Friday, April 28, 2017

Healthcare records for sale on Dark Web | CSO Online

Your Healthcare records maybe worth a lot to you, or at least your privacy, but to Hackers selling records on the Dark Web their worth is less than 1 cent per record. As in anything it is a matter of supply and demand, At this time the supply is so great, that hackers are bidding against each other to sell the data the cheapest. Now let say you my little Russian friend, but all the records, by the way this just means he has access to them, but they are still for sale to anyone else that wants them. But now you have the list with the Names of patients the type of narcotic they are trying to quit taking, the amount of Methadone they are using to try and quit. Now run those names against lists of Government workers, or even Private Industry workers to see if you can get a match. Now you can be a blackmailer to the people on the list. Now perhaps your boss knows what you have in your background, but do all your fellow workers know, how about clients you deal with. And you do not need a lot, perhaps a door left open, or a password to the network supplied. Anything to get you involved in some criminal act. Now you use that to ask for some really big stuff, or we will tell that you gave us private info. Health records are becoming more and more available, and since they are the keepers of them are getting more and more lax in protecting them. That little clinic in Baltimore has people entering data in to password protected data bases all day, and he or she is tired and needs a break, so they take a day off, and hire a temp to enter the records with a password. Now the temp goes to a bar that night and is asked what the password is, seeing no harm it is given. So all that data is now available to the bad guys. The real bad news is these innocent infractions are happening everyday, and the bad guys know which type of people to approach, and get that first password, or leave that door open. I am not sure how we stop it.
from CTI Consulting http://ift.tt/2oQIVJg
via IFTTT

Preventing and Responding to Identity Theft

Everyone needs to know how to detect Identity Theft and Fraud, and then what can they do about it. The US Government is taking a larger role in assisting Citizens with recovery from an event as well as letting citizens get involved with the investigative part of recovery.
from CTI Consulting http://ift.tt/1mBet4X
via IFTTT

Nuclear aftermath drills held at MetLife Stadium

TrentonScottH : RT @Onsceneconsult: Train as if your life depends on it because it does. https://t.co/BqyIGrCo3H
from CTI Consulting http://ift.tt/2qjCKhY
via IFTTT

Our clients face a lot of different attack vectors in the cyber arena, understanding the methods and what the vector is looking for is critical.


via CTI Consulting http://ift.tt/2ppKqQG

via CTI Consulting http://ift.tt/2qeM2Q1

via CTI Consulting http://ift.tt/2ppQhpf

For all those IOT devices, like cameras, Smart TV's, Alarms you have installed on your network, it will be attacked with in the first two minutes, on average. Some get hacked just as fast, in fact some log onto malicious web sites, as they are started.


via CTI Consulting http://ift.tt/2qeK4zd

Thursday, April 27, 2017

McCaul Introduces Bill to Assist Communities to Become More Resilient in the Wake of Terror Attacks and Active Shooters - House Committee on Homeland Security

TrentonScottH : House Bill to Assist Communities to Become More Resilient in the Wake of Terror Attacks and Active Shooters https://t.co/zl7MnGtl8S
from CTI Consulting http://ift.tt/2pERXht
via IFTTT

Here is what is going to be part of the border fence project. Capturing and following cell phones as they approach the US border and then linking them to video camera feeds stationary and on blimps and drones, tying them to other cell phones they are tracking as well as who called in and out is all part of the game.


via CTI Consulting http://ift.tt/2prpMkW

This is a great graphic from an article I just read that deals with the big data intel grab, down to usable intel. Think NSA, it just grabs everything that is on the internet or voice. Then it takes its time to filter it down, the nice thing is, is that it is all there if needed at anytime. I am told that there are some items in the NSA funnel stack that go back past the Vietnam war. Still not listened to or decoded.


via CTI Consulting http://ift.tt/2oQh6lm

The Paparazzi-Proof Airline Terminal - WSJ

The use of this terminal can be expensive, but if you have a client that needs a place to hold a meeting or just a place to be private before or after a flight it makes a great holding room. LAX has a lot of solutions for working with VIP's to include a well trained EP team that can get people in and out of the airport as safely and quickly as needed.
from CTI Consulting http://ift.tt/2qjYZnU
via IFTTT

US intelligence agencies fear rogue insiders as much as spies these days

Insiders have always been a problem, it is just more defined now days. Almost all effective spies have achieved insider status to conduct their operations, but they tended to keep it away from the public at large, and they are still there, working inside our government still every day. But damaging by public disclosure is what we are dealing with here. This is partly a product of our new big data problem, if you look at the 50 tera bytes of data the one NSA contractor just took with him, you get an idea of the problem. I am old school, and admit it, stealing 50 terabytes of data back when I was in Government would have been more data than we had at the time. It would have taken more than a few truck loads to even get a percentage of the data stolen by the three named in the article. Like anything else, when there is so much of it, it is hard to convince themselves that it is all that critical, which is another problem, we classify so many things, that it has diminished the meaning of classifications. I do not see it getting better, in fact I see it getting a lot worse.
from CTI Consulting http://ift.tt/2p8bLYV
via IFTTT

Dulles CBP Finds Heroin Concealed Inside Lollipops (Learn More, Video) - American Security Today

Good find by CBP, this was a pretty good concealment technique. I wonder what in the x-ray set them off, or was it just one of the great CBP intuition deals. In the end after playing with the Israel method of Behavior analysis as well as the US Secret Service and a bunch of great outside input, CBP's methods have proved to be some of the best. They could not always explain how they did it, but they have been doing it for years. They profile , oops bad word, people coming into the USA millions of times a day, they have found everything from Rabbi's carrying narcotics to the businessman who brought in Cuban cigars, most of the time by just observing them walk in and deal with the process of coming in,
from CTI Consulting http://ift.tt/2pm9Mip
via IFTTT

Why Do IoT Companies Keep Building Devices with Huge Security Flaws?

TrentonScottH : "Why Do IoT Companies Keep Building Devices with Huge Security Flaws?" A good question https://t.co/jXjj5eVvqY
from CTI Consulting http://ift.tt/2qiQOIF
via IFTTT

Wednesday, April 26, 2017

How to Secure Your Online Accounts By Revoking Access From Third-Party Apps

TrentonScottH : How to Secure Your Online Accounts By Revoking Access From Third-Party Apps https://t.co/6TIxjfhUhn via @lifehacker
from CTI Consulting http://ift.tt/2q8jrvw
via IFTTT

Up to 50 men assault armored car company in Paraguay and reportedly make off with $40 million

TrentonScottH : It's not just terrorists using coordinated attacks - criminals are also significant security threats https://t.co/cXxfWAAPym
from CTI Consulting http://ift.tt/2p27iHl
via IFTTT

Tuesday, April 25, 2017

Police restrict access to Lot C at LAX during investigation of suspicious car

I think this was handled well, I hope all our airports are ready for an event like this. It is a good bet we will see more of these in the future. Well handled LAX, to the rest of the airports have you ever tried to handle this on one of your mandated exercises. I would look at doing at least a table top soon, you need to understand how we will get through an event like this and keep the airport open.
from CTI Consulting http://ift.tt/2q3Q6jk
via IFTTT

Just A Drill: Full-Scale Preparation For Terrorist Attack On Wednesday Includes Actors, Six Sites

TrentonScottH : Full-scale terrorism exercise in DC this Wednesday https://t.co/Ddoln1vXKE
from CTI Consulting http://ift.tt/2pfTS9c
via IFTTT

Trump Names Retired Marine Corps General To Lead Secret Service

TrentonScottH : Trump Names Retired Marine Corps General To Lead Secret Service : NPR https://t.co/8yQAKQjiAg
from CTI Consulting http://ift.tt/2pj8dUk
via IFTTT

Call for Security Upgrades at Penn Station -- Security Today

It is scary to think that this has not been done. Considering that most of the larger stations along the rail line has been conducting drills with all entities involved as well having command centers that take in camera feeds, and communicates with the all the Law Enforcement and Security having anything to do with the Station. That Penn station is not up to speed borders on the unbelievable. CTI was conducting table top drills for Union Station in Washington DC back in the 90's and early 2000's, Philadelphia had security assessments to it main station, that brought everyone into the loop, as well as table top drills. Boston, Atlanta and Fla. all worked on this issue back in the early 2000s as well. It is a good idea for any facility to conduct at a minimum table top drills covering things like active shooters, to weather issues, to medical issues. Every EP team let alone ever corporate security team should be using table top exercises to insure that they are prepared, why Penn Station has not, is hard to explain. FEMA has an excellent online course in setting up Exercises to include Table Top's It will take you less than 2 hours to complete and after the test will send you a certificate. http://ift.tt/2q1WPtP
from CTI Consulting http://ift.tt/2pi6tdW
via IFTTT

Packet sniffers – SecTools Top Network Security Tools

For all you worried about what Uncle Sam is doing and viewing of your network traffic, take a look at these, there is virtually a way to look at any traffic out there. Use this on that hotel network to gain password info, even decode voice over IP traffic, that the user thought was protected. It takes a lot of systems like WireShark, still free by the way, to wireless IP traffic detection of hidden traffic.
from CTI Consulting http://ift.tt/Y70aS1
via IFTTT

Corporate E-Discovery Struggles With Employee Mobile Device Proliferation | Legaltech News

This is an ongoing problem, and often is not even thought about till it is to late. E-Discovery can expand rapidly, but it does need a path of possible evidence. Like someone saying in a deposition, he always texted me about those meetings or accounts. Many try and do a shot gun approach to E-Discovery and ask for anything and everything. In many cases a Judge will limit the reach of E-Discovery, unless it can be shown that an area may have pertinent information. There are basic E-Discovery training modules both in power point and you tube, that anyone can get a better idea of the problem.
from CTI Consulting http://ift.tt/2oInVFh
via IFTTT

US considers cabin laptop ban on flights from UK airports | World news | The Guardian

The threat is real, and evolving, we need to understand that it seems to be backed by specific intelligence received, TSA and others are going to extreme lengths to find a way to insure the device(s) can be detected. The problem is some countries have larger numbers of sympathetic employees to radical Islamic causes. For instance in Egypt the Muslim Brother Hood has large numbers of sympathizers working at the airports and other critical areas around the country. It is very difficult to determine insider threats, and radical Islam has low income workers at airports around the world. The US is not immune to this problem, a 54 year old recently converted to Islam, and then moved into radical Islamic beliefs had been working at a medium to small US airport in the heart of our country for years. Luckily for the US his first forays into radical activities was picked up by a FBI staffer and his comment " I have this access to an airport, and think it is my duty to Islam to exploit the vulnerability. " was enough to get the FBI to follow this man's activities and then arrest him as he finally approached the airport with a vehicle he thought was filled with explosives. We all need to be a little more patient with TSA till the threat can be averted, which may never happen, but we hope will.
from CTI Consulting http://ift.tt/2opPBTl
via IFTTT

The #1 Reverse Psychology Skill For When You're Attacked in a Negotiation

Many times to win you have to step out of your comfort zone and use the attack as your opening to advance your negotiations. This is a great read, and as Mr. Voss says like anything effective you have to practice.
from CTI Consulting http://ift.tt/2pvQCtn
via IFTTT

Monday, April 24, 2017

Ransomware Is Being Hidden Inside Attachments of Attachments

TrentonScottH : New Ransomware Is Being Hidden Inside Attachments of Attachments. Treat everything as unsafe until you verify it. https://t.co/jvD88j3Vqe
from CTI Consulting http://ift.tt/2pZqQNK
via IFTTT

Knife Laws by State United States | Survival Life

CTI has posted other knife laws by States in the past, but it is always good to be aware of what is legal and not. As you read through these you get a feel for what each State has in place for carrying knives. In Some cases even local jurisdictions have their own laws on the books. State's have in many cases take the position that only State Laws rule, but in other States they only require the local jurisdictions to meet the State Law, but they can make stiffer laws if they want. There are two basic reasons for knowing the laws and having this document in your advance manual. One is so you do not violate the law, or anyone on your team, Two is so that you can use the laws to help Police help you with potential problem people at events you are protecting. Many Police and other Law Enforcement officers and staff are not aware of all the laws regarding weapons like knives, so having a document like this available, can let them help you with folks you do not need at your event.
from CTI Consulting http://ift.tt/2pboSqS
via IFTTT

What went wrong: How the Fort Lauderdale airport shooting spun out of control

TrentonScottH : What went wrong: How the Fort Lauderdale airport shooting spun out of control - Sun Sentinel https://t.co/2jauORxJ4H
from CTI Consulting http://ift.tt/2q4K0hB
via IFTTT

Mexico says 2 top drug traffickers killed near US border | KGBT

Great news, but beware of infighting between the next level of Cartel Leaders trying to take charge of the Cartel action. It is unfortunate but a fact that more violence will take place for a while, still If Mexico can stay the course and hit the next level of Cartel leaders, and keep up the pressure, they can eradicate the power of the Cartels. Denying the Cartels to work the border regions, will send a great message to them, that business is over.
from CTI Consulting http://ift.tt/2oo1Wr5
via IFTTT

Uber’s C.E.O. Plays With Fire - The New York Times

This is being done a lot, you think you have deleted an app from your phone or tablet, but portions of it exist hidden. If you think our problem is Big Brother Government, hold the phone, Big Brother Corporations are your privacy issues. My favorite Airline is United, but I refuse to down load their app, take a look at all the privacy issues involved with accepting their app. We need to push back on all these app's that are gathering data that is not needed for their operation. Yes China and to a lesser extent Russia are invading our privacy, but Corporations are the biggest invaders of our privacy going. At some point we need to start legal actions against these Corporations that gather so much data, and then do not protect it properly, or at all in some cases. I hear all the time about the danger of Big Government privacy issues, but the real culprit are Corporations, and one big danger is their app's.
from CTI Consulting http://ift.tt/2p69JHd
via IFTTT

Saturday, April 22, 2017

"Total Chaos" - Cyber Attack Feared As Multiple Cities Hit With Simultaneous Power Grid Failures | Zero Hedge

There is not enough information yet to make a call, but it is good that the artical is bringing the idea up. Very quietly some businesses are electronically disconnecting from the Grid. This has been to keep their power systems away from hackers, but it also puts some distance between the local system and the grid if a problem develops. It is a story to keep an eye on.
from CTI Consulting http://ift.tt/2p0I4Yb
via IFTTT

Wednesday, April 19, 2017

Bill Gates: Terrorists could wipe out 30 million people by weaponising a disease like smallpox

Years ago I was on a panel with experts from the bio-terrorist arena. The conclusion of the panel, which included Russians, Israel, London, among others, was as Mr. Bill Gates states here is small pox. 30 million people may be a very low number, the panel was also clear that no major or even low level Government or Terrorist group would unleash such an attack, since it was so uncontrollable, and could hit home, the terrorists home as easy as the people it was directed at. A Russian at the convention made the comment that they had tested units that could blend in like a simple plugin air freshener. The problem we have now is that ISIS or AQ is facing possible huge losses, and may not find the uncontrollable part of the problem a negative. In other words they may actually mount such an attack.
from CTI Consulting http://ift.tt/2oQ7FmL
via IFTTT

5 Best Hidden Camera Apps for Android and iPhone - Pro Domain Blog

Mix this with cheap android phones you can buy with out bothering to install a carrier, all you need is wifi and the app and you are in business, or if you are in a dastardly frame of mind, give 10 bucks to someone that has a few Obama phones. These can be even placed into service with buying the proper phone cards, and then you are in long term business, other than the fact most of this is very illegal, and could get you in a lot of trouble. Most can be found with some simple apps you can put on your Android or I Phone.
from CTI Consulting http://ift.tt/2pETv7Q
via IFTTT

Jeff

This scam is growing day by day, we all need to be aware of it. We are looking at a huge increase in jobs in virtually all sectors, so it is easy to get scammed by this type of bogus Linkedin email. Linkedin is the leading group in getting out new job opportunities , so you still need them, but as always look out for scammers.
from CTI Consulting http://ift.tt/2pi91tc
via IFTTT

Monday, April 17, 2017

Is your printing environment vulnerable to a breach? | Insight

With all the protection we try and provide both physical and cyber we need to be sure our peripheral items like printers and router are kept secure as well. Here is a quick video on how to go about securing those printer, that are often wireless these days, causing even more problems.
from CTI Consulting http://ift.tt/2pJEfWH
via IFTTT

Homeland Security issues terror warning for NJ malls and shopping centers

More and more of these threats are being upgraded in the past few months, and many resorts and malls are taking these threats more seriously as well. Of the 8000 named in the last set of threats, for some reason these threats are making the Federals worried. CTI has conducted risk assessments as well as blast assessments for a number of the facilities threatened. These are costly and if all the recommended options are followed, could be extremely costly. On one of the assessments it was obvious the threat addressed was not the most likely target to be attacked. It would appear that false flag information is also being provided, or their target assessment teams are moving to a different set of priorities. Everyone in both Corporate and Executive Protection need to up their game a bit to meet these rising threats. Those of you that have been to ESI schools that had bomb threat classes really need to hone your AT Blast assessment tool skills as well as your risk assessment skills. I am not sure the need has ever been greater. Our Law Enforcement and Intel agencies are doing a great job, but they are going to need a lot of support from the private sector, there are just to many targets at this time.
from CTI Consulting http://ift.tt/2pu5rt5
via IFTTT

9 Ways to Sharpen Your Senses | Make a Mess: Everyday Creativity

This may seem a little light, but if used, is extremely powerful in adding to your skills for safety and security.
from CTI Consulting http://ift.tt/2pj1Nox
via IFTTT

Sunday, April 16, 2017

The Myth of the Gun in Executive Protection

It is the hope that everyone in the Executive Protection arena read this. I have made statements like this in the past, and met with a lot of push back from the community. Weapons do have a place in EP work, but you need to understand advance work, instinctively look at situations, with evacuation routes, cover positions, and options for changing routes, event venues, and even cancel events at times. Concentrate on learning how to read people and situations constantly, never stop learning these critical tool's. Constantly learn about both old and new attack modes, learn how bombs are used in attacks, snipers are used in attacks. Motorcade placement at pickups and drop off are critical since it has always been a favored attack point. Having secondary options for vehicles, points for pickup and drop offs, even routes are a must. Never forget that holding rooms are great places to hold in place till events and situations are clarified. In many states licensing for Executive Protection Agents, are weapons based only and most if not all ever require any knowledge of actual Executive Protection skills. This is once again this movie view of Executive Protection.
from CTI Consulting http://ift.tt/2pFxXqK
via IFTTT

Friday, April 14, 2017

How to Spot a Link You Shouldn't Click On

TrentonScottH : How to Spot a Link You Shouldn't Click On https://t.co/J67U87NoSL
from CTI Consulting http://ift.tt/2oHRpWH
via IFTTT

Sunday, April 9, 2017

Florida gunman killed after 'shooting 2 at an Equinox' | Daily Mail Online

No facts at this point, but possible steroid use is something to be considered when developing a risk assessment if brought in to support a companies firing of an employee. Most firms only want you there when they actually fire the person, but it is advised to keep track of the fired employee for at least a few days after the firing. Make sure a picture of the individual is available to any building or parking guards/ attendants.
from CTI Consulting http://ift.tt/2pfDF2C
via IFTTT

ISIS Claims 2 Deadly Explosions at Egyptian Coptic Churches on Palm Sunday - NYTimes.com

There is a lot to learn from this, probably the biggest is multiple layers of security. EP teams need to gather all the help they can get like Hotel or event security, check their training of course but in any case they can be used. I have paid money to hire security guards to be a first line of security, and to hold posts in hallways and even in event rooms, or the protectee's hotel room, or office. In the case of the first bombing they did have security, still the bomber rushed past them and into the church. If you had a protectee in the church, it would have perhaps given you the time needed to get some protection for you client. Getting them away, with pews between you and any bomb or bomber is your best bet. You can see in the picture that the bomb moved some pew's, but for the most part they stayed intact. In your case if you could have gotten your client a pew or two away, plus the distance could well have save your client, and by the way yourself. As we go over what a bomb can and can not do in next weeks ESI bomb class, you will learn ways we can survive these types of attacks.
from CTI Consulting http://ift.tt/2nQO1Vz
via IFTTT

Saturday, April 8, 2017

Uzbek man arrested over Swedish truck attack that killed four

TrentonScottH : Uzbek man arrested over Swedish truck attack that killed four | Reuters https://t.co/VilObAjOtJ
from CTI Consulting http://ift.tt/2nqi8Yv
via IFTTT

Friday, April 7, 2017

Hijacked truck crashes into Stockholm store in terror attack | US News | themonitor.com

This type of attack is gaining in popularity mainly for the simple reason it is easy to do, and will work everywhere. Including small towns all over the world. More and more the use of bollards are being deployed to both stop vehicle assaults and in many cases to give people ways to get out of the way of vehicle assaults. The deployment for both can be pretty much the same, but if just getting people a way to get away from the vehicle then it requires a lot less bollards. If walking try and always keep an eye on what is coming up from behind, and look for anything that can possible deflect a vehicle and walk near it, so you can get out of the way quickly. There are not enough police in the world to cover all soft targets, it is going to take each of us looking out all of us to stop the terrorists
from CTI Consulting http://ift.tt/2oN2lCW
via IFTTT

Truck Strikes Pedestrians In Stockholm, Injuring Multiple People

TrentonScottH : Developing story out of Stockholm, possible terror attack via truck. If true, this is the latest in a string (1/2) https://t.co/NgCOm8C3h6
from CTI Consulting http://ift.tt/2nlUc8s
via IFTTT

Thursday, April 6, 2017

Syria conflict: 'Chemical attack' in Idlib kills 58 - BBC News

I am not sure we will ever get the real story on many of these attacks. Sarin is what preliminary reports are saying, but they are quick to say a sarin type chemical is suspected. Sarin is very dangerous and if made to what is called military grade level, would have killed just about anyone touched by the stuff. But like the Japan attacks this has proven to be not as effective as a military grade. If as some suspect this came from chemical weapons smuggled out of Iraq during the days before the war with the west, it should have been more effective. Iraq had chemical plants built by German companies, explained as pesticide plants for agriculture, use. The fact they had two plants with vats the size of football fields, which if used for pesticides would have covered the market for the world 10 times over, is a bit problematic, and when questioned by the Germans as they built them. Saddam apparently said we will finish off the Jewish problem you Germans could not carry out. Still these would have been pretty potent chemical weapons. Not what we are being told we are seeing now. Plus these weapons came in with high explosives according to the reports, which tends to vaporize chemical weapons due to the heat, but still it could have happen this way, Another issue is that during times of the Syrian conflict in the beginning Syria had their stockpiles all over the place, it was only after words that the Syrians brought them all to one place, or at least that is what they said, and we among other nations collected, itemized them and then destroyed or took them. But in the beginning it was rumored that the Rebels had raided some of the stock piles for their own use if the Government used them. It was also rumored and it looks like it is true to some extent that Syria never turned all them in. But lets go with the Syrian Rebel rumor, if they had hidden stock piles of the chemical weapons, and a bombing raid by the Syrian Government or Russians happen to hit near the stock pile, then the leaking cylinders may have caused the belated slow release of the chemicals. No facts here as of yet, but it does fit what we know about the attack so far. Stay tuned for more "facts" or probably more rumor.
from CTI Consulting http://ift.tt/2ox7izI
via IFTTT

Trenton

Not this is all pretty tame stuff and some of it is not all that accurate. But the really sensitive stuff is not in a fluff piece like this one. I know a few of the authors, at first you could not really talk to them, but now days so many books have been written, you can deal with them again. The Presidential and the VP details are the top of the US Secret Service and for the most part the teams either pick or get a version of go no go on new members. They have a pretty good skill set to get there, but team work is the only way it gets done, so getting people that work well together is more important than their skill level of martial arts, or how much weight they can lift. Their training is a key part of the success, and once again team work is critical. As a Security Specialist back then bombs, physical security and counter espionage was my task, and you would flip between your main tasks, to bomb searches all the time. Our bomb training was a constant thing, we went to Navy EOD schools, FBI classes, and or CIA classes at least once a year. Counter Espionage classes for the few of us in that area was also fairly constant, but certain of us also went to the NSA counter espionage courses which where really more how countries gather intelligence and what other countries are doing and what they are looking for. I was in before the wall came down, so 90% of my work was counter Soviet, even when in China it was Soviet devices we looked for back then. That has all changed now. Back then both US and Soviet espionage and counter espionage teams knew each other well enough that we could tell a lot of the time when a team was around just by the suite cases they carried, and usually by the sound different suite cases make being opened up.
from CTI Consulting http://ift.tt/2ni5w5y
via IFTTT

Tuesday, April 4, 2017

Preventing Vehicle Terror Attacks on Campus with Bollards - Campus Safety

Bollards come in different sizes shapes and fixed or just standing there. After the first attack on the World Trade Center, the Port Authority of New York and New Jersey had a challenge for designers the world over on designing effective and good looking bollards. Most of them ended up in a HUD book you can still find on line, and I still use constantly. Bollards are usually based on scientific knowledge, but quite a few are not. Being brought into evaluate bollards has made int apparent that some bollards have no design basis, other than they are heavy. Some where found to be more dangerous than not having them at all. One once hit by a car the size of a VW bug, basically turned into a rolling pin hitting anyone in its way.
from CTI Consulting http://ift.tt/2o7Aeh4
via IFTTT

St. Petersburg Bombing Suspect Identified; Death Toll Is At 14

TrentonScottH : St. Petersburg metro bomber suspect identified as Akbarzhon Dzhalilov, 22-year old Kyrgyzstan-born Russian citizen https://t.co/ME83lPGaLh
from CTI Consulting http://ift.tt/2o5gRoL
via IFTTT

Monday, April 3, 2017

At one point, I had made so many training devices, mainly for K-9's in the US Secret Service,our K-9"s would sit at the site of these briefcases, which was a problem since this was the briefcase the GSA had negotiated to buy for their stores, I think they costed out at 12 dollars back then. I switched to a black plastic one that was sold at office supply stores after that, I still have one that is rigged with over 10 types of sensors to set off the buzzer and flash bulb. It was first used as a training aid for the K-9's to try and make them stop pawing and knocking over the possible bombs. Then as a training aid once out of the USSS for classes on bombs taught for ATAP, that US Aid program, and the National Sheriffs Assoc, for high risk trials. The bomb holding device of late has been backpacks, but perhaps the Russian bomb today will bring the brief case back.


via CTI Consulting http://ift.tt/2nBvg9k

Trenton Scott H. on Twitter

TrentonScottH : St. Petersburg Metro bomb exploded near Sennaya Ploshad station, a major hub. 2nd bomb defused at Ploshad Vosstania… https://t.co/HOAWNcD69G
from CTI Consulting https://twitter.com/i/web/status/848938222482796548
via IFTTT

via CTI Consulting http://ift.tt/2otRtKu

St Petersburg metro explosions kill at least 12 in Russia | Daily Mail Online

Facts are still coming in, but it seems to be centering around the man on the left carrying a brief case with a simple bomb with nails taped around it with a simple timing device. At the ESI class next week on Bombs we will be discussing this bomb as well as the preliminary reports of a second bomb hidden or disguised as a fire extinguisher. We also will be using the pictures of the post blast to develop how effective the device or devices are. It is believed that the Russians will release video of the suspect as he approaches the train. Most briefcase bombs are around 20 lbs, so it will be interesting to see how he walks with the bomb in the case. The brothers that carried the backpack bombs into place were surprisingly unaffected by the bombs they were carrying. Fire extinguisher bombs are not new to the USA, we have had a number brought in over the Canadian border in years past, during the ESI class we will discus the different ways we can detect them and mitigate the damage they can do.
from CTI Consulting http://ift.tt/2nA8UVt
via IFTTT

Airports and nuclear power stations on terror alert as government officials warn of 'credible' cyber threat

TrentonScottH : Airports and nuclear power stations on terror alert as UK government officials warn of 'credible' cyber threat https://t.co/xhxAtYS1bq
from CTI Consulting http://ift.tt/2nrGhJj
via IFTTT

Sunday, April 2, 2017

Police arrests are plummeting across California, fueling alarm and questions - LA Times

This is a very troubling trend, from what the researchers are suggesting, the police just find it harder to make arrests and make them stick for any point of time, like more than a few months. Some in the court system do not see any problem with the short sentences, but police find it hard to have it even seem like a deterrent to the arrested. Everyone knows the first thing you plea down is a weapon charge, then you can plead to a lesser charge and be out within a year many times. Other problems are the criminal and civil charges arrested criminals charge the officers with. If you are an effective officer you will usually have a number of court cases pending. Even with no really credible charges pending, it still very hard for an officer to be promoted, and every arrest by these officers is questioned by groups that are trying to make every officer a suspect. So for promotions and to hope to get promoted, it is just better not to arrest them at all. This has to stop, the ones really getting hurt here are the innocents in the area, the ones making out here are the criminals, they know there a limited chance they will spend much if any time in jail.
from CTI Consulting http://ift.tt/2otK8r5
via IFTTT

Saturday, April 1, 2017

First on CNN: New terrorist laptop bombs may evade airport security, intel sources say

TrentonScottH : RT @cnnbrk: Terrorists are testing concealed explosives with stolen airport security equipment, intel sources say. https://t.co/WnMjT1S3Em
from CTI Consulting http://ift.tt/2mWGtEV
via IFTTT

Rewards for Justice - Wanted

This is the face of terror, a 32 year old from Saudi Arabia, makes some bombs he makes are pretty had to detect. TSA had planned to have their networks linked together so that a suspect device x-ray can be shown can be shown to all the other TSA x-ray operators. So far I do not think it has happen, still most of these should be detectable by screeners. The FBI is saying that in their tests, they got some devices thru, so has the TSA's own Red Teams. But still can you have a terrorist planning an attack with a almost 50 50 chance of getting caught at the airport screening lane, not a valid terrorist plan. But if you are in a country that does not screen the airport employee's well, and they may carry a bomb past screening, then you have an attack plan that AQ will agree too. The last two bombs used at airports are believed to have been smuggled past security. Hence why the airports named have been listed as possible problems.
from CTI Consulting http://ift.tt/2nryevV
via IFTTT