Tuesday, January 31, 2017

Mechanic finds 31 pounds of cocaine hidden in nose of American Airlines plane | American Airlines | Dallas News

This is bad, very bad, 31 pounds of cocaine hidden in an area of the plane only mechanics could have accessed. If you look at the pictures it is 5 bricks of cocaine. Now if you stop for a second and change the cocaine to explosives, then you have enough to blow the plane out of the sky, with out a doubt. With all the security we have at airports, all over the world, and the higher security on any plane traveling to the USA, how does this happen and almost monthly if not weekly this keeps happening. Insider threats, in this case some mechanic with access to the plane was able to install a huge amount of drugs, but could have just as well been explosives. This is an issue that we are all still trying to get a fix for.
from CTI Consulting http://ift.tt/2kLqyI1

Hackers Hold Entire Hotel for Ransom, Trap Guests in Rooms

I hope this gets a lot of play, it is the first time I have heard of this happening, but conceivably it can happen to a number of hotels. Locking people out of their rooms is doable at almost all hotels, locking them in, now that would be almost impossible at most hotel, in fact the vast majority of them.
from CTI Consulting http://ift.tt/2kcCXSg

Monday, January 30, 2017

Don't Be Tricked by This "Can You Hear Me?" Robo-Call Scam

TrentonScottH : Don't Be Tricked by This "Can You Hear Me?" Robo-Call Scam https://t.co/Q7Q1X8pcXT
from CTI Consulting http://ift.tt/2jNFbGY

Saturday, January 28, 2017

Fears grow over jihadist cyber threat

Ukraine seems to be a testing ground for Government sponsored Cyber attacks. Teams of Hackers are forming mercenary forces that are for sale to the highest bidder, it is getting to be a lot like mercenary military forces that ravaged Africa in the 60's through the 80's. It allows for Governments to hire these teams and keep their actions at arms lengths. ISIS is just another client to these guys, and this could become nasty very quickly. Other factors are wanna be Jihadists lone wolf types that are not bomb makers or shooters, they make their mark by creating havoc with Cyber attacks. It could be a long year, IoT or the Internet of Things are making the problem much worse since most of the devices have little or no security.
from CTI Consulting http://ift.tt/2kdDV2W

Hackers hit D.C. police closed-circuit camera network, city officials disclose - The Washington Post

Cameras and the NVR's they are connected to are vulnerabilities that are hard to fix. The best recommendation for any system is to separate it from the rest of your network. The back door's to many cameras are hard wired, and really can never be fixed. The Cartels along the Mexican boarder are into most of the Government Network, using cameras, and they are getting more and more control of cameras and network's on the USA side of the border as well.
from CTI Consulting http://ift.tt/2kd3NMt

Hackers hit D.C. police closed-circuit camera network, city officials disclose

TrentonScottH : 70% of DC police CCTV system's networked video devices infected with Ransomware prior to inauguration #Security https://t.co/jhWqdmncnR
from CTI Consulting http://ift.tt/2jBHuik

Thursday, January 26, 2017

The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015

The DOJ had a study done on the role of social media has in developing violent extremism in the USA, once again well researched and is well worth the read.
from CTI Consulting http://ift.tt/2ju9Jja

A Behavioral Study of the Radicalization Trajectories of American “Homegrown” Al Qaeda-Inspired Terrorist Offenders

DOJ has come out with a number of studies that may help Security and Police to understand how Lone Wolf or Homegrown Terrorists tend to develop. This is a very well researched document that all in the Security field should read.
from CTI Consulting http://ift.tt/2jBSPNg

NTT Security SERT Q4 16 Threat Intelligence Report | NTT Security Blog

If you are going to stay on top of what is going on in the Cyber Security arena, this is a must read report. It tracks trends and highlights new threats.
from CTI Consulting http://ift.tt/2jVz7gp

Fingerprint tech steps up -- FCW

This is very forward thinking and research into, in this case finger print biometrics, but I am sure will branch out to other biometric markers. DNA being one of the most critical at this time. Using technology to alter or provide fingerprints on items that the person never touched has been around for a while, mainly seen in government clandestine events, but is making it's way into the terrorist and plain criminal elements. Touch less fingerprinting has been around for a few years in government circles, but now has made it into the public sector. Using video even pictures of people to get their finger prints has been possible for over 5 years, at least. N2N or nail to nail fingerprints turn out to be harder to exploit but there really is no standard for the taking of the prints this way yet, but is coming, so finger print companies get ready. Back to DNA, it is an up and coming biometric marker that is getting closer and closer to be ready for on the fly determination of a person, but a number of countries have been working on ways to both mask DNS (makes it harder to get the proper data points to pin point one person from another, to the alteration of DNA, very spooky stuff. The US, Russia and others are working on this type of DNA spoofing, but Israel has had a number of high level papers published on the subject, and they have made great strides in spoofing and masking DNA samples. DARPA had the largest group of biometric testing for forensics, but it looks like a new kid on the block maybe the folks to watch. IARPA's Odin program is offering funding and testing of technologies that can mask or spoof Biometrics.
from CTI Consulting http://ift.tt/2k4RVM7

For national security, Trump gets a new secure 'smartphone' | ZDNet

Interesting to see that the Blackberry is no longer the POTUS phone of choice by his security handlers.
from CTI Consulting http://ift.tt/2k3IufY

FCC warns of national security risks from IoT, private networks

In Security we always say, your security is only as good as your weakest link, Let me introduce you to your weakest cyber security link, the Internet of Things or IoT. Let me explain how this works, or is working. You buy a cheap thermostat that allows you to control the temperature of your home or office, from your android or I phone. Now comes the start of the Espionage attack, the thermostat has a very small program inside it to allow all the communications to happen. the small program like most IoT devices has very little room for any security protocol's. So now all that security you put on your home or office computer network, is gone with a cyber attack on your neat whizzbang thermostat that you just had to have so you could control the temperature via your phone. Now that I have the password to your home or office router, I am into your system. But not only do I have access to your home or office network, I have access to your phone you used to check the temperature. Now this could happen to virtually any of your IoT devices, CCTV cameras, your Smart TV, your inexpensive router, or even your Smart Refrigerator or Smart Scale you use in the morning to check your weight. If you stop by your local hardware store, you can find IoT devices everywhere, from the Smart locks for your home or office, even the Smart light bulbs that allow you though your phone to change the light levels in your home or office. Now think, to make all these devices inexpensive enough for you to buy, they have very little in the way of security, and since they want anyone to be able to install them, they are made to link to your home or office network quickly and easily, which means even less security. Now your computer is compromised as well as your phone, so the bad guys have access to your bank codes, if you use your laptop to communicate with the office, or if you have a contract with the US Government, the bad guys now have your access codes to those computer systems as well. Your weakest link, is now the weakest link of one of our Government Agencies. All this because you wanted to change the temperature of your home with your phone. Chinese products like cheap CCTV cameras, have over 80% of the market share of cameras sold, they also have more security vulnerabilities built into them than any other product. China has built espionage back doors into a great number of them, if not all of them. Some act like the cheap smart phones the Chinese have flooded our markets with, and send messages like the codes to your routers out to specific collection servers both here and in China, the phones are known to send out messages every 15 min. One message they send are a list of all the IoT devices integrated into your home or office. Once they have these then even if you change the phone to a more secure one, they can still get back into your system. The USA Chamber of Commerce was hit a few years ago, and teams of Government Cyber Security Specialists came into to help them clean out the problems. It took a little time, but they thought they had them all, and left. Two weeks later the entire computer network was compromised again. The teams came back and spent even more time clearing out the system, in the end they found a Smart Thermostat and a cheap all in one printer where hard wired to leak router codes that let the Chinese back into the system. The thermostat was built in China, but the printer was not. Further testing of the printer showed the scanner assembly of the American printer was made in China, and that is where they hid another hard wired espionage device. As you read this article one thing will show up time and time again, and that is most of these vulnerabilities we have bought and brought into our homes and offices. All the bad guys have to do is exploit the vulnerabilities of our IoT weakest links.
from CTI Consulting http://ift.tt/2k3sjPZ

Wednesday, January 25, 2017

Study: 2016's Most Commonly Used Passwords Not Secure Enough | Androidheadlines.com

TrentonScottH : RT @keepersecurity: The top 25 most common #passwords of 2016 are a security risk. https://t.co/dp78SUenHF #cybersecurity #hacked #passwordmanager
from CTI Consulting http://ift.tt/2iOR1yX

Tuesday, January 24, 2017

How to Opt Out of the Most Popular People Search Sites

TrentonScottH : Time to start protecting your online privacy by opting out of people searches. https://t.co/9CNaVqfLQ4
from CTI Consulting http://ift.tt/2kcZYnW

The Baffling Master Plan of the French Truck Terrorist

TrentonScottH : A long read, but a window into the mind of the Bastille Day truck driver inspired by ISIS. #terrorism https://t.co/2yIBDFi9sV
from CTI Consulting http://ift.tt/2j1gPNB


Many Apple users are very wary of upgrading their systems due to issues in the past with compatibility and losing some features they like, but the security issues with the old operating systems are real, and these updates close many of them.
from CTI Consulting http://ift.tt/2kleNIp

Nigeria: Babies used in suicide bombings, officials warn - BBC News

Here is a another twist on suicide bombings, two women had been stopped at a checkpoint for further search and detonated their bombs then, two other women carrying babies had been let through and went on to detonate their bombs at their intended targets. You always have to think about what your biases are and how they are effecting your work, in this case, the thought that no mother would carry their babies to certain death, was a bias that got them to let the women through, but also look at the fact that two women without babies when detained for a further look detonated and killed the guards. Suicide bombers are some of the most difficult to deal with, like many security problems they do not always stand out in ways that are easy to notice. It requires very good situational awareness and a mental attitude that is always trying to keep your self protected as much as possible. Surviving a suicide bombers blast is possible, the key as always is distance even a few feet and shrapnel protection like standing behind of next to something that will shield you from the shrapnel as much as possible. Another key is not having more that one person close to the possible suspect, so if the worst happens only one individual is wounded or killed. If you are working Nigeria, remember to keep you intelligence up to speed, so that once this happens the next time they try it, your team has been warned. When the TSA was started one of the goals was to have every one working at the TSA to have new threat data as quickly as possible, this included x-ray images of suspect devices. The thought was that in As Qada type attacks the bad guys would try multiple attacks at pretty much the same time. Like the 911 attacks all had been planned to be a closed to each other in time as possible, so that the reactions of the aviation industry could not catch up in time. As it was, the plane that crashed into the field in Pennsylvania was due to the passengers on board knowing what had happen on other flights. What a lot of folks do not know is that the other planes all over the USA and the world Pilots and crews started taking actions to protect themselves and their passengers from the style of attacks used on the first 4 flights.
from CTI Consulting http://ift.tt/2jL0Ccu

Thursday, January 19, 2017

Grassroots Terrorism in 2017: A Small but Stubborn Threat | Stratfor

This is an excellent view into the new year provided by Stratfor, I do not agree with all there assessments, but they do have a lot more resources and folks with a lot of expertise, so I do take in what they say with a lot of weight. In any case it gets you a free look at a very well done analysis of the threats we may be facing going into 2017
from CTI Consulting http://ift.tt/2jcYY1S

CREST: 25-Year Program Archive | CIA FOIA (foia.cia.gov)

Everything you ever wanted to know about the CIA, ok ok, not everything, but this is quite a document dump and resource. Not sure why it happen but lots of good research articles here that you can look at for now.
from CTI Consulting http://ift.tt/2ez164N

Covering a Dangerous Risk - Risk & Insurance : Risk & Insurance

K&R insurance is gaining a larger part of a companies overseas and in some cases even domestic security program. This is a great article on the subject, and it points out you get a lot more than insurance from most companies, you get intel, you get a risk assessment of your company as well. But not mentioned here as much is that you the company and or the person covered have to have a protection plan, often not much more that a good alarm and locking system, with maybe a safe room, but if the threat is high enough, then you also must have upgraded vehicles, training in security awareness for the person and his family and staff, perhaps even weapons training and it can go as high as a number of bodyguards. In other words if they are going to insure you, then they want you protected, which to me is good business, but to many looking for K&R insurance, is not what they expected or even bargained for. Most thought they just now had funds to pay off a kidnapper. I have even talked to up and coming executives that thought their American Express Gold card provided that type of coverage to them. In many cases midlevel employees are not told much about what K&R insurance the firms has, they have found that when they get into a bar and mention how much insurance that they have or think they have the kidnappers target them. All they know is that they receive these briefings and training, and wow that is neat. If you are put on an EP team (Executive Protection) this is also a good article to read, so you know where you actually fit in the picture at anyone time.
from CTI Consulting http://ift.tt/2jCfLiI

Peace sign selfies could let hackers copy your fingerprints

I always find it interesting when researchers stumble on ways the governments around the world have been getting finger prints for years, at least that is what the leakers say. Getting finger prints off of photos and even video has been around for a while, but this article puts it out in the open. Take it to the next step and you can see where it is possible to get finger prints off of photos of a window, and other items in a photo. It mentions that a "researcher" took a picture of Angela Merkel and made a copy of her eye to fool optical scanners, and it worked in testing, the DARPA folks have figured that one out long ago. Pictures have been used to beat facial recognition systems as well. This takes it well beyond the gummy bear finger print spoofer the Japanese Professor taught his students to beat finger print readers. It also should be remembered that vendors of finger print readers have already had liveness tests for their reader. Most did what this article talks about, looking for body heat and even blood flow in the finger using the reader. It turns out a little moisture on the gummy bear type of attack, lets the finger print reader, see the persons finger pressing down the gummy bear as a live finger print. So that one has been beat already. Now vendors will tell you that they can eliminate or at least cut down these fraudulent attempts at beating their systems, and they can to some extent, but when they put the bio-metric readers at a high enough, for lack of a better term sensitivity, they tend to not let people it should in, and that causes the system users to reduce sensitivity, so more people can actually use the systems. In one system test for a government agency they reduced the fault rate as they are called enough, that a number of my employees could enter the system under one persons bio metric signature. Which since it is mainly a time and attendance system, it was not a huge security risk.
from CTI Consulting http://ift.tt/2jmEZP5

Wednesday, January 18, 2017

'This is the World We Live in Now': New Bomb Threats Against Jewish Community Centers Across US Raise Alarms | NBC Bay Area

As long as the threats provoke large scale actions by the people getting them, they will continue. We all need to understand that handling bomb threats can be taught and they can be handled effectively, with out putting people in unneeded danger. CTI has taught classes all over the world, and we can teach your firm as well, or government agency.
from CTI Consulting http://ift.tt/2jxmZ7A

Understanding The Brain = Supporting National Security | Armed with Science

Good article to read, this is leading edge stuff that can make life a bit different for people involved in security work.
from CTI Consulting http://ift.tt/2jzKjO9

Sinister Shock: ONR Researcher Studies How Explosive Shock Waves Harm the Brain | Armed with Science

New studies on how bomb blasts can harm the brain. Good info to have when dealing with the aftermaths of explosions.
from CTI Consulting http://ift.tt/1WbW8re

FEMA - Emergency Management Institute (EMI) Course | IS-120.A: An Introduction to Exercises

For anyone planning an event, or want to test your security plans, here is a course that will give you a skill that is used by Police, Airports and Federal, State and Local Governments and Agencies, all over.
from CTI Consulting http://ift.tt/2iS2Zer

Inside LAX's New Anti-Terrorism Intelligence Unit - The Atlantic

Everyone needs to read this article, Table Top exercise's are mandatory at every airport in the US and for most of the world. Scenarios like this are tested everyday, not just at airports, but every government building, to include a lot of private facilities at this point. The second point is to have an Intel Type point of contact, than can keep an eye on the risk you may face with a corporation or a Protectee. They are doing table tops constantly in the run up to the inauguration. Every new threat is built into a scenario and the table top allows for the responders to see how they will each work with each other.
from CTI Consulting http://ift.tt/2iW0TLj

Security Message for U.S. Citizens: Reports of Gunfire Exchanges in Cancun | U.S. Embassy & Consulates in Mexico

The US State Department has issued a "Code Red" for the area in and around Cancun, advising people to shelter in place (I.E. stay in your hotel compounds). In the last of the warning the State Department does say that the Hotels areas themselves although not hit so far, it is believed the gunman do have access to the areas, in and around the Hotels.
from CTI Consulting http://ift.tt/2j8sndK

Tuesday, January 17, 2017

5 Awesome Illegal Uses for Alexa | Shelly Palmer | Pulse | LinkedIn

“Alexa. Tell Record-a-Call to record for 20 minutes after the phone rings.” so every time the phone rings your buddy Alexa, will record for 20 min, which other than being illegal can be used by others llke law enforcement with a warrant to order your buddy Alexa to tell them everything it recorded, like your command to record after phone rings. Or you can command “Alexa. Record the next three hours of audio from Echo Dot #2.”, and it will once again quite possibly illegal, and it also has your commands telling it to do so. I guess the next should be Alexa, can you bake a cake with a file in it., but oops that got recorded also. Alexa was picked on here, but Siri and the rest of the AI buddies are also capable of getting you in trouble, as well as ratting you out for doing so. So how do those Christmas Presents look to you now?
from CTI Consulting http://ift.tt/2iv6OTE

Part I: Undercover investigation exposes groups plotting criminal activity at Trump inauguration - YouTube

This appears to be actual bad guys planning on disrupting at least one of the Trump Inauguration events. This type of video should get all involved arrested by Federal Law Enforcement, and put on the USSS watch lists for possible terrorist actions. I am not sure they (the planners) know what they are doing some of time, well most of the time. I was in Seattle for the Queen of England's visit, and we overheard a plot to kill the Queen, we went to a pay phone and called in a team to take the away, and then grabbed all their planning documents, which consisted of about 10 bar napkins. We called in maritime experts to go over the plan, and the basic deal was the plan would not have worked, and if they had tried they probably would have died. Still they did put a lot of work into it, and suffered the consequences for their efforts. Plotters like this have shown up quite a few times over the years, one group got hold of the White House Blueprints and started to develop a plot, all six involved had warrants out for their arrests on other terrorist attacks, some successful, most not. If anyone hears or see's people trying to plot an attack, please get hold of law enforcement, you are our best eyes and ears, to find them.
from CTI Consulting https://www.youtube.com/watch?v=MHZSfhd1X_8&feature=youtu.be

OSHA Holds Hearings on Standard for Violence in Healthcare | OSHA

This is not going to be an easy thing, needed in some fashion, but will be a challenge to implement. The violence numbers have been going up significantly every year, for the past 5 to 10 years depending on the area of the country being looked at. Consultants will need to take the proposed changes into account for all new build outs or renovations. Planners will need to work with the development of policies and procedures that can make the most of any changes physically to enhance security.
from CTI Consulting http://ift.tt/2j1hOMq

Kevin's Security Scrapbook: TV Gardening Expert Digs Dirt Using Spycam

Spycam's come in all shapes and sizes, this one was in a air freshener in a shower room toilet area. Interesting part is all the focus is on the I phone and what it captured and saved. Remember the device is just a camera, the real offence comes when you record or save, and that is for audio and now in most areas now video.
from CTI Consulting http://ift.tt/2jkY0S9

Virus Bulletin :: Bulletin

Here is another resource in the continuing threat of cyber security issues, I am not sure how to sign up to receive the bulletin, but it is in my browser save now.
from CTI Consulting http://ift.tt/2j53UpL

Friday, January 13, 2017

U.S. Marshals Warn of Phone Scam

As you can see this scam if being used all over the US not just Fla.
from CTI Consulting http://ift.tt/2itf8GC

U.S Marshals Warn of Jury Scam in South Florida

It is hard to believe this scam is as effective as it is. But you need to warn your friends and family, they try all ages in this one, trying scare people to send money to make it go away. There was one group that actually had data of people that had not shown up for jury duty and then made the call, this is much more effective. But just in case check before even thinking of sending any funds.
from CTI Consulting http://ift.tt/2ita6tL

You can now buy a gun that looks like a smartphone — police concerned - Business Insider

Another disguised weapon to worry about, it actually has been around for a few years.
from CTI Consulting http://ift.tt/2ilCRtP

TSA Finds Record Number of Guns at U.S. Airports in 2016

TrentonScottH : Number of guns found at TSA checkpoints up for 2016. Most carried inadvertently, only <.0004% of US air travelers https://t.co/N5DUYEV2iN
from CTI Consulting http://ift.tt/2iqLVMA

Shootout at U.S. Consulate in Nuevo Laredo Part of Cartel-Terrorist Attack Plan for Trump Inauguration | The Counter Jihad Report

Where this report is very weak on established facts and brings together stories and events that have happen over the last 8 years, it does point out some things we all know. Mexico is not happy with our President Elect Trump, and the Cartels are very worried he is going to cut into their business plan. There are rumors based on both facts and intel, that Jihadists would like to make some kind of deal with various Cartels, for better access to border crossings for both people and weapons. One of the big roadblocks to this type of deal is the religious divide between the two factions. With enough motivation it is thought the Cartels may develop some type of arrangement, but would it be a very tenuous arrangement at best, with both sides having commitment issues that they have and will use to not carry out their side of the deal. With that said, one planned attack that meets both sides goals, is very possible.
from CTI Consulting http://ift.tt/2jEtwK5

One officer brings village together to combat crime

This is an old story but it is still true, the Bensenville crime rate is the wonder of the area, which includes Chicago. When Officer Joel Vargas was brought in to build a series of community policing initiatives, the crime in the city that is very close to the big City Chicago was about the same. As the trust was built between the Citizens, Businesses, Religious organizations, and a method to empower everyone with the ability to report crime both anonymous and not, the crime rate went down quickly and drastically. Gangs the big problem in Chicago and a lot of our crime plagued cities became almost non existent. Officer Vargas is finishing the documentation of the program the Bensenville Police over the past few years. Formalizing the over 85% drop in crime and gang activity results, and hopefully will be tasked to help other cities with the program. Chicago Police had visited the little city and so far have not felt the crime reduction achieved by Bensenville would work. When a program works as well as this, you would think the City of Chicago, and other high crime cities would be at least trying it, or at least parts of it. We need fresh ideas since it is obvious the crime reduction programs used by Chicago and other Cities is not working. DOJ has a section that does nothing but analyse crime reduction programs, it would be interested to see their analysis of this one. No Crime Reduction Program is going to work in a cookie cutter approach for every city, but the principals of the Bensenville Crime Reduction Program are a great place to start.
from CTI Consulting http://ift.tt/2iPSYfA

Thursday, January 12, 2017

ALERT: ISIS Has Orders to Attack This TEXAS Location

Always remember when this type of targeting is promoted, they tend to go after softer targets that hold the same goal, attacking Christianity. If I was a Texas Church in a smaller town, I would review your security plans, to include having people of the church take turns watching it for suspicious behavior. Remember that it takes them days, weeks, often even months to surveillance , get the gear and people together for an attack. Keeping an eye out will probably keep you safer.
from CTI Consulting http://ift.tt/2jBwQFv

Wednesday, January 11, 2017

Beware this criminal activity at OR Tambo Airport

This is an interesting video to watch. You can see the subtle moves and the checking to make sure they are not being watched. Using the other man to direct any possible attention from the victim. Like a purse snatcher, the bag thief, finds a place he and his accomplice can watch the traveling public with out attracting attention. They pick a spot that has the people with baggage that is not under their full attention and or control. The spot also allows for the attacker to have a exit route that gets him out of site from the victim very quickly. If you had a detective from the pick pocket squad from almost any large Police force, he probably would have pick up on these two very quickly. The thieves on the other had would have noticed the Police as well and vacated the area. This is a great video to help train your teams on stopping crime before it happens. In CTI's Aggression Detection course this is part of what we teach. Our focus in on terrorists or other people planning violent crime, but the same detection principal is used here. If you walked on to the scene, and were aware of the two, looking around for both victims and Police, you would notice that they had also picked you out as someone that was aware. In many cases in these low level crimes the thieves will just walk away, but at a minimum they will keep an eye on you. They will not be able to help it. As we teach in the classes, if they think you are police or security, your are now the most important person in their lives. They will have to look back at you every 15 seconds or less, they can not help themselves. If there are other members of the team, they will tell you where they are as well, they will look at you, try and show they are not paying attention on the hopes that you will walk away, but when they look back at you, watch them they will also look at what their team is doing, you can hear them mentally saying to the other team member, do you see this guy looking at me what should I do. If you just watch, or even pretend not to watch, you will see his head and neck start to move in a path, from you to his team members one by one, back to you, it can get quite comical at times. Now take a step toward the thief or terrorist, and watch their world change, just a step, but to them it will seem like you are running up to handcuff them. Look at a note book or at your phone, then look back at the bad guy again, his paranoia will kick in, in his mind, is running the thought that you have his description or picture, and know all about him. As I say this is a great training video for watching the actions of a bad guy, before he ever steals the bag.
from CTI Consulting http://ift.tt/2iHINta


Thanks for the post Jeff Allen Lindau, Cell phones are becoming a huge target, what a lot of people do not seem to realize that, with the phone hack, they normally have access to your router passwords at home and office. As well as your banking account information, and anything you pay on line.
from CTI Consulting http://ift.tt/2j7Hibf

Tuesday, January 10, 2017

Lithuania nixes data center because of fiber-optic network connections to Russia: Reuters - Lightwave

Yes the system now uses fiber optic cable run though Russia, but if they are going to invest serious money in a new system, going through the same vulnerabilities with Russia is not a good move. I think Lithuania made the right move. People all over are going to have to make real decisions about their Internet and who has access to it. Now most can be looked at as it goes through routers, but if say Russia made a move against Lithuania, having this fiber routing through Russia could allow Russia to cut them off from the rest of the world. This same problem exists in many different areas around the globe. China provides internet access to a lot of smaller countries, and giving them the ability to be cut off during the start up of any aggression would not be good.
from CTI Consulting http://ift.tt/2jfTgNa

Become Empowered: Learn How to Stop The Bleed | Homeland Security

This is great information on how to help victims of active shooters or even terrorist attacks. In many cases the wounded from these events are in critical condition and if you are in the area and it is safe, you are the one that can save a life. There are some basic training videos here as well as other resources for you to learn how to be more effective in helping people in these situations. This is well worth the time and effort, and you may end up saving a life perhaps mine.
from CTI Consulting http://ift.tt/2jrppAV

Armored Cars and Tires | International Security Driver Association

Picking the right tire for the job is also one of the most effective methods for driving safety even if they are not armored vehicles. Picking the right tire can mean the difference between life and death in any driving situation, but when driving with threats against you or your client, it becomes even more critical. If you get a chance please look at other articles in the ISDA Center blog for more info on tires and all around driving safety
from CTI Consulting http://ift.tt/2jeP68A

The FBI Is Apparently Paying Geek Squad Members To Dig Around In Computers For Evidence Of Criminal Activity | Techdirt

If this is true, it should raise grave privacy issues, and should require a search warrant to conduct these unlawful searches of Data on the computer. It will be interesting to see how a case made on this evidence makes it through the courts.
from CTI Consulting http://ift.tt/2juJBpy

Passenger group seeks greater airport security

These are knee jerk reactions to an event that could have just as easily happen from a person walking off the street with a gun. Before you start over regulating again, think, something like this has not happen for over 40 years, back before there was really screening check points anywhere in the Airports. You must also remember that pushing out the security screening to the front doors will result in huge increases of people and baggage being screened. Be happy this person did send this gun via the proper methods at the airport. If nothing else it gave us another chance to deal with the individual, and if possible determine if he had a problem. Many Airport Police Officers have received training in aggression recognition and have increased their presence at the soft target areas of the airport, which is the best type of security for this problem. In this case arming TSA officers would not have helped and arming more TSA is just going to lead to issues between the LEO's Law Enforcement Officers at airports and the TSA. TSA needs to concentrate on their job of detecting weapons going on planes. Which according to the TSA Tiger teams that test them, they are not doing so well. TSA is looking for anyway to expand its staff and this is just one more attempt. This event was over in 80 seconds, and the Police got there very quickly, I am not sure what other security measures would have prevented this. Adding more security would not, nor would pushing the screening of people coming into the airport out to the entrance doors would. More training for existing LEO's and even other airport staff would be the biggest help for the problem at this time.
from CTI Consulting http://ift.tt/2if1YNs

Executive Security International

ESI Bodyguard classes are in class of their own. Oldest and longest school around. Take a quick listen it is worth it.
from CTI Consulting http://ift.tt/2ieXzKa

FTC Sues D-Link Over Failure to Secure Its Routers and IP Cameras from Hackers

I am not sure if this is unprecedented, but this is the first time I have seen this. The biggest issue appears to be D-Link stated that it did have a better security system than it did. But as many Chinese vendors and companies that remark Chinese products, like routers and IP cameras have known security vulnerabilities built in why are they not being addressed by the FTC. The good news is that some actions are being taken to protect consumers from these products. It should be an interesting case to follow.
from CTI Consulting http://ift.tt/2jc0iSw

Gang member receives 35-year sentence in fatal expressway shooting | Local News | themonitor.com

What is not brought out here is the fact that this, perhaps gang on gang shooting was on a major highway, that could have led to other people dying from the 10 shots fired or that vehicles going out of control and hitting others, could have also ended lives. Flashing gang signs may help him in Prison, but we all need to try and stamp out gang violence in our cities.
from CTI Consulting http://ift.tt/2i9vRAt

Weapons made from inhalers recovered after Cook County Jail fight - Chicago Tribune

With all my experience with disguised weapons this is one I have not seen before. Using inhalers modified to be weapons in a prisoner common area fight. I will try and get more information on this to put on the CTI Pintrest page.
from CTI Consulting http://ift.tt/2iZxVaL

ComputerWeekly.com | Information Technology (IT) News, UK IT Jobs, Industry News

TrentonScottH : RT @SecMash: Cyber security scare stories could sharpen focus at banks - https://t.co/ZLZZ2Lqf1l Cyber security scare stories c… https://t.co/J1n1bKLrEY
from CTI Consulting http://ift.tt/UVNBrE

Twitter / ?

TrentonScottH : RT @SpiritusPtrs: Abbott issues cyber updates for St Jude cardio devices #medicaldevices #cybersecurity #adverseeventmgt https://t.co/V8zwqahbUv
from CTI Consulting https://t.co/V8zw

Monday, January 9, 2017

Vulnerability Summary for the Week of January 2, 2017 | US-CERT

Just to put things in perspective, if you are doing your own security for you home or office PC or Network of PC's here is just one weeks vulnerability summary of things you may have to watch for or fix, or patch or get rid of. High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9 Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9 So good luck to you all in taking care of all these vulnerabilities. Perhaps your security program like Norton, will make all these changes for you, or even Microsoft will automatically take care of the fixes. Well at least some of them, there are still fixes for your router, your printer, and other peripherals you have that must be addressed. For you out there in the choosing a career field, Cyber Security will be a very fast growing field.
from CTI Consulting http://ift.tt/2jwbTQi

Recovery continues at Fort Lauderdale airport

There is a lot to be learned from this event, one unfortunately is how to get back to operations, it is a hard part of any situation like this, but to stay closed for a min longer than is needed, lets the bad guys win. I have always admired the resolve of the Citizens of Israel to be able to put something like this behind them and to carry on. I was on CNN one night after a firebomb went off in a subway, and I was asked how to you think the New Yorker's are going to handle this, do you think subway ridership will go down. I immediately said no, New York citizens are a hardy bunch and will carry on. This was before 911 when we really saw the staying power of New York citizens was tested, and they shown through then as well. By the way Mr. Turner still owned CNN at the time and was on the phone before the interview ended letting me know my statements are just what were needed after an even like this. But still to make sure the evidence is collected correctly so that at trial the bad guy will be convicted. Lastly is a review of how the events happen and what have we learned from it. Is there anything reasonably we can do different that would stop this from happening again. Here is the bad news, this was a very rare event, and probably will not happen like this again. It is much easier for someone to come off the street with a weapon than to carry one in checked baggage. For all those folks that want to make some new law or even rule about stopping people from putting guns in checked baggage, get a life, you are not dealing with the issue at hand. We may never get the real story of why this happen, and I doubt even the shooter has a real handle on why he did it. Yes, he may say somethings, but as to what was really going on in his head I doubt he knows for real what that was himself. We need people to understand there was apparently no preplanning he just flipped. Watching one of the videos, he does not appear to show any outward sign of his impending actions, but with that said after that first shot went off any of my students would have been moving away from the situation at a fast pace, getting something, anything between you and the shooter. I often tweet out this warning, and this event makes it more true. "If you are in danger, get out, don't talk about it, rationalize it, or whine about it get out. Even a few feet away is safer."
from CTI Consulting http://ift.tt/2iOZ1nr

Bomb Threats Prompt Evacuation of Jewish Community Centers in New Jersey, 4 Other States | NBC New York

Understanding how to deal with bomb threats just requires a little training and a set of policies than can be defended in court. I would suggest you either have the police or a security consultant familiar with bomb threats to help you develop a plan and policy for dealing with them. CTI has been training companies and government agencies on bomb threat handling and how to develop a bomb threat plan for over 30 years now. With me it started in the USSS, everywhere the President and Vice President goes Security Specialist like me had to give folks that may answer the phone training on how to deal with a bomb threat. It happens rather frequently where ever the President and Vice President goes. The training provides two things, one it helps the person that may receive a call deal with it in a much calmer manner, since one big part of the training is understanding that 90% plus of all bomb threats are bogus, and two the training will allow the person taking the call to be able to give authorities more information on how to possibly find the caller, and to evaluate to some extent the credibility of the caller. http://ift.tt/2jw2Peg
from CTI Consulting http://ift.tt/2jawXsd

Before Florida Shooting, Guns in Checked Bags Raised Few Concerns - The New York Times

This attack was not an issue with having a handgun in his checked luggage, in fact the whole issue that he went through the process correctly points to more chances that his deviant behavior would be noticed. The bad guys have told us (and I am not sure we are dealing with a bad guy here) that soft targets are key for these minimally trained attackers we see around the world and in the US. In this case as I have taught Airport Police all over the world, the out bound baggage area is a key soft target. People often say, well lets make the place where passengers pick up bag a security area. And I think more security and cameras in the areas are a good thing, but look at the airport in Puerto Rico, only people with tickets from flights landing are allowed in the area, but just outside the doors, everyone waits for their passengers, and this is even less controllable than the baggage pick up area. Pushing people out to areas with less controls, just leads to people having less security. As far as making check weapons outlawed, anyone can bring weapons in the the baggage pick up area from their cars, so restricting checked weapons provides even less security than we have now.
from CTI Consulting http://ift.tt/2iblz0X

Friday, January 6, 2017

Security experts eye how to bolster Soft Targets

TrentonScottH : CTI VP Trent Higareda on protecting airports: Security experts eye how to bolster Soft Targets (Boston Herald) https://t.co/X8pGn0SCq2
from CTI Consulting http://ift.tt/2je06SI

Esteban Santiago identified as gunman in Fort Lauderdale shooting

TrentonScottH : RT @IngrahamAngle: Santiago "came back acting strangely" after his overseas service, acc to his aunt Maria Ruiz. https://t.co/enkQk06sL5
from CTI Consulting http://ift.tt/2ilVCt6

Trenton Scott H. on Twitter

TrentonScottH : The Fort Lauderdale-Hollywood Airport Terminal 2 baggage claim area is connected to the Palm parking garage.… https://t.co/mnAwIRyW3c
from CTI Consulting https://twitter.com/i/web/status/817444582325530624

Trenton Scott H. on Twitter

TrentonScottH : Fort Lauderdale airport shooting reportedly occurred in the Terminal 2 baggage claim. Here's a map of the terminal… https://t.co/ozh7aJtFYb
from CTI Consulting https://twitter.com/i/web/status/817444066103205889

Multiple people shot at Fort Lauderdale-Hollywood Intl. Airport

TrentonScottH : RT @wsvn: Terminals cleared at Ft Lauderdale airport, hundreds on tarmac after shooting in lower baggage claim area… https://t.co/pYiWZCUwaZ
from CTI Consulting http://ift.tt/2hZ57xg

Customer Data Is a Liability | American Banker

This is a must read for all businesses keeping databases of their clients, credit cards, and private data. Many marketers are still pushing the idea of we want to know all we can about our customers so we can serve them better, and perhaps make so money out of selling or renting information about them to other businesses. Here is the crunch, every time a business does this, their database becomes a target for hackers, that want to use the same data for nefarious reasons. By the way some gray hackers are pushing to make it into the business world offering to sell data to marketers of mainstream businesses. Now this gray area can be very profitable to both sides, since it often is marketed by the original businesses that collected it, this hacked material is already out there in the market place, but the gray hackers can offer it at a much lower cost. So here is the problem is collecting this data on customers worth the risk of a hacker getting the data, and your firm has to pay damages as well as suffer the possible loss of clients. I think 2017 will find a lot of firms thinking about this part of their business plan, and not collecting as much or any data as before.
from CTI Consulting http://ift.tt/2ik5Eef

Thursday, January 5, 2017

Rich Roth, Executive Director CTI Consulting This course establishes a set of best practices for detection – not disposal – of explosive threats by presenting comprehensive data on bomb incidents targeting corporations and public figures. With a focus on best practices of Prevention, Search, and Evacuation, this course includes thorough treatment of Methods of Search Techniques, Preparation for Threatening Calls, and Personality Profiling. Graduates will obtain a level of technical knowledge that allows them to offer intelligent advice to clients, establish concrete safety procedures, and respond quickly and appropriately during a bomb incident. Topics Covered Identification of Types of Explosives Sources of Explosives Tools of the Trade Commercial and Military Explosives Home Made and Incendiary Devices Triggering Mechanisms Search Procedures: Search of Buildings Evacuation Plans and Threat Management

via CTI Consulting http://ift.tt/2igJfyo

Palm Springs Investigations and Protection

Here is a chance to use social media to help put more eyes and ears on a possible grab, and help bring the Girl home safe.
from CTI Consulting http://ift.tt/2igpWFw

Risk & Insurance

Kidnap and Ransom to include now Extortion Insurance is growing around the world. As Security Practitioners it is imperative that you understand the problem and what direction it is moving to. This article is key to the understanding of the problem and what resources are available.
from CTI Consulting http://ift.tt/2iJ3N3H

ESI \ Comprehensive Executive Protection Training | TSCM

If you get a chance to go to this training, it will give your the fundamentals of TSCM and Cyber Security. As you conduct searches as well as install devices, mixed in with the class room work, you get a real hands on view of both the attackers problems and the Counter Espionage's problems. Using these capabilities EP staff, can both participate in fundamental TSCM searches as well as work with teams of dedicated TSCM folks to help provide Their clients with the most comprehensive Communications Security Program available.
from CTI Consulting http://ift.tt/2j91Xbv

How do you fix the Internet of Things? A better router - The Verge

I have not tried this yet, but it is something we all need to look into. In many cases you can run this router off the same internet connection, using this router for all your IoT devices, and your normal one for everything else. Or just use this one if it proves to work well.
from CTI Consulting http://ift.tt/2iKYWih

Surprise, violent attack on an Atlanta airport officer | WAGA

Everyone needs read this Article, the Officer was armed, but hit so quickly and without warning he was trouble quickly, this Officer was armed and had been on the Streets of Atlanta prior to working the Airport assignment. Anyone can be jumped at any time, so working on your awareness capabilities, is for all of us are greatest strength for dealing with this type of incident. Probably one of the biggest mistakes made in situations like this, is to try and draw a weapon of any type gun or knives, your best move is to use your hands to react, then get back away enough that perhaps pulling a weapon is possible. Use of any martial arts training or boxing anything should be updated regularly. Chief Sullenger of the Harlingen Airport Police, has courses on specific Marital Arts techniques that can help an officer or a private citizen ward off these types of attacks.
from CTI Consulting http://ift.tt/2iMspLk

FTC sets $25,000 Prize for Automatic IoT Patch Management Solution

Perhaps a little late for many IoT devices out their already, but this is a critical need for the IoT problem. If you have devices, please stay on top of the recalls for devices that can not be patched or fixed in some way. If you do send a device back, remember to erase your router passwords off the device before sending, and just to be sure once you have them all fixed, reset your router password ASAP.
from CTI Consulting http://ift.tt/2hVaoe6

FBI Hacked, Again! Hacker Leaks Data After Agency Failed to Patch Its Site

This is a good warning to us all, to try and fix all vulnerabilities as they come up. This in not only embarrassing to the FBI, but also puts the 155 FBI Agents with their records and passwords known in danger. For many of us with managed email service thru a third party, these types of fixes are pretty routine, but as in the Clinton email server, when you go it alone, you need to insure these patches are done.
from CTI Consulting http://ift.tt/2iIdGPe

Wednesday, January 4, 2017

Our planes are now 'big flying mobile devices' and top hacking targets | ZDNet

So what are you doing on your next plane trip? Or, should you be worried about the guy in front of you hacking the plane to the point of a crash, now or later. It is a real problem, that so far the aviation community has not been dealing with very much if not at all. The same vulnerabilities that hackers had pointed out over 4 years ago, are still there, and now have been exploited a number of times.
from CTI Consulting http://ift.tt/2hIljDC

Hackers Target Law and Accounting Firms - Bat Blue Networks

This is not a new target, but it is being pushed a lot of late, and accounting firms are not really used to being a target. Nor are your law firms it turns out.
from CTI Consulting http://ift.tt/2iFcewT

Ransomware on smart TVs is here and removing it can be a pain | CSO Online

A lot of folks are not aware the operating system for most smart TV's is a version of Android. Just like your phone of tablet your smart TV is vulnerable to these attacks, and they are not easy to get rid of, if you can. An infected phone or tablet can infect the TV or it can come in via and internet exchange. Security to even stop this attack has at this time not been developed.
from CTI Consulting http://ift.tt/2ibLmnn

Watch out for this hitman text message scam | Komando.com

This is one scam we need to get out to as many as possible, it is a scam and can also contain a virus for your phone or computer. If your children get something like this, there is a good possibility that their phone or computer could be infected.
from CTI Consulting http://ift.tt/2iQvuHC

Adding even more value to video surveillance - SecureIDNews

These non traditional uses for CCTV will keep the market growing, and at this point I see no real top out for it. IoT technology is putting cameras virtually everywhere these days, your coffee pot, refrigerator, even your scales are getting hooked up to CCTV now days. Plus they are big safety situations where cameras can be used.
from CTI Consulting http://ift.tt/2iIUXpj

Here Are The Top National Security Threats To Watch In 2017 | Henry Morgenstern | Pulse | LinkedIn

Here is a good concise list of our greatest threats as we go into the new year.
from CTI Consulting http://ift.tt/2iIomjl

Want to beat facial recognition? Get some funky tortoiseshell glasses | Technology | The Guardian

Ok, these are interesting, but may have you stand out a bit. But more importantly there is a pdf report in the article with information on beating facial recognition that may or may not work, but does explain the whole process. Very good information to know, well done. CTI has been dealing with this issue for years, and then after 911 vendors came out of the wood work, I have relied on the studies conducted by the military, but even then there is a mis connect on facial recognition. If you are looking for facial recognition say in facebook, that is one thing, if a mistake is made no one is harmed. If you are looking to arrest someone off a facial recognition hit, it is a whole different issue, you need to be right. In the middle are things like access control systems that use facial recognition, it all comes down to 1 to 1 checks or 1 to millions checks. On One to One it is a person produces a access control card and the system checks your video picture to one stored in the data base, hence the 1 to 1. On the 1 to many, you walk into a room and the video cameras capture face and checks it against what they have in the data base, if there are say 20 it works pretty well. If there are say 200 not so good, if say 1 million it really gets to be tough and takes a while.
from CTI Consulting http://ift.tt/2e4Pp6Q

Tuesday, January 3, 2017

Germany plans security overhaul after Berlin attack

It is hard for people to understand the mis trust the German People have for Federal or National Police. But it is time to get a more national approach to counter terrorism in Germany. In the US we have a problem with the Federal Police and Agencies sharing even close to read time information with the locals. This mis trust by our Federal intel and law enforcement has led to far to many bad guys, including terrorists slipping through the net.
from CTI Consulting http://ift.tt/2iE1di5

3 Tips on Negotiations, with FBI Negotiator Chris Voss

Learning Something new each day is how to win and grow, here is a quick video by former FBI kidnapping negotiator Chris Voss, on 3 tips on negotiating, well worth the listen. https://youtu.be/fKCfhWmsDeE
from CTI Consulting https://youtu.be/fKCfhWmsDeE

Germany Bans ‘True Religion’ Muslim Group and Raids Mosques - The New York Times

These radical Islamic groups are springing up all over the world, spreading hate and radical Jihadist activity where and when they can. Like Germany the rest of the world needs to wake up to these groups.
from CTI Consulting http://ift.tt/2fQUsW1

Beyond ISIS: Europe's Salafists Nurturing Jihad :: The Investigative Project on Terrorism

The facts of Saudi Arabia and the evangelical or missionary movements nature of the Wahhabi Jihadist movement thru the world should never be forgotten. The house of Saudi made a strategic alliance with the warrior Wahhabi Movement a long time ago. One of the deals many issues was the Saudi's paying for the expansion of Mosques and the training of Wahhabi imams all over the world. This type of ideology would be akin to the US paying for Nazi sympathizers to spread their version of Christian Identity around the US and the world. We need to be aware of it's spread and the damage it can do.
from CTI Consulting http://ift.tt/2iLeItc

Baggage Handler Locked in Cargo on Flight From NC to Dulles

TrentonScottH : Baggage Handler Locked in With Luggage on Flight From North Carolina to Dulles | NBC4 Washington https://t.co/J6IMbsLt53
from CTI Consulting http://ift.tt/2irrnnv

Monday, January 2, 2017

Is That Switchblade Legal? Check Out These Knife Laws By State

This guy has done a good job on this, I would make sure you have this as a reference. In cases of EP work if you can see someone violating laws out in the crowd you maybe able to get Law Enforcement to work them for you. But you need to know the laws. If you carry knives as weapons it is also good to know what you can get locked up for.
from CTI Consulting http://ift.tt/2ir7q00

Fridges and washing machines could be vital witnesses in murder plots

You could well have your home rat you out with the rush to make the Internet of Things (IoT) a part of your Life, labeled under Smart Homes, Connected Homes and Offices, all pledge to make your life easier, but the price is often privacy. The Hackers have and continue to use these devices to make your life an open book, and a hub for attacks on other systems, but the Police from Federal, State, and Local are also learning to check the logs of these devices to develop a timeline on what you have been doing in your own home. This can be a good article to read, and perhaps to rethink the new Smart Home Connected to the world,life you are looking for?
from CTI Consulting http://ift.tt/2hJeoNq

3 men decapitated, 2 more slain in Acapulco over New Year's

Mexico is seeing Cartel Terrorist activity in places that normally are considered off limits because of the tourist and elite Mexican monies that keep the economy afloat in Mexico. Calls for trained bodyguards are becoming a normal thing for tourists that can afford it. So far local wages for untrained bodyguards have not gone up, but trained and tested bodyguards are seeing double digit increases as Mexico approaches a very contested Presidential Elections. Mexico splits into different factions, and if you are on the wrong side of a group in the area, mainly Cartels, even wealthy supporters are fair game.
from CTI Consulting http://ift.tt/2iAfZ9e

Mexico’s populist Amlo capitalises on economic woes

Could this be the change that Mexico is looking for, perhaps another Trump attempt? His words are right, the message is clear clean up the corruption and rebuild the non existent infrastructure Mexico needs. But the higher he gets in the Poll's the less likely he will live till the elections. Some say he would have to live in the US and campaign in Mexico just to stay alive. It has happen before that people running for office had family homes in Mexico, but actually lived a good bit of the time in the US, meeting with political strategists for days at a time, some of who would not venture into Mexico. He does have a native group of Mexicans that will be able to mount a physical defense of Amlo, if they can get and hold onto weapons. It should make for a very interesting 2017 in Mexico.
from CTI Consulting http://ift.tt/2imS3pn

Sunday, January 1, 2017

10-year-old girl used as human bomb in Nigeria New Year's Eve attack

Always be on the look out for someone acting out of the norm, in foreign countries that can be difficult so practice as much as you can, that means watching and listening to what is going on around your environment, really the only way you get a handle on what is out of place is by watching and getting a feel for what is normal. Always be setting and re-evaluating base lines of normal around you, when something pings your subconscious be moving away from the situation, till you can figure out what triggered your attention, even then have distance, and an escape route built into your actions. It is going to be a fast year in 2017, and we all need to be ready for it. Be aware of what is going on around you is the first order of business.
from CTI Consulting http://ift.tt/2ivO0Yh


Here is a great brief on USSS Advance work, https://youtu.be/BHkvtmEyas8
from CTI Consulting https://youtu.be/BHkvtmEyas8

Istanbul nightclub attack: Search continues for unidentified terrorist gunman who killed 39 at New Year's Eve party

Welcome 2017 as a shooter(s) start right at Midnight to kill and wound partiers at a nightclub. One or more gunmen started shooting, some claim outside the nightclub on the street, and may have killed the only security person at the event in the first opening salvo. One that Security teams need to be on the look out, having at least one of your team detached and not easily recognizable as security can often give you the edge in situations like this. Executive Protection and Security Teams need to under stand the zero presence approach to event security as well as in bodyguard work. Zero presence security can have the advantage of seeing the bad guys, often before they act, but also allows for a response the shooter is not expecting. ESI among other Bodyguard and Event Security trainers have been moving to this approach more and more. To learn more about this type of training log on to https://youtu.be/kdqSIxM_w2c For the normal citizen that wants to learn how to gain the edge on surviving these events, find a security awareness training class near you. Or contact CTI for a class near you.
from CTI Consulting http://ift.tt/2ijWn8S

IBM Reports Significant Increase in ICS Attacks | SecurityWeek.Com

SCADA attacks like these are the second leg of a three legged stool that our cyber systems are depending on, the Internet of Things ( IoT ) is another leg, the other leg is in dispute or perhaps too broad to designate as a leg. But the same storage of Data that we all think is our strength, is as we have seen through all the data breeches could be in the end our biggest weakness. It is going to be a huge year for cyber security, at some point we will get an Idea of if we can get some type of control of our cyber systems, or are they always going to be the threat we can not get a handle on, even more that the traditional threat of Terrorism.
from CTI Consulting http://ift.tt/2ioafMT