Friday, June 30, 2017

Gunman kills doctor, wounds six others in Bronx hospital rampage

TrentonScottH : Gunman kills doctor, wounds six others in Bronx hospital rampage | Reuters https://t.co/zBquTSFhDD
from CTI Consulting http://ift.tt/2u7oKuD
via IFTTT

Ukraine Cyberattack Wasn't Really About Ransom, Security Experts Say

TrentonScottH : Ukraine Cyberattack Wasn't Really About Ransom, Security Experts Say https://t.co/zCucHC1mQ8
from CTI Consulting http://ift.tt/2sZXiQM
via IFTTT

Thursday, June 29, 2017

US Lifts Airline Laptop Ban In Exchange For 'Intensive Security Measures'

TrentonScottH : Someone at TSA figured out what a debacle a universal laptop ban would have been, thankfully. #airportsecurity #tsa https://t.co/L7hd6CxsLU
from CTI Consulting http://ift.tt/2t37W7U
via IFTTT

Tuesday, June 27, 2017

Trenton Scott H. on Twitter

TrentonScottH : Hackers disrupt energy producer, banks, airport, logistics company, government networks in Russia, Ukraine. Imagine… https://t.co/uoRjCgyI6a
from CTI Consulting https://twitter.com/i/web/status/879719939799736323
via IFTTT

Monday, June 26, 2017

TSA considers forcing airline passengers to remove books from carry-ons

TrentonScottH : TSA looking to require to removal of books & papers from carryons, despite recent test problems #aviationsecurity https://t.co/RbwGNmgZZO
from CTI Consulting http://ift.tt/2t8Q2D3
via IFTTT

Trenton Scott H. on Twitter

TrentonScottH : Travel ban set to begin again in 72 hours after Supreme Court ruling. Airports should be alert for potential protes… https://t.co/6Lifrhyakn
from CTI Consulting https://twitter.com/i/web/status/879373815473729540
via IFTTT

Friday, June 23, 2017

When you talk about soft Targets, the attack this week at the Flint Airport certainly fits the bill. The airport Police consist of 1 Lt, who was the victim, and 6 other Part time officers. There is also a Director of Safety and security. The attacker came into the airport at the ground level, went up the escalator to the second floor. There he spent a bit of time in the restaurant with in view of the lobby, and then at some point he went into the rest room, near the top of the escalator. He dropped the two bags he was carrying and left the rest room with only the knife in his hand. He quickly came up from behind the Police Lt. standing at the top of the escalator, only a few feet from the restroom. He stabbed the Lt. in the back and then the neck yelling as he was striking the Lt. The Lt, turned and confronted the attacker and with the help of nearby people restrained him till they could hand cuff him. There is a scenario you can play out at your airport or other location. It is too soon to know if the attacker gave off any tells as he wandered the 1st and 2nd floor of the terminal. But he stayed away from TSA security and in an area he could move freely. Security Awareness is always important but the Lt's response is apparently what saved him. But look around you now at this moment are you aware of areas you can be attacked from?


via CTI Consulting http://ift.tt/2szsR3P

We need to understand how far our WIFI signals are going these days. When is a high rise building the signal often makes across to the adjacent buildings, or to floors above or below. Giving bad guys access to your system. There are window covering and even window that can help prevent the signal from going out to far in space, but the floor above and below can still be a problem, here is a white paper on WIFI signal leakage. Call CTI is you need further help.http://ift.tt/2t30nko


via CTI Consulting http://ift.tt/2tCpzeF

U.S. Border Agents Warned of 'Open Warfare' with 'Grenades' in Mexico at Texas Border

This particular feud has been going on for months now, with no sign of a let up. The fighting is within the sound of gunfire in the USA just across the border, with even stray bullets making it over the river into homes in the USA. Yet no one really wants to report on it.
from CTI Consulting http://ift.tt/2rI1XDO
via IFTTT

Canadian Sniper 'Kills IS Militant Two Miles Away' (Learn More, Video) - American Security Today

Now that is a shot, well done Sir
from CTI Consulting http://ift.tt/2sZ40qH
via IFTTT

