the best chances in finding bombs. We need to better understand the attackers and their methods of operations, if we keep relying on detection of bombs at the point of attack, we will never get ahead of the Terrorist attack cycles. .
from CTI Consulting http://ift.tt/2cXA6gk
via IFTTT

LEAKED: Take a peek inside the Clinton campaign’s “hospital on wheels” | Channel 7 News

Someone seems to think a lot of medical help is going to be needed.
from CTI Consulting http://ift.tt/2cLKYJJ
via IFTTT

Wednesday, September 14, 2016

Choudary's Junk Justice Sentencing

Sentences like this just have the Terrorists laughing at us. This does not deter terrorism, it makes it grow. Having served time increases a terrorist's status. This was a really bad move on the part of British justice.
from CTI Consulting http://ift.tt/2cESyIZ
via IFTTT

Suing Journalists in Mexico

Another method to threatened the Press, Mexico has still not figured out that to win against corruption the Press needs a free hand to investigate and report their findings. This type of action by the Government of Mexico just shows how fearful they are of being exposed for the rampant corruption that exists in the operation of Mexico's Government.
from CTI Consulting http://ift.tt/2ct8bkN
via IFTTT

Sunday, September 11, 2016

Secret Service followed atypical protocol with Clinton’s early departure from Sunday 9/11 event - The Washington Post

I think the US Secret Service did a excellent job, these type of problems can not always be planned for exactly and the adhoc moves of the Agents covered the situation very well. The only protocol that counts in events like this, is that the Protectee is covered and secure. She was, and was in good hands, moving to keep negative press reporting at a minimum, looking out for Ms. Clinton both as physical protection and her message or brand protection. I hope she shows them the thanks and respect they deserve.
from CTI Consulting http://ift.tt/2ch3idk
via IFTTT

France's premier warns of new attacks, 15,000 people on police radar

It would appear that we have made it thru another 911 with out an incident, but lest we forget, there are more radical Islamic terrorists now that ever in our history. We need to stay aware of what is going on around us as we move through our lives. ,
from CTI Consulting http://ift.tt/2chAn9W
via IFTTT

Friday, September 9, 2016

Pay your respects during these 9/11 remembrance events in NYC

As CTI prepares to teach a bomb class to a group of ESI students, it must be remembered that on this 15th anniversary of the 911 attack, former ESI Students are working all over the world to protect clients and you, as well as I, from terrorist attacks. We are trying to remember correctly, but I think this is the third year in a row, and there have been other years that I have been standing in front of an ESI class on 9/11, it is indeed an honor and I look forward to another class of professionals going out to protect our world from these bad guys.
from CTI Consulting http://ift.tt/2bZ2tEN
via IFTTT

Records Show Obama Hired Behavioral Experts to Expand Use of Govt. Programs - Judicial Watch

This came out a year ago or such, it was called the nudge program inside the White House, one of its targets was Obama Care when it was not going well. It uses technology like NLP or nuro linguistics programming. Which you can get more information on line on. Part of it used the same techniques that Advertisers used and where outlawed in the 70's when TV networks had been found letting them be used during normal programming. Other techniques used in the Nudge programming dealt with the way forms are worded so that people would just check boxes because they looked harmless. There is a post on the nudge program in our Blog The Philosophy of Security. www.ctic.co it was over a year ago, but the search word nudge should bring it up.
from CTI Consulting http://ift.tt/2cfSsnf
via IFTTT

Thursday, September 8, 2016

Was Hillary Wearing an Earpiece During Last Night's Presidential Forum? » Alex Jones' Infowars: There's a war on for your mind!

NYPD Liaison folks admitted she was wearing a ear piece, that allowed her to get help from her staff, like many actors use to keep their lines straight. Most news anchors have these capabilities, which is how they can sound so in touch with what is going on. This device would have a limited range, but at the size, I am pretty sure it is not encrypted, so anyone with a small receiver tuned to the same frequency around her, could hear what was being said to her. Now there is a recording I would love to hear. I am sure any spy agency worth their pay, would be listening in on the next time she uses it, if they have not already. Normally there are only 9 or so Frequencies set aside for this type of use, so it would not be hard to pick it up quickly.
from CTI Consulting http://ift.tt/2bW8JSz
via IFTTT

Inside the Ring: Clinton email compromised in hostile cyberattacks - Washington Times

The underlying story here is one we all need to pay attention to, it is not just your email account that is at risk, and can be compromised, but also the receiver or senders of emails you are corresponding with. It is truly the weakest link problem, and since we do not know what security levels the people we are corresponding with have on their systems, we must always assume the worst, and treat our emails with the proper caution. If you add to this the very real problem that none of us could probably handle a concentrated attack of our cyber systems, as we have seen from many of our Government Agencies that have been compromised, a lot of what we send, do, and store is at risk. It would be a good idea to do a quick risk analysis of our Cyber Foot Print, assuming the worst and they see where we stand. It is a difficult problem to deal with, but if you assume the worst, at least you know what may be available to outsiders, and I suggest we all need to do this to get a real idea of what our vulnerabilities are.
from CTI Consulting http://ift.tt/2bUN4Kw
via IFTTT

Corporate Crisis Management Training from ESI

Once again I have the honor of teaching the TSCM with an overview of Cyber Spying for the ESI Corporate Crisis Management Program. This is aimed at EP and Corporate Security teams allowing them to do basic TSCM, to include Cyber Spying searches, or to be a knowledgeable part of a full scale TSCM team. Every EP and Corporate Security team, needs to be able to both conduct basic searches, as well as recognize the threat of Espionage attempts on their clients.
from CTI Consulting http://ift.tt/2clpkQk
via IFTTT

Wednesday, September 7, 2016

I have the honor of teaching and advanced bomb class for ESI this weekend. We will be covering bombs used for assassinations, with a nod to the use of Vehicle Bombs, how they can be used and how to counter them. I hope to see you there.


via CTI Consulting http://ift.tt/2cj2Z65

Vuelven extorsiones de federales

This article translates, Extortion by Federal Police in Mexico is not new, but it does usually correspond with an increase in violence. Please be careful, victims are so intimidated, they are afraid to try and get identifying data on the extortion police officer. We all need to stay aware of these bad guys. It is just one more instance of the Government of Mexico being out of control.
from CTI Consulting http://ift.tt/2c6OrC3
via IFTTT

Arrests made after car containing gas cylinders found near Paris's Notre Dame - France 24

TrentonScottH : RT @FranceinSD: Arrests made after car containing gas cylinders found near Paris's Notre Dame https://t.co/8WfimScBMM #France #news
from CTI Consulting http://ift.tt/2c4QmbA
via IFTTT

Car packed with explosives found outside Paris's Notre Dame cathedral | Daily Mail Online

At best This was a scare, a test run does not leave evidence of the plot, in this case the car was left with the hazard flashers on, the propane gas cylinders are not explosive by themselves
from CTI Consulting http://ift.tt/2cFNBBp
via IFTTT

Tuesday, September 6, 2016

Islamic State issues new call for attacks in the West, all non-believers 'legitimate targets' • The Foreign Desk

It basically calls for expanding the net of acceptable targets, from street vendors selling flowers to people having fun in a park. Nothing really earth shattering, but each time they identify other targets the little lone rat's as our FBI Director calls them down in their basements typing on their computers visiting radical websites, have another target that they can fix their little minds around. As protectors we need to stay on top of these terrorist propaganda pieces, so we have a better idea of what to expect next. So far every terrorist attack has used guidance given in these propaganda rags in one form or another.
from CTI Consulting http://ift.tt/2bQzRSY
via IFTTT

I had the honor last week of speaking at the Mission Texas, Rotary Club luncheon. Using security awareness and behavior analysis to prevent being a "sitting duck." was the topic. Good afternoon, Rotarians.Please join us at noon on Thursday at Las Molcas Restaurant on Conway and 6th Street for our weekly Rotary Meeting.This week, we will have Rich Roth, Executive Director and Chief Operating Officer for CTI Consulting. His extensive experience in security provides him with tremendous expertise in his field. His topic will be Personal Safety in any Situation: Using security awareness and behavior analysis to prevent being a "sitting duck." His Bio is attached for your reference. If you need a speaker for your next event, please contact CTI, for speaker availability. So your not the sitting duck at the next Terrorist Attack.


via CTI Consulting http://ift.tt/2bVIR7Y

Monday, September 5, 2016

FBI — Elicitation Techniques

Every Corporation, Executive Protection Team, as well as every Guard Force , should supply this brochure to their staff. I have a version of this that came out of a Chinese Espionage Training Manual in English, with all the grammar mistakes that come with it, that is almost word for word, but coming from the Positive side of the problem.. Learning how to recognize when someone , Espionage , Terrorists doing surveillance,is trying to get information for an attack or event of some type, is something we all should be aware of. The bad guys are trained to use Elicitation Techniques to gain insight into our security posture at critical sites, as well as gain Espionage knowledge of who to target and how. We need to recognize when some one is using these techniques on us.
from CTI Consulting http://ift.tt/2bYRoEp
via IFTTT

Sunday, September 4, 2016

Shootouts in Mexico Border City Kill 11, Including Bystander

Here is the big problem for those who claim cartel violence is drug on drug crime, no innocents get harmed, they do. It is actual death, but also intimidation and extortion. These crimes run rampant where ever the Cartels are operating, which in the USA is virtually every city. But the key crimes happen in major cities and in the border cities. Where the Political folks turn a blind eye to the Cartels, as long as they keep spending money on houses and bars, restaurants, car's, even funding businesses. If you look just over the border you will find ghost towns that thought they would take the cartels money for a while, and then found they could not stop. You either don't do business with them or you get caught in their corruption. But like the corrupt Federal, State, and Local officials in Mexico, local government officials in the border are at best turning a blind eye to the Cartels, or being part of the problem.
from CTI Consulting http://ift.tt/2cc1tBu
via IFTTT

Saturday, September 3, 2016

LAAPOA Statement on LAX Shooter Paul Ciancia's Plea Deal

We often have moved on to another story in situations like this, in this case it is good to see the attacker has been convicted. Thanks for posting this, and may we all remember the brave LAXPD officers that went up against this individual armed with a long gun, ,with their side arms.
from CTI Consulting http://ift.tt/2ccIKnO
via IFTTT

Friday, September 2, 2016

Media – Lloyd Figgins Ltd.

Great Info here, one of those must read pieces. More can be found on his site, and also on the CTI site with articles on keeping yourself safe listed here, like this one :http://ift.tt/YJj46f We need to take a more active role in our own safety. Contact CTI for classes that can help your family or group to be a little more ready to handle situations like this.
from CTI Consulting http://ift.tt/2cxgFe8
via IFTTT

The FBI is developing thru a consultant what they are describing Identifying Warning Behaviors of the Individual Terrorist . As they are quick to point out its still in a research stage. But the first warning behavior they call: 1.Pathway warning behavior—any behavior that is part of research, planning, preparation, or implementation of an attack (Calhoun&Weston,2003;Fein& Vossekuil,1998a,1998b,1999). Which encompasses most of what CTI teaches in detecting terrorists during their pre event stages. The paper goes on to discuss 7 other warning behaviors. But they are aligned more with delving into an identified suspect. Still the warning behaviors are well worth the read.


via CTI Consulting http://ift.tt/2bZ0MuH

Jeff

The FBI listed this as the number one mobile security issue, in one meeting I was in the Cyber Guy from the FBI listed his phone's tether as a often used AT&T hot spot name. About 5 min in he started reading off all the cell phones and tablets that had automatically logged on to his phone. Try it sometime, when boarding a plane, you will get a lot of users very quickly, and in you are using Fing, you can find out a lot about each of them. Here is another test you can do. Check your phone and tablet to see if your blue tooth or wifi come on when you did not turn them on. Many phones and tablets have been hacked, or even you put a default on your own phone that allows this to happen. Check periodically, and then search for the app that is allowing it, or check for a hack.
from CTI Consulting http://ift.tt/2c78UK0
via IFTTT

Thursday, September 1, 2016

Wireless Security Alert System

Great alarm to provide coverage for stairwells, cars parked out of sight, or just for hallways outside the protectee's suite, reading out at the command center or your room. At less than 20 bucks a good addition to your go bag. 400 feet range for the alarm to read out.
from CTI Consulting http://ift.tt/1sexr4n
via IFTTT

1250 lb. Capacity Vehicle Positioning Wheel Dolly

At less than 70 dollars each, 4 of these can give executive protection teams an edge in moving either suspect vehicle's or just vehicles that are in the way. Used all over the world for moving locked cars with the wheels locked as well. It is a cost, around 280 dollars for four but are worth a lot more. Normal price is over 400 dollars.
from CTI Consulting http://ift.tt/2cbq1HO
via IFTTT