Thursday, March 30, 2017

City holds job fair for O'Hare positions at Wilbur Wright College

TrentonScottH : City of Chicago Department of Aviation holds job fair for positions at O'Hare Airport https://t.co/ibrsmeEjyK via @abc7chicago
from CTI Consulting http://ift.tt/2nBsMZ7
via IFTTT

Internet of Things, Social Media Becoming Part of E-Discovery Landscape -- Campus Technology

Now when e discovery requests come in, you need to take a much broader view of what it can cover, like that device that listens to what you say in your home to turn on radios or change the heat is also listening to a lot more of what you are saying and also recording bits of it. As this report states: There is a lot at stake for firms that are not ready to respond quickly and appropriately to e-discovery requests, it is not only firms, but house holds as well. Now what can e-discovery do to you on the divorce, you are going thru, what did you say in your social media, what did you say around that smart TV or even Smart Refrigerator that may have been captured by its recording device. It is a brave new world, are you ready for it. This is a very well written piece on the basic issues we may all face.
from CTI Consulting http://ift.tt/2o1Tcpv
via IFTTT

The laptop ban is causing some issues, but the threat is real http://ift.tt/2mTLv01


via CTI Consulting http://ift.tt/2nonS0D

Mining Threat Intelligence From the Dark Web | Recorded Future

Here is a simple reason you may want to at least explore the entrance to the Dark Web, If your organization is breached, and sensitive information is stolen, there’s a strong chance it will show up on the dark web before you know an attack has taken place. Interesting statement and also very very true. Many organizations and companies have no idea they have been hit till the problem is in the news. Just keeping a eye on some of the Dark Web market places could give you the edge on heading off a problem or perhaps at least see what people are paying for your information. Yes the Good Guys do try and keep track of people going down this rabbit hole, but if you are not doing anything illegal then pretty much no harm no foul. This is a very well written report on an area, not much are writing on. Good learning,,
from CTI Consulting http://ift.tt/2norQGK
via IFTTT

Using Better Light for Better Healthcare | Building Design + Construction

All the pluses listed here for LED lighting are valid, let me add it is a great value to and for security. In doing expert witness work lighting is almost always one the negligent security issues listed, most of the time the problem is lights that have burned out for some reason. Maintenance will get to it at some point, but if the bad thing happens when the lights are out, now you have negligence. The premise is that you (the facility) obviously thought you needed that much light or you would not have paid for the lights, hard to argue, right? So LED lights have such a long life span it limits the the times that it will burn out, like 15 to 25 years at times. This is a big security plus, the lights are also almost constant in their illumination levels for the whole life span, some lights are not and once again, if I or someone like me is brought in to test light levels, it really is a problem if you have a security survey that says x foot candles is needed, or the opposing expert pulls up a standard of some type the recommends for good security the foot candles for a space like the one being analysed should be. Both of these can be issues that will not sink you in a legal case, but are not things you want to fight. Lighting is like Security Guard training, you may not think it is a real security issue, until something happens, and the experts start looking around. Think about all the over savings LED lights bring you, and then add to that maintenance of an LED light is way over 1/10th of standard lighting.
from CTI Consulting http://ift.tt/2oe3qn7
via IFTTT

http://ift.tt/2oDDTQK This is a great report to read about intel and the sharing of.


via CTI Consulting http://ift.tt/2nEzwHg

Should Police Be Required To Obtain A Warrant To Search Cell Phones?

This comes up a lot and not just for traffic stops. According to the Supreme Court in a unanimous decision has said yes a warrant is required. I am researching now for the case and opinion on it. This is one of those ones, you may want to print out an keep with you, or at least have on your phone or tablet. Now the basis for the decision is that the cell phone is nothing more than a computer now days, and has to be treated as such for law enforcement searches.
from CTI Consulting http://ift.tt/2nE8oZ7
via IFTTT

TSA screener fired after woman gets loaded gun through security | WSB-TV

This egregious mistake is made a lot more than TSA is telling you, if you have your ear to the ground you will hear people telling of weapons both guns and knives that make it through all the time, most just shove it further down in the their bag and carry on. Now these are just for the most part honest mistakes. If a Terrorist plan was to count on a screener missing a weapon, they would be in big trouble, and would not be a plan that would be approved, counting on a screener missing a weapon is a very bad bet for a terrorist. But now think about it you are in a long line and the screener is looking at many bags an hour. Now as the bag with the gun or other weapon goes through, another screener call over to ask a question, now the bag belt should stop and the screener should answer the question and off we go, but as he or she starts to stop the belt, and looks up at the speaker, one bag slips through. Or a good looking person comes through the screening line and the operator looks up for a second, another bag slips through. Now as the folks are saying, how could you miss a hand gun, actually if on its side, it can be pretty hard to miss, but if on any of its ends it can be a lot harder to see in a bag, with your lipstick, ear buds for your stereo or phone, pens and pencils, wire bound note books, and a sundry of other items. Can the screener see through all this, yes, and with the different colors the xray designates items. like blue for metal, or some other color it should jump out at them. There are even x-rays that will alarm when the shape of a weapon comes up, but with out giving away secrets all these are fine, but still things are missed. There is a reason when the TSA Red Teams test the screeners, they fairly consistently get 85% of the weapons through. Now the Red Team members know the latest training the screeners get, they know the latest software and hardware changes to the screening machines and develop a way to work around them. The Red Team Members also do not have to worry about getting caught, which adds to the stress level of the bad guys including terrorists when they go though screening, like going to jail for the rest of their lives. Screeners found roughly half the weapons carried by the 911 terrorists, but they where all legal at the time, I always carried a knife though screening back then, it was called a co-pilot by spyderco, used a lot still by law enforcement, this was just little enough to be legal to carry on planes at the time. If you watch the screening video, you can see the screeners open up box cutters being carried by the terrorists, looking at them and then returning them to the bags, they were legal at the time. This is all to say that if Terrorists think they have even a 50 50 chance of being caught they will move to another method of attack. Now they do test the systems all the time, and sometimes find weaknesses to exploit, but so far the Law Enforcement has fixed the weakness in some way to stop the bad guys, liquid explosives for one, explosives in shoes for another. Still if a rock star is going though screening I would bet a few bags are not looked at as fully as normal as the screener quite normally looks up for a second. Mistakes will happen, but this is not the type of mistake a terrorist can count on when going through screening. It is like the people that went though a walk though metal detector a few weeks ago, with out being manned by TSA, mistake yes, but could a terrorist exploit it no. Can you imagine waiting outside a screening check point for weeks even days even hours looking to exploit a mistake like that, which may never happen again. No, Terrorism is a business, and waiting for mistake like that is not good business, not to mention if you spend 15 min, at a check point just looking, law enforcement and the TSA will be all over you.
from CTI Consulting http://ift.tt/2nkt7hO
via IFTTT

Wednesday, March 29, 2017

News from The Associated Press

You need to be very careful of privacy laws, and not just federal, but State by State as well. It breaks down along consent for recording audio mainly, but more and more video is being included in these laws. California is sort of the center for privacy prosecution. They have taken some very interesting views of how far their laws extend. But in this case recordings have been made in California so jurisdiction is not going to be a problem, in fact I would think the case will be a slam dunk and the folks that made the video's with the accompanying audio are facing jail time.
from CTI Consulting http://ift.tt/2ntnwXH
via IFTTT

Suspicious Device Shut Down Casper-NC Airport for Three Hours

Life and flying are getting a little touchy at the moment, everyone needs to keep a look out for suspect activity to include people and items.
from CTI Consulting http://ift.tt/2oyD4c1
via IFTTT

Putin critic gunned down in Kiev street | Daily Mail Online

I am watching the Paris attack at the airport against the Police officer and this one. You never want to second guess the person being attacked, but we all need to have a better awareness of what is going on behind us. We can all become distracted for a period of time, but developing a good sense of what is going on around us is something we all need to work on. In times when you are not working, try practicing. Close your eyes and listen and feel what is going on behind you. Turn on a single speaker or even a metronome to provide a sound behind you. Now turn just your head very slowly and pick up where the sound is coming from, now turn you body and to the same thing. Your hearing is usually just as good as a blind persons, but they rely on it more so they are constantly practicing. We need to practice as well, and do not forget the other senses, like the vibration on the floor as the person approaches, or the compression of the air as they approach, or the smell of the people around you changing. And lastly keep an eye on the people around you to see if they are alarmed in some way, by the person moving up on you. The mirror of the parked car even the reflection off the windows. Scientific American had a great article on our 6th sense, and how science thinks it works. Mainly it is our subconscious taking in information from all our senses, even ones we do not use consciously and feeding us the information showing up as premonitions or gut instincts, what ever. Practice helps make those senses more effective, which just maybe will give you the pin prick of a feeling something is not right. It can't hurt give it a try, it may save your life. .
from CTI Consulting http://ift.tt/2nAgEJH
via IFTTT

Cops Stop Woman With Stroller Full Of Guns In Back Of The Yards « CBS Chicago

It will be interesting what happens here, playing both sides, she could get off claiming she let the officers search because she did not know the guns where there, or some other story. She could claim she had no choice but to carry the guns or get hurt, or killed. Or they could throw the book at her if nothing else to show Chicago is getting harder on gun possession. Do not know, but it will be interesting to follow. There is some belief that if you do not have access to a gun in parts of the Chicago you will be a victim, and if you look at parts of the City it certainly less dangerous if you have a weapon to protect yourself.
from CTI Consulting http://ift.tt/2mP9jqO
via IFTTT

Airline group urges U.S., Britain to drop electronics bans

All I can say from the field is the threat is real, the solutions are evolving as the threat is analysed more. But the basis of the threat is formed on fairly specific intelligence. There as always is a risk vs reward or damage as the case maybe. A small bomb in a laptop may not bring down an airliner, but are we willing to accept the risk of people getting hurt on flight by a small bomb. Time will tell, and with the voices being raised already, perhaps the risk is acceptable. Explosive trains are a problem, if a small bomb is set near explosives that are more easily disguised but bigger that the smaller explosive can make go bang. Just a for instance, clothes dipped in liquid explosive, and then once on the plane wrapped around a small tablet of laptop could be devastating. Yes the threat is real, and yes the authorities are scrambling for solutions.
from CTI Consulting http://ift.tt/2mPP8Jg
via IFTTT

One officer brings village together to combat crime

Joel Vargas who is a man I consider a friend is not just talking out of his hat when he says his program will work, he has been actually working the program in a city just out of Chicago, that should make the windy city fathers wince. He has achieved crime reduction results that are hard to believe, yet a Cambridge University review group is about to make believers out of us all. http://ift.tt/2iPSYfA , he is now looking to move the program to other cities, why Chicago is not lining up for it, one can only wonder.
from CTI Consulting http://ift.tt/2iPSYfA
via IFTTT

http://ift.tt/2hNPoVK

Kidnapping has not gone away, but is growing into the biggest service industry for the bad guys. People need to understand that it is hitting people in the medium income more and more. The big ransom demands are still going up, but there is a whole new team of kidnappers out there where 10 to 30 thousand demands are the norm. You say well I am not in that bracket, these folks know your equity in your homes, how much you can sell the family care for, and even know the lenders and sellers that will make the deal. 2 weeks is a very long kidnapping to these teams. Three to five days in a norm, even 4 to 8 hours can be seen. Probably first noticed as a growing problem along the Mexican border, it is now happening in Massachusetts, California, of course NY and Chicago, but in little towns outside the big cities even Montana. Not noticed as much as they should since the victims families or small businesses can get the money together quickly and for the most part the event is over quickly as well. Going under the names of express kidnapping, or various others, it may have started and is still used today, that you just say your going to kidnap someone and demand or extort the money, or even pick someone up at a bar and drive them around to ATM's till the accounts are drained. But along the way these kidnappers have found the express kidnapping works oh so much better if every once and a while you do actually kidnap the people. This keeps the idea alive that the threat is real, and keeps the victims paying. Reporting these kidnapping attempts or extortion attempts to the FBI is the quickest way to end the problem. But most do not.
from CTI Consulting http://ift.tt/2hNPoVK
via IFTTT

Jeff

They are getting better, and it is hoped that we are as well.
from CTI Consulting http://ift.tt/2nrU6cl
via IFTTT

Tuesday, March 28, 2017

As Congress Repeals Internet Privacy Rules, Putting Your Options In Perspective

TrentonScottH : As Congress Repeals Internet Privacy Rules, Putting Your Options In Perspective : All Tech Considered : NPR https://t.co/GYkqCwLfNS
from CTI Consulting http://ift.tt/2o4bZ3Q
via IFTTT

Monday, March 27, 2017

Inside the Mind of Cyber Criminals

This one looks spooky so I had to share. Good luck in profiling these folks, but here are some tips.
from CTI Consulting http://ift.tt/2nocbrD
via IFTTT

Vulnerability Summary for the Week of March 20, 2017 | US-CERT

If you are feeling a little complacent about cyber security today, just take a look at all these vulnerabilities listed, now many will say none of those can effect me or my business. Oh quite the contrary my friend. If you have a smart TV, or refrigerator, or that spanking brand new high tech router, or the cable TV box in your home or 2 dozen other devices in your home or office. You have a device running some version of Linux or one of the other vulnerabilities listed. Now that you know all these vulnerabilities, what are you going to do about them? Lets start with the router running the wired and wireless network for your home or office, lets set down and see if the patch is installed on it. Now you can put the router on automatic update, most of us do, but then how do we know who sent in that last update? Your smart TV how has it been updated with the latest patches, or your IP controlled thermostat, or that printer you are using, that you just had to have the ability to print to it wirelessly, who is checking the patches for that. Remember China hit the American Chamber of Commerce offices, all our Federal agencies came in and shut down the hacker, and within two weeks it had been hit again, in the end it was determined that one computerized thermostat just like the one you installed in your home last Christmas, and a cheap HP all in one printer, copier and scanner had hard wired vulnerabilities from the Chinese that had put them on the market, that no software fix could defeat, they just had to be removed. But there where patches available for both items that had supposedly fixed the vulnerability, in the end the only thing to do was get rid of them. In the case of the printer, it turned out the printers scanner was the culprit, and that China had built in the vulnerability in a great number of scanners used by printer manufactures from the USA and all over. So sit back and do not worry, it probably would not help in most cases.
from CTI Consulting http://ift.tt/2oqBXL6
via IFTTT

Attacks, crashes underscore need for new 911 systems -- GCN

Most of these crashes and problems are more growing pains that attacks, but the attackers are starting to target the 911 systems of communities and even states around the US, and to some extent overseas. There have been some very good nationwide studies of how this problem can be addressed, but since a good number of systems are still within their 5 year roll out and planning cycle, they just do not have the available funds to address the problem. Many experts I am talking to are just waiting for real cyber attacks to start. The firms that developed these 911 systems are often not equipped to patch software quickly, and know that the systems will fail. It is a vulnerability that needs to be addressed now, remember it is not just police, but fire and EMS services that will be affected.
from CTI Consulting http://ift.tt/2nt5p5L
via IFTTT

Cyber criminals targeting healthcare orgs' FTP servers - Help Net Security

This is a good article and uses a lot of stuff provided by the FBI, but in the end over 90% of the health care companies effected are not in any position to know how to put safe guards in, and can not afford to pay cyber security firms to help them out. Everyone is just trying to survive the next cyber attack, and would rather ignore the threat, until it hits them. Many cyber security companies are out there, but once engaged they run up the bill on all the vulnerabilities they find, and put in safe guards that get in the way of the operations of the health care facility.
from CTI Consulting http://ift.tt/2mIjNZ6
via IFTTT

MS-13 gang leaders puts out hit on ICE agent assigned to crackdown - NY Daily News

This is dated, but is happening more and more, police gang squads are being targeted as are their families. It is hard enough for these Law Enforcement Professionals to do their jobs with out these gangs putting hits on them. Yet still we have sanctuary states cities towns, universities that want to protect these gangsters. Police are being confronted by these gang members on a daily basis, and they constantly are being threatened by them gang members to try and get them to not do their jobs. The kids around them are starting to try and act like the MS-13 members, seeing that the Police would rather ignore than deal with them. Just so you do not think this is just in LA or along the border, both Northern Virginia and Montgomery County Maryland are having huge problems. Two kids that would not work with the gangs where chased down and killed in Montgomery County Md. one of the richest counties in the USA. They, the MS-13 have invaded the High Schools as well as the Jr. High and to some point elementary schools. In many cases it did not start at the schools, it started at the low income housing projects targeting any kids not accompanied by a parent, which is most of them until the Parents come home from work. In these up scale communities with scattered low income housing projects, the Police are not assigned to control them, so the gangs do. It fosters a growing criminal element that hold many of these projects in virtual control. This is nothing new for these gangs, this is how they work in their home countries to the point the government to include the police have to negotiate with the gang members as to who controls what areas of the projects. When the gang members arrive here, they immediately try and continue business as usual.
from CTI Consulting http://ift.tt/2mJ20Rx
via IFTTT

Unpatchable 'DoubleAgent' Attack Can Hijack All Windows Versions — Even Your Antivirus!

It is going to be a scary year I am afraid, this bad boy attacks any windows system, Microsoft does not have a patch for it, but a few anti virus systems do, and two have patches available already. This is much worse than any thing many have ever seen. The battle lines have been drawn and it will be a rough year.
from CTI Consulting http://ift.tt/2mTmVND
via IFTTT

Internet-Connected Medical Washer-Disinfector Found Vulnerable to Hacking

This is a great article for explaining what the larger problem with IoT hacks. When you first read this article a lot of people say who cares if they hack a washer disinfection machine, what could the hacker get, the last time the washer was used. But that is the great misconception, the hackers just use the device to get into the servers on the same network with the washer. Like the IoT cameras hit by hackers, yes they can get the video the camera is seeing but more importantly the hackers are now into your business or home network, once there they can get into everything on your network. Yes the hack attacked the washer, or the camera, or the thermostat, but it really attacked you network assocated with it.
from CTI Consulting http://ift.tt/2oqhOFc
via IFTTT

Sunday, March 26, 2017

Lockheed’s Laser Weapon Now Twice as Powerful | Industrial Equipment News

Life is changing on the weapons front on almost a daily basis. Keep an eye on it, your or your clients security depends on it.
from CTI Consulting http://ift.tt/2o59riV
via IFTTT

Hackers threaten to wipe millions of Apple devices, demand ransom

TrentonScottH : A dubious claim, but better safe than sorry: change your Apple password and turn on two-factor authentication https://t.co/ObOeCJiwvY
from CTI Consulting http://ift.tt/2nzWCz9
via IFTTT

Friday, March 24, 2017

Don't be Ignorant -- Check Your Privacy Settings!

This is something you need to do regularly on your computer, phone and tablet. Even if you let something continue and least you will have an idea of what things are not always private.
from CTI Consulting http://ift.tt/2nfL3eD
via IFTTT

14 Security Solutions Vulnerable to Double Agent Malware

That's part of the fun of Cyber security, a lot of the things we find have been with us for years, we don't know if anyone exploited them or not. Russia is not going to say, hey we got you three years ago with that vulnerability, no they will keep their mouths shut and laugh. Now on our side a Snowden type would be out there telling the world that we had exploited this vulnerability
from CTI Consulting http://ift.tt/2nlkS7Y
via IFTTT

Hikvision begins to sell video security kits geared for small, mid-sized businesses | Government Security News

It is interesting that Government Security News, would be running this article, since some Governments including our own, are putting warnings on the use of any Hikvision products. Cameras being a major part of the problem. Here is a quote from IPVM a major player on the use of cameras and camera systems. "China runs an advanced cyber spying program against the United States and other Western countries. Having millions of Hikvision cameras inside foreign networks is very valuable for Chinese government spying. Hikvision already has the worst track record in video surveillance for cyber security breaches." Hikvision also sells its products under other names, even some very well known Security Companies in the US re-brand Hikvision products for their low end sales. Buyer beware they are cheap, but come with a possibly very large price to your privacy and security.
from CTI Consulting http://ift.tt/2mA5SEp
via IFTTT

Weslaco Police Need you help in identifying suspects | KFXV The Valley's Fox News

This is where social media can shine, someone knows these folks, or at least has an idea, report it, and let the police sort it out. Take a look at the posture of the individual, chest out, shoulders back, these are all traits that can help you identify the suspect. This and the other crime stoppers photos can really help the Police take a bite out of crime, or at least a little nibble.
from CTI Consulting http://ift.tt/2mZFyij
via IFTTT

Assault against border patrol agents on the rise; 179% increase since October | KFXV The Valley's Fox News

It looks like this picture is being taken from a park on the USA side at a park on the Mexican side. The human traffickers in this area are all controlled by the Cartels, and they are getting nervous that the world is going change in a big way, which will negatively effect their incomes. As in any criminal element like the Cartels, they usually react with violence, both against each other on the Mexico side and as we are seeing more and more against our law enforcement, on the USA side. The Cartels have been used to getting their way on the border for the last 5 to 10 years, and have been able to keep the human trafficking masked by the movement of people that just want to immigrate. This masking allows for many on our side to claim they are just trying to let the children across, or putting families back together. In reality the Cartels rely on the illegal movement of people across the border for both cash flow, ready mules to take over the drugs to the USA, and to keep the Border Patrol busy with the people so more drugs can make it north. In the past in was almost a rule of business that you did not shoot at or around USA Law Enforcement on the USA side, so you did not bring on the wrath of the US Law Enforcement, but as the percent of increase shows, this is changing. The Cartels feel we are already surging to stop the border traffic, so what more can we do, so it would appear a sort of skirmish type of border war is developing. Dangerous for our Law Enforcement but also for the innocents on both sides of the border. Shots fired from Mexico can reach well into small towns on the other side of the border. Since the Cartels are not so worried about innocents on our side, them firing into the USA is not really a big concern, our Law Enforcement firing back is a problem that we will have to develop answers for.
from CTI Consulting http://ift.tt/2nwmz2C
via IFTTT

How safe is your connected gadget? Consumer Reports will start ranking them based on security

Consumer Reports should be applauded for this effort, they actually may set the standard for security of these Internet of Things (IoT) devices. Consumers to date have not gotten a lot of support on the security issues involved with these devices, ranging from Thermostats, Refrigerators, Bathroom Scales, and of course CCTV cameras, door locks and the such. Privacy is one issue, but actual security of your bank accounts, payment systems for your mortgage and even your electric bill are all available via these devices. More devices are coming on the market with some level of security options, but most of the original devices had no security on them. It has actually become a national security issue, with so many of these devices already infected with bot's or very small programs that can be controlled remotely to mount an attack on a Bank, or even the DOD's servers, it could well be part of a major attack plan from a hostile country. China has provided back doors into many of their products, that really can not be shut down, yet have an over 85% market share of inexpensive CCTV camera, and gaining a over 50% market share of all inexpensive cell phones being sold in the US and around the world. If Consumer Reports just let their readers know the problems with these devices, our security would be in a lot better shape. That is just the devices set up for attacks, now take all the innocent IoT devices that just have flaws in their software, that hackers can exploit. When you have to be cost effective to beat the other guy in the market, paying for software controls for your device becomes more expensive than the device it self, so are often not implemented, or not well implemented. Another factor is the ease of use of these IoT devices, they have to be easy to install or consumers just will not buy them, so most are set to be able to install with out any real computer knowledge, which once again brings in dangerous cyber vulnerabilities. So I am going to be watching to see how this new program unfolds here in the near future. Wishing Consumer Reports the best, this is a needed service, and one not many other companies out there could pull off.
from CTI Consulting http://ift.tt/2muDHFB
via IFTTT

Belgium: Muslim who tried to ram pedestrians had liquid gas, assault rifles and knives in car

Look for a long weekend, anyone that has been holding off an attack, because of not having weapons or do not know how to make a bomb, now has a way to participate. This is not new stuff what it is though, are folks that want to act have a person to follow. Go to the Dollar Tree Store by a 14 inch knife for a dollar, and get in your old clunker of a vehicle and go kill some people. The attack plan was developed over three years ago in an Jihadist training magazine.
from CTI Consulting http://ift.tt/2nrEgAt
via IFTTT

Recognising the terrorist threat - GOV.UK

Great resource to have in your tool box, they do things a little different, probably the most obvious is in how they handle the basics of Active Shooter Policy/Training. See if you can pick it out
from CTI Consulting http://ift.tt/1QPpzPd
via IFTTT

Thursday, March 23, 2017

Throw Back Thursday, this was the year CTI made the Inc 500 fastest growing business, as number 37, San our CEO was on the cover of Hispanic Magazine and on the same month had a article about her and CTI as one of the Women in Charge for Hispanic Business. Thanks to everyone for a very great year that year.


via CTI Consulting http://ift.tt/2ncAtF2

Protect Your Data

US Cert has put out an advisory that the aviation industry is being targeted for phishing scams: US-CERT has received reports of email-based phishing campaigns targeting airline consumers. Systems infected through phishing campaigns act as an entry point for attackers to gain access to sensitive business or personal information. US-CERT encourages users and administrators to review an airline Security Advisory (link is external) and US-CERT's Security Tip ST04-014 for more information on phishing attacks. They lead you to the Delta Airlines advisory and tip sheet.
from CTI Consulting http://ift.tt/2mxaNG4
via IFTTT

As Condo Towers Get Taller, Elevators Rise to the Challenge - WSJ

For those in the Security Field and more importantly in the Protection Field Elevators can become one of your biggest nightmares. Most Security Specialists in the US Secret Service have gone through at least one elevator inspection training class, and have a fairly good working knowledge of the different types and the problems associated with each type. But just for fundamentals, elevators are made to stop in most jurisdictions when fire alarms are pulled or smoke detectors go off. In many cases the elevators will all close and go to ground opening up to discharge any passengers still on them. You need to know how the elevators you will be dealing with work. If a bad guy knows the situation then setting a fire or pulling an alarm will send all the elevators to the ground floor and waiting for the elevators to ground is a valid attack plan. Perhaps your plan is to stop the elevator at the 2nd floor and get your clients off safely, be careful most will only go to ground once a fire alarm is pulled or a detector goes off. Fireman's keys can be life savers, but remember most are only a wrench type device that allows you to open the elevator doors, I have used them a number of times to get clients out of elevators that have just stopped. There is now also fire keys that allow you to override the programming of the elevators and a you can use them to get people safely out of buildings like folks in wheel chairs and such, but you must know how the override keys work on the elevators you are dealing with, not all are the same, and some jurisdictions will only allow the elevator to come to ground. Next is in these high rise buildings you almost are all ways above where a fire truck ladder can reach you. In most cases the fire trucks can not reach above the 5 th floor, and often only the 4th floor, once again it is up to you to find out what the restrictions are in the building you are at. New air packs can be great for providing you and your team as well as your client enough air to exit a building, or using filter masks to try and get enough air to safely get out of the building. Training with a Scott Air Pack like we are used to seeing firemen use is still a good skill to have, one pack can if used correctly get you and another person safely out of a building. Once again remember it is up to you to make sure that any air packs or filters are actually in a working condition. In approximately 50 % of the time air packs or air filters masks at buildings are stored for events, by the time they are going to be used, they are out of date, and not operational. Just some points you may want to have in that advance book to use as a check list.
from CTI Consulting http://ift.tt/2mwgOD4
via IFTTT

Free Hard Drive Tune-up Tools

Here are some tools to make your life easier, and can be used in some cases forensically to aid clients
from CTI Consulting http://ift.tt/2nbXW9x
via IFTTT

What causes lithium ion batteries to explode?

I know everyone is aware of the problems with Lithium Ion Batteries, but just in case, lets review some key points. If smoke starts to appear, get away from the device, trying to put it out or carry it somewhere is very dangerous. It was stated before that water would not put out these fires but that has changed, still try and insure the device is unplugged from the wall before trying to put it out with water. If you do have a class D fire extinguisher that is very effective in putting out these fires.
from CTI Consulting http://ift.tt/2nbQn2v
via IFTTT

33.6M Records Leaked From Dun & Bradstreet Marketing Account

This could be tough for a lot of businesses and lead to a lot of ransomeware attacks
from CTI Consulting http://ift.tt/2mZ3Jy8
via IFTTT

Scammers Obtain Thousands of Employee W-2s After Successful Phishing Attack

This is bound to have a lot of repercussions with April 15 approach and everyone getting ready to file
from CTI Consulting http://ift.tt/2mVdAUN
via IFTTT

Inside the Hunt for Russia's Most Notorious Hacker - American Security Today

Want to make 3 million, catch this Hacker for the FBI, hell the world. This article reads like a spy thriller, that's because it is, if you want to know how cyber crime works, in words all can understand this is it. A game of cat and mouse that Sherlock Holmes would love. Our FBI rolling up their sleeves and going head to head with the what is called the best hacker in the world. It also gives you a really great knowledge of the way the FBI is growing into one of the best cyber crime investigators in the business. Using talents of teams of Agents and Specialists they are wrapping up the bad guys in a big way. This is a must read from nerds to security guards, anyone in the security field should read this article.
from CTI Consulting http://ift.tt/2nMZ7zj
via IFTTT

Israeli man, 19, arrested in connection with threats against Jewish Community Centers in U.S., other nations - The Washington Post

I did not see this one coming, but it does have some lessons learned for me at least.
from CTI Consulting http://ift.tt/2ngJMp7
via IFTTT

Vehicles Becoming Favored Terrorist Attack Weapon - WSJ

It is a devastating weapon, CTI was brought in to work with a structural engineering firm for a client, on just what damage a vehicle can do to a building or the supporting roadway. This was a little new to us, normally we get called into review damage caused by vehicle bombs. This was just the vehicle itself, which required us to look at what the kinetic energy of different vehicles can develop at speed and the size of the vehicle. The study taught us a lot, and made me much more aware of the potential damage a vehicle hitting a building not to mention people can do. Basically a speeding truck hitting certain parts of a building can cause enough damage to bring portions of the building down. Even more than a small bomb in some cases. What they can do to people is scary, moving at high speeds, say over 40 miles per hour, a vehicle can make it though a very large group of people. It is a threat we need to spend more time addressing.
from CTI Consulting http://ift.tt/2nDFid5
via IFTTT

House seeks clarity on FBI facial recognition database -- GCN

Get a grip Congress, this is an investigative tool, you use it for leads, it is in no way accurate enough to use for even a warrant by itself, I would imagine. London has been using it for years with mixed success. The analysis softward is getting better, but it still has quite a ways to go use it for anything more than here is a lead you may want to follow. At least that is my take of the program at this point.
from CTI Consulting http://ift.tt/2ngKanw
via IFTTT

ISIS claim responsibility for London terror attack after British-born terrorist kills three and injures 29 - Mirror Online

Security teams need to be ready for management to ask how they can deal with the vehicle running down pedestrian issue. CTI has been providing clients from airports to court houses, and a lot of corporate building, as well as parks and shopping malls with solutions for mitigating the problem. One thing you can do right now is see what the cost of renting or buying Jersey Barriers, as well as installation is in your area. Then look at the availability, plastic water filled barriers are a good backup, but for longer term reinforced concrete should be considered. Bollards are also a good solutions, but buyer beware, CTI has analysed quite a few of them, some are more dangerous to use than not, but others are scientifically designed, and usually cost either the same or even less than some offered. If you need help in design or installation issue, please give us a call, we can reduced your research time.
from CTI Consulting http://ift.tt/2o8dCdd
via IFTTT

Police face questioning over London terror attack | Daily Mail Online

Personally I do not blame anyone in security for this attack, I just do not know their procedures enough, but I do think this is a good wake up call for all of us to review our access control procedures to insure we are not missing anything, or becoming to complacent in our duties. Perhaps it is time to do a few Red Team tests on some of our security programs. Mr. Joe LaSorsa, has a training program you may want to attend, learning to do an effective Red Team Test, it is going to become a much needed skill.
from CTI Consulting http://ift.tt/2nGjduH
via IFTTT

Wednesday, March 22, 2017

Hamas Again Caught Exploiting Charities to Fund Terror :: The Investigative Project on Terrorism

Prior to the elections that led to Hamas rule in the Gaza Strip, many Fatah members worried that if Hamas won they would be able to look at the books and see how funds had been misappropriated to benefit members of Fatah. Now Hamas for all it's statements that it would not allow any misappropriated funds to get in the way from the people of the Gaza strip, it seems to be doing the same thing if not worse. Former President Carter was in the area for the elections that put Hamas in power, Fatah tried to postpone the elections, but President Carter made some plea's to let the elections continue. He felt the elections would usher in democracy to the whole of Gaza, to include the West Bank, Gaza and the lands held in Jerusalem. The PLO as the oversight group, was able to conduct fair elections in some ways in the West Bank and Jerusalem, but Hamas controlled the elections in the Strip. They have never had what even looked like free elections since Hamas took over. It has become a more communist style of governance since that first free elections, and Hamas shows no signs of letting go of power A very strict version of Sharia law has been introduced by Hamas, with their own interpretations, that favors Hamas more than any other group in the Strip. AQ when I left the strip had only 2 guys, one flag flying over the family home of the two brothers. Now both ISIS and AQ have made inroads into the Hamas led Gaza Strip. Hamas tries to control the different factions inside the strip, but many inside do not see Hamas as much different than Fatah since they have control, except stricter. So the factions often gather together and form what are called committees with high sounding names, but are nothing more than loosely developed terrorist cells that will attack Israel in anyway it can. Most of the time it works out to only firing some homemade rockets into Israel, of which only a limited number even make it our of the Strip an luckily fall back to earth with out harming anyone. Hamas, at least from what I can see hold the control over any military grade rockets, and use them when larger scale actions occur. Fatah had the same problem when they had control of the Strip, these hot heads as the Fatah leaders would call these pickup terrorist cells, would fire rockets try and kidnap soldiers, making any chances of peace talks useless. I remember arriving in Jerusalem for a meeting between Fatah and Israel defense forces, during the early evening a group of these hot heads fired off some rockets from the West Bank at a patrol of soldiers traveling outside the Bank, on Israel controlled Jerusalem land. One IDF soldier was hurt, and a quick man hunt was made by the IDF into the West Bank. This of course led to a lock down, and so only the Peace project Ambassador from the USA, and a world bank member from England and I made the meeting with the Israel contingent, so to keep the meeting going I was given the role of the PLO Fatah side of the meeting. Hamas was thought to have more control of the hot heads, and did for a short time, but the hot heads are now making life harder for Hamas than they ever did for Fatah, plus Hamas does not like to look like they do not have control of the hot heads and often will take credit after the fact, to make it look like they are in real control. Most of my contacts have fled the Gaza Strip for the West Bank and beyond, leaving Hamas in total control of the Strip. Life for those I still can reach inside the Strip, is much harder under Hamas than it ever was under Fatah, but with no vote or representation it is not likely to change. If you watch every tyrannical regime through out the world work, it is pretty much the same, using scams they get elected and then impose controls over the people so that they can never vote to get out of the problem of Hamas.
from CTI Consulting http://ift.tt/2o1DhEg
via IFTTT

House intel chairman: Trump personal communications may have been collected - CNNPolitics.com

Now we are going to see some tweets, and fire fly from both sides. But if you know how data is collected in the USA it is not hard to believe. Lots of raw data is collected in sort of a grab it all method, most is not even not even looked at unless some one else has a reason too. This could explain the UK part of the story as well. The UK also collects lots of raw data, and shares it with the USA, mainly because we can look at large amounts of data faster the anyone else.
from CTI Consulting http://ift.tt/2nCIIgk
via IFTTT

U.S. Raid in Yemen Led to Laptop Ban on Flights, Officials Say - The Daily Beast

As we get more information on the travel ban you can see why they are being so cautious about the threat. Bombs inside batteries have been around for a while, but if this is a specific threat, than the ban actually makes a lot of sense. Batteries for small computer laptops can weigh almost a pound, consider the bomb that took down Pan Am 103 was 11 ounces, you can see that the threat is real. I would doubt that a tablets battery would be that heavy, but I did not do the assessment. I do diverge from this report on the issue of it has to be manually set off, almost all lap tops have clock systems in them, and can be made to set off the bomb, not to mention the 555 or 556 computer chip timers made famous by the Weather Undrerground and have been found all over the world. Each computer device usually has at least two batteries, one to operate the device, large enough to possibly hide a battery big enough to take down a plane, (but probably not) , but there is usually another smaller battery that keeps all the memory and clocks inside the computer or tablet running, and could set off a electronic detonator.
from CTI Consulting http://ift.tt/2mMZIvS
via IFTTT

Major Changes Planned for Reagan National Airport

TrentonScottH : Major Changes Planned for Reagan National Airport | NBC4 Washington https://t.co/aOqeQFci8t via @nbcwashington
from CTI Consulting http://ift.tt/2nSgR8X
via IFTTT

Attacker Stabs U.K. Police Officer Outside Parliament Before Being Shot

TrentonScottH : RT @WSJ: London's Metropolitan Police said 'we are treating this as a terrorist incident until we know otherwise' https://t.co/9zhpmKofpv
from CTI Consulting http://ift.tt/2mtcx3a
via IFTTT

Former Israeli airport security boss: electronics ban makes little sense | Reuters

Actually the ban makes perfect sense if they have detected a threat that uses electronics like Ipads, and larger laptop computers, then a ban till they know they can find them with our detection equipment is a good move. Our x-ray systems in place now can detect many devices, but a lap top computer for instance has plastic in the circuit boards that run the computer as well as many cases are made of plastic. If the x-rays being used some of these countries can not make that type of distinction then yes, travel with them should be banned from the passenger area's. As much as Israel claims a technical and training advance over other countries often including the USA, it has a pretty spotty record of detection, but it is not often allowed to be disclosed to the public, and the Press has very little pull in getting information on all the mis -steps Israel has made over the years.
from CTI Consulting http://ift.tt/2nRqWmQ
via IFTTT

Official: Police officer stabbed, sounds of gunfire reported outside UK Parliament | KGBT

This is a breaking story and a lot of the reporting is based on interviews of people in the area. UK Police are calling this a terrorist incident. Reports are coming in of a car bomb to start off the attack, multiple people shot, and a Police officer has been stabbed. Futher reports talk of a person running over people with a vehicle near a bridge in the area. It has been also reported the initial, and perhaps only attacker has been shot by Police. Remember this is breaking news and very few facts are known as yet.
from CTI Consulting http://ift.tt/2mt7orK
via IFTTT

2014 Santiago subway bombing - Wikipedia

fire extinguisher bombs have been found in the USA as well as other countries through the Years, those that have been through my ESI bomb course know of the ways we used to try and keep track of fire extinguishers, to minimize their use as bombs. Executive Security International has a bomb class coming up next month I think, you may want to attend.http://ift.tt/2msWp1y. On 8 September 2014, a fire extinguisher bomb exploded in the Escuela Militar metro station in Santiago, Chile, injuring 14 people, several seriously. Though no group or individual has claimed responsibility, the attacks have been attributed to the Chilean Anarchist group, Conspiracy of Cells of Fire.[3] http://ift.tt/2mULfyL
from CTI Consulting http://ift.tt/2mULfyL
via IFTTT

What Prompted the Electronic Devices Ban | Stratfor

This is a must read report created by Stratfor, it covers a lot of ground and is supported by historical facts, we may not know exactly what prompted this action by the TSA, but know it had to be backed by some pretty firm intelligence. Stratfor takes you down the historical use of bombs on planes that both worked and did not work, that itself is worth the read. there is a lot more that can be added, but this is a great review to use.
from CTI Consulting http://ift.tt/2mUFpxw
via IFTTT

5 Security Truisms for the Connected World

To try and slow the advance of the Internet of Things is pretty near impossible these days. But we do need to understand the vulnerabilities, each device we add to our homes, offices, even vehicles, is another vulnerability opening to the bad guys. There is not a lot of memory in many of these devices, like your refrigerator, the scales you weigh yourself in the morning, but you do not need much memory. Take for instance the refrigerator in the kitchen it uses its smarts to mainly tell you when something is wrong and does it by email, now all the bad guy has to do is insert a few lines of code (malware) that tells the refrigerator to email a certain email address, over and over again. When the bad guy gets a lot of the internet of things to email the same address, over and over that creates a denial of service attack, in other words the email address and the web and servers involved get overloaded, this is a simple attack. But take a computer security specialist that found some hackers and turned them in. They in turn used over 17 thousand IoT devices, the majority of them simple cctv cameras hooked up to the internet, that they had infected with malware to send constant emails to the security specialists email, for an added touch they sent some IoT devices to log on to his web site, and keep pinging it to keep it occupied, now the Internet company he used managed to stand up to the attack, but it drove all the other users of the provider, to have very slow internet capability and they lost money. After the third day the internet provider had to tell the Security Specialist to take his business somewhere else, he was hurting the rest of his clients.
from CTI Consulting http://ift.tt/2mTk9YV
via IFTTT

Tuesday, March 21, 2017

4 Types of Difficult People and How To Win Them Over

Dealing with people is key in every field, but more so in the Security Field, learning tips on how to work with difficult people is what this article centers on. Chris Voss is a former FBI Hostage negotiator, and has some great tips on dealing with difficult people
from CTI Consulting http://ift.tt/2njljQi
via IFTTT

Beleaguered TSA awaits new director as glitches mount | Fox News

It’s a wait-and-see attitude now to see which direction the agency will take, most airports and airlines need to hold off any big moves till we see which way TSA is going.
from CTI Consulting http://ift.tt/2o0Z7Yn
via IFTTT

U.K. considering joining U.S. airline electronics ban - Mar. 21, 2017

This is real threat, and we need to understand that the bad guys are going to move quickly to get this on a plane before the device is banned everywhere. Large electronic items have everything necessary to trigger and hide an explosive device.
from CTI Consulting http://ift.tt/2nGrFu4
via IFTTT

The Insider Threat, We need to look at old school leaks as well, both by insiders and folks with any access to our buildings. Here is a great report on Printer security, with some great ideas you can impliment for you team right now. http://ift.tt/2nxsswS


via CTI Consulting http://ift.tt/2nOM7pk

U.S. to ban some airline passengers from carrying larger electronics | Reuters

The way this is being rolled out, it is pretty apparent that a new threat has emerged, and we all need to be aware of the issue. The bad guys will be scrambling to find a way to use the new device before the new security procedures close the door on them. I am sure they are looking at the ban, and trying to find ways to get around it, like going to other airports not effected, and trying to go from there. Large, even small electronic devices have all the components needed for a bomb, it has batteries, wiring and internal systems that can be used for timing even location initiated explosive detonation.
from CTI Consulting http://ift.tt/2n7ziZd
via IFTTT

TN Amber Alert: Photos of Kidnapped Student & Ex-Teacher (Video) - American Security Today

Here is a great way to show the power of social media, lets find this guy, and the girl. Report anything suspect to authorities, in this case you need to bend your mind a bit. Things like facial hair can throw off ID's, he can quickly shave off the facial hair, and look quite different. The glasses on both of them also causes ID Problems, just changing types of glasses can throw off ID, but also doing away with them can throw off ID's. Next is hair color, a quick change can be a real problem, as well as just cutting it. The teacher has an unkempt look, but one trim can change him quite a lot. Look at them both sort of like a computer ID would. She looks like one of the Identikit base figures everything comes into the V, he on the other had has a much more recognizable facial line from ear's to eye's and mouth and nose. If you keep this picture of them on your phone to look at every once and a while, it will keep them forefront in your mind and let your subconscious be constantly looking for them
from CTI Consulting http://ift.tt/2mM0lpp
via IFTTT

Plans to build commuter terminal at Reagan National advance | WTOP

Good move on the part of the airport, and the move of the administrative offices was a good one as well. It is always a question when you move the admin offices away from the airport, you lose a little touch that you really could use from management. On the other had the advantages are very good as well. One in a crisis situation you could get easily blocked from your offices and even evacuated, so to have a point that is a little way away can be a great way to manage an incident with out being in the incident.
from CTI Consulting http://ift.tt/2mLEEWw
via IFTTT

Watch: Footage from Paris airport terror threat

This is survalence video of the Orly airport attack, notice he attacks from the rear, all he has in the beginning is a pellet gun, he points it at her neck,I doubt she knew what type of weapon it was, at that point it could have been a 9mm. Notice she is not cooperating fully, which gives her comrades time to set up. The biggest issue seems to be the passengers in the background in the line of fire. Once she goes down one of her comrades shoots the attacker. I am not sure why they didn't go in and take charge, but it could have been a worry about the attacker had a bomb. There's a lot to learn from this video.
from CTI Consulting http://ift.tt/2nhji7m
via IFTTT

U.S. to ban some airline passengers from carrying larger electronics

TrentonScottH : U.S. to ban some airline passengers from carrying larger electronics https://t.co/5bFCFPfnEn via @Reuters
from CTI Consulting http://ift.tt/2n7ziZd
via IFTTT

Monday, March 20, 2017

Red Team Testing, Training & Quality Assurance - LaSorsa & Associates - Executive Protection - Training - Consulting - Investigations

Interesting course, and could prove very valuable to have in your tool box. CTI was hired to conduct red teaming audits of all three NY and NJ airports for over a year, NYNJ Port authority wanted to get a step ahead of the rest of the airport community. We used former Police Detectives as the on the ground teams, doing 24 hour operations. We still do them for mainly Government agencies to test their security programs to include Executive Protection programs. A number of Fortune 500 firms have requested them, but most have been short lived, it really does find the weaknesses in security programs rather quickly. In the Cyber arena Red Teaming has become a real growth segment of the Cyber security tool box. CTI trained our staff and we tended to use people that have already had experience in covert operations. NY Detectives association was our main recruiting ground. I think it is a valuable course, and look forward to learning more about it. Best of luck LaSorsa & Associates
from CTI Consulting http://ift.tt/2nX9nRo
via IFTTT

Man killed at Paris airport planned to 'die for Allah': prosecutor | Reuters

The facts are just being released on this attack. it was reported earlier that the shooter had taken a gun from another policeman that had pulled him over, now we see he used an air-gun to attack the first officer, and shoot up the bar next. He then went to the airport and tried to take the assault weapon away from the female police officer, and we shot by other officers when they saw the opportunity. The Famas assault rifle he tried to take off the female officer is a bullpup design, made in France by the Government. If he had gotten hold of it, this story could well be very different. It fires a 5.56 bullet, with either a 25 or 30 round clip. It does not look planned at this time, which is somewhat worrying. To stop these shooters we need have an idea of what they are going to do, as most terrorist attacks do.
from CTI Consulting http://ift.tt/2mTlBLu
via IFTTT

Disable TELNET! Cisco finds 0-Day in CIA Dump affecting over 300 Network Switch Models

Here is a good way to start your week, go in and disable TELNET on your router, and a few other Cisco devices, come on you know how to do that. This vulnerability showed up in the Wikileaks dump last week. It has been around for a while, as are most of the vulnerabilities in this dump of CIA data. Some are blaming the CIA for not reporting the vulnerability of the Cisco Product line, but remember they want to be able to use this vulnerability against our enemy's, so telling is not a priority. As in most of the vulnerabilities exposed in the CIA Wikileaks dump, this was a Cisco error not something the CIA did, like the Samsung TV vulnerability, we have know about if for years, now, it has been reported more than a few times by this CTI Facebook page as well as on our blog at www.ctic.co which is why the stuff was not classified on the CIA data base, it is open source information. Most everything in the CIA data dump by Wikileaks are open source and known to much of the IT world. Now go and disable TELNET on your router, or buy another router, that probably has this vulnerability or one's even more dangerous to you. It is a dangerous world out there we all need to be careful.
from CTI Consulting http://ift.tt/2mIwP40
via IFTTT

Paris Orly Airport: Attacker: "I'm here to die in the name of Allah" - CNN.com

Good work by the Soldier's at the Paris Orly Airport this weekend, it is apparent that this shooter had more targets to go after.
from CTI Consulting http://ift.tt/2n8i4v5
via IFTTT

Tuesday, March 14, 2017

Beware This Clever "Fake Attachment" Gmail Phishing Scam

TrentonScottH : Beware This Clever "Fake Attachment" Gmail Phishing Scam" https://t.co/ZHkMD0HMS9
from CTI Consulting http://ift.tt/2mGOKJK
via IFTTT

Saturday, March 11, 2017

Great Reminder That You Need a Malware Scanner On Your Android Phone

TrentonScottH : Pre-installed malware found on Android phones. If you have one, you'll need a malware scanner. https://t.co/cdLYCnBsfs
from CTI Consulting http://ift.tt/2mcWdOO
via IFTTT

Thursday, March 9, 2017

T-Mobile's 'LTE-U' program will use unlicensed spectrum for more LTE bandwidth

Is this the new future of wireless, let us hope not, now it is used by only a few, with phones set up to use it, as more come on board, this 20 meg band will fill up and be come more and more troublesome. But their are other items for free or low cost WIFI like http://ift.tt/2n3xl18 CBRS has been around for a little while, and it is believed that Airports, Factories even Government agencies with be using if soon. Some of these new possible internet connected plans, came out of an attempt to provide first responders with a way to communicate with out having to rely on cell bandwidth, which gets eaten up when an event like a plane crash or terrorist event happens. Every one jumps on their cell phones to tell others what is happening, and soon the cell bandwidth for the area is jammed. But if the trend continues perhaps more cell bandwidth will reappear.
from CTI Consulting http://ift.tt/2kO5Jfx
via IFTTT

Rich

I have not read all the items in the 8000 plus pages leaked this week, but from what I have read these had been vulnerabilities used against us in the past, and just re-used for the most part against the bad guys, for my part good work NSA, CIA, DIA, and FBI, keep it up.
from CTI Consulting http://ift.tt/2niVVag
via IFTTT

Wednesday, March 8, 2017

Trump plan pays for immigration crackdown with cuts to coastal, air security

TrentonScottH : Administration proposes cuts to TSA, Coast Guard, FEMA. TSA budget would decrease 11% | https://t.co/gQ4BpWBp4A #aviationsecurity
from CTI Consulting http://ift.tt/2mAbhKQ
via IFTTT

Tuesday, March 7, 2017

White rhino shot dead in French zoo, horn sawn off

TrentonScottH : White rhino shot dead in French zoo, horn sawn off | Either a complete security failure, or maybe an inside job. https://t.co/O4cWTt4uZV
from CTI Consulting http://ift.tt/2mUEn84
via IFTTT

Friday, March 3, 2017

Watch: Guy Builds Shotgun Out of Items Purchased After Going Through TSA at the Airport

After reading and watching the YouTube Video, It is impressive but not very effective. We really can not show the good stuff on facebook, book, and most of it comes from former convicts, but suffice it to say, it aint that hard is it. If we show you all the ways to sneak a .22 short past screening, then all you need is a bic pen tube.
from CTI Consulting https://shar.es/1UfXM2
via IFTTT

Thursday, March 2, 2017

JASON DEREK BROWN — FBI

If you want to make an easy 200 thousand dollars, keep an eye out for this guy, he is wanted by the FBI, and usually makes a big splash anywhere he goes. The power of the internet and social media is that we can get this guys face in front of a lot of people. There are different amounts for others on the top ten list, and there are other wanted lists available at this site.
from CTI Consulting http://ift.tt/2m0q5RS
via IFTTT

This ammunition is made in Mexico and available in the USA via some gun stores and over the internet. It has been tested and can make it thru Bullet Resistant vests considered to be 9mm protection.


via CTI Consulting http://ift.tt/2m0gGK2

Meet 'Silent Hunter' - China's New 'Armored Vehicle Slicing' Laser Gun | Zero Hedge

The USA has been able to cut a plane in two while in flight, for at least 10 years. Lasers are becoming one of the main thrust for weapons development. The word around the military is that the US has jeep based lasers that can do damage from a little less than a mile away, by damage, stopping vehicles and of course killing people. But we have sonic weapons that can clear a field of battle among other weapons that are right out of star wars.
from CTI Consulting http://ift.tt/2lWwPAj
via IFTTT

Spending Millions to Keep a Home Safe - WSJ

High Security can be costly, and almost always a such a problem to keep maintained that in less than a year, over 80% of the system is not being used.
from CTI Consulting http://ift.tt/2lYgDyx
via IFTTT

Terror Threat to U.S. Airports Said to Grow as al-Qaeda Rebounds - Bloomberg

In talking with folks associated with terrorists, probably terrorists themselves, they always talk about aviation attacks with almost reverence. To them it is the target that gets the most bang for the buck. I have been told that we have spent so much on Aviation Security, that each time they mount an attack it is a slap in the face to the West, saying see they can not even protect aviation, even though they keep upping the costs each time we attack. In one report last year in a magazine AQ publishes, they touted the cost of one attack at less than three thousand dollars, and the West spent over 3 billion to counter, the attack even though the attack was not successful. They point to the fact they can make it so expensive the West will bankrupt itself trying to counter them.
from CTI Consulting http://ift.tt/2mJSGZQ
via IFTTT

Wednesday, March 1, 2017

9 Popular Password Manager Apps Found Leaking Your Secrets

This one hits a little close to home for me, but notice almost all the big ones are listed. Unfortunately if you use a free system, you have very little that can be done about it. Even a dollar contract with a firm like this, does provide you with some recourse, no matter what they made you sign to use the service. Tort law has been around a long time and is hard to get around, if you pay for a service you have a contract, and they have a duty to protect you. Still if you are going to use one of these services, I would read the article.
from CTI Consulting http://ift.tt/2mcQGMj
via IFTTT

Teller Trouble

Insider threat are everywhere even at the banks, and the great buy up of smaller banks by bigger and bigger ones, is showing a threat vulnerability, or opportunity that was seen before but not at these levels. Part of the problem with all the buyouts and consolidation of services, is that staff see people loosing jobs all the time, even though they are doing a good job. So the whole process people are taught through their lives that hard work will keep you employed, just is not working in this age of by outs and mergers. You can be the better worker, but if you are with the smaller firm, you can still lose your job. This lends it to a model of everyone is out for themselves, forget loyalty to the firm. Now they see the grey or even illegal actions of people like opening accounts for people with out their knowledge both benefits them personally monetarily and in promotions. With the almost constant turn over in almost every field now days, loyalty is the biggest loser. Banks are just one of the casualties facing huge insider threat problems now days.
from CTI Consulting http://ift.tt/2mM3ZQr
via IFTTT