Thursday, June 22, 2017

Paraíso financiero del crimen » Eje Central

Mexico has made it to the world stage, in illicit goods and services sold. Mexico is in the top 3, ranking behind only China and Russia for making money off the books. Congratulations Mexico, you have arrived.
from CTI Consulting http://ift.tt/2rGNxEe
via IFTTT

729, the targets of espionage »Central Axis

Let us hope this has not come as a surprise to the Mexican people, that they have been spied on by their government. Everyone does it to some extent or another. CTI was brought in by the Government of Mexico years ago to teach Federal Police how to conduct Espionage against suspected Cartel members, but the same techniques work against their citizens as well . Software exploits like those mentioned this article, are being used by large and small governments all over the world. The Cartels in Mexico have bought some of the leading hackers in the world to help boost their cyber capabilities, as has ISIS among others. Even gangs are getting more high tech using the darkweb to advance their opportunities. If an Intel agent posing as a Police officer has a few seconds alone with your cell phone, tablet, or laptop, consider it compromised. If you log onto free internet hot spots just about anywhere in the world, I would say there is a good chance you are compromised. People need to understand that their privacy is under attack constantly, and in third world countries like Mexico it is no different.
from CTI Consulting http://ift.tt/2rGGgnS
via IFTTT

7 Steps to Improving Stadium and Large Event Security - Campus Safety

There are some good ideas here, not all of them, but some real good ideas for looking at your next events security posture
from CTI Consulting http://ift.tt/2rGIL9F
via IFTTT

AAAPO Press Release: Attack at Bishop International Airport Is an Attack on All Airport Police

Very true, all airport police need to understand what happen here, and how it affects us all.
from CTI Consulting http://ift.tt/2sYc9MT
via IFTTT

Risk on the Thin Blue Line - Risk & Insurance : Risk & Insurance

We all need to find way to reduce the risk for our Police Officers. Keeping an eye out for people that could cause a problem is a start. You know the type always disgruntled, not happy in life, and blame others for their problems. If someone like this is reported, at least a look will be taken at them, another chance to defuse a situation before worse happens..
from CTI Consulting http://ift.tt/2sFtZBv
via IFTTT

Campus Safety: Smarter Identity And Access Control Solutions

In this push to move to more secure card, it should be advised that most of these new cards are being cloned as fast as magnetic strip cards. In Europe when they went to the "smart card" the fraud on cards actually went up. To clone a mag-stripe card cost about 24 dollars on the internet for the equipment, to do a smart card it used to take over a thousand dollars, now it is down to around 95 dollars. The new cards are better no doubt, but they are not a silver bullet to cut out fraud. It is still a cost benefit analysis as to its strength vs security provided.
from CTI Consulting http://ift.tt/2sY6PZY
via IFTTT

Wednesday, June 21, 2017

Cob stabbed at Bishop Airport in Michigan

TrentonScottH : Authorities can't prevent these kinds of attacks. If someone knew this man, what he was up to or capable of, maybe. https://t.co/Gkms75rERT
from CTI Consulting http://ift.tt/2rRJY1P
via IFTTT

La violencia vence a EPN y México paga: en mayo 2017, más homicidios que con Calderón en mayo 2011

This is just not getting any better over in Mexico, more people being killed or kidnapped every month. It is going to take a very vicious and large force to yank control away from the Cartels, but it is the only way to get it done.
from CTI Consulting http://ift.tt/2tO25m2
via IFTTT

Flint cop stabbed at Bishop Airport in Michigan | Daily Mail Online

'Terrorist' knifeman 'shouting Allahu Akbar' repeatedly stabs cop in the neck at Michigan airport, Is this the start of a long hot summer? I hope not, but it is not looking good.
from CTI Consulting http://ift.tt/2rRJY1P
via IFTTT

Chicago Hires New Airport Security Chief After United Flub | Illinois News | US News

He has hit the ground running, our best wishes for his success.
from CTI Consulting http://ift.tt/2rVnnfW
via IFTTT

Flint Bishop Airport Evacuated After Police Officer Stabbed « CBS Detroit

Information still coming it on this one, but the airport is closed for the moment.
from CTI Consulting http://ift.tt/2rR5Avx
via IFTTT

WebSites Found Collecting Data from Online Forms Even Before You Click Submit

You probably thought this was happening in the back of your mind, this just confirms your fears. Do you remember filling out an online form, right up to the end, and you decide that tho whole processes is just too much of a hassle, and you just stop. Yet hours days and weeks later you get bombarded by people wanting to help you, with data they could only have gotten from the Web Page Form you never finished filling out. It is rumored that Facebook among others captures what you type as you type it as well. It is out there and is happening, most of us have agreed to it via, the check box for accepting the site in the first place. It is legal, and it is not going to stop anytime soon, so just be aware of the problem, as you fill out that next hotel reservation form on line.
from CTI Consulting http://ift.tt/2tt6ZFu
via IFTTT

Fresh Worries for Boards of Directors - Risk & Insurance : Risk & Insurance

Once again the days of a board of directors sitting back enjoying the perks and life style are pretty much gone. Now days not doing your over site duties can mean real problems for them. Cyber is but one of these problems, but it is growing to be the biggest one very quickly. Many Boards are hiring outside third parties to review a companies cyber security issues, just so they can rest easy knowing they have done their due diligence.
from CTI Consulting http://ift.tt/2rCKjBm
via IFTTT

Threat Intelligence: Not a Wild Goose Chase

This is a hard read but well worth it. It also has the report Mandiant did on the Chinese hacking group, it has a lot of information. I use this in my class for Cyber Security, it really points out what the Chinese are up to as well.
from CTI Consulting http://ift.tt/2sB05Ov
via IFTTT

Tuesday, June 20, 2017

Twitter / ?

TrentonScottH : RT @BBCBreaking: Brussels central station evacuated after reports of explosion - Belgian police say situation under control https://t.co/FLHbF4RNAm
from CTI Consulting https://t.co/FL
via IFTTT

We are own worst enemy in the cyber security world. We want to be connected at all times, yet we want privacy. We all need to take a step back and figure out just what privacy we want or need, and then adjust our cyber profile to match.


via CTI Consulting http://ift.tt/2sQYsiC

Explosion is reported at Brussels central station | Daily Mail Online

Information is still coming in, but appears that a bomb was set off, but did not fully detonate. The stories are coming out with out a lot of facts at this time. We will get back to you later.
from CTI Consulting http://ift.tt/2sxVGw1
via IFTTT

CEO Fraud Manual

Excellent basic over view of Fraud carried out against Corporations. With must have checklists at the back that every board member should have available to them. Know Be 4 is an excellent training company for many of your security needs.
from CTI Consulting http://ift.tt/2smLLuA
via IFTTT

O'Hare Airport launches international flight transfer bus

TrentonScottH : O'Hare Airport launches international flight transfer bus https://t.co/7DbhWMLqyp via @dailyherald
from CTI Consulting http://ift.tt/2sQ37RU
via IFTTT

Leaked recording: Inside Apple’s global war on leakers

This is an amazing story on the way Apple is working to keep it's secrets safe, and the , so far, great track record in doing so. They go after leakers with a vengeance, probably more than our Government is doing at the moment. They try and instill a mindset with the employee's that backs how important secrecy is to the well being of the Company, and how it will effect everyone's job in the end. This is well worth the read, I hope you take the time. I hope our Government leaders read it as well.
from CTI Consulting http://ift.tt/2sm5omI
via IFTTT

AST-0181264_Combating_financial_crime_The_increasing_importance_of_financial_crimes_intelligence_units_in_banking.pdf

This is a good overview of the Financial Crime situation, and some forward moving paths to solutions. The key takeaway for me is the lack of talent available for a bank or other corporation to set up a team of Financial Crime Intelligence Units. This is another field that is just poised to expand very rapidly, and you may want to get in on the ground floor.
from CTI Consulting http://ift.tt/2sLQbfh
via IFTTT

CrimeLab - OnDemand Course Library

I am often asked how to I go to the next level in Cyber Security. I have not tested this product out, but it looks to be perfect for someone looking to start a new career in Cyber Security. CTI is looking for one of our employees to enroll, so we can better determine the quality of the program. On it's face it looks like a winner.
from CTI Consulting http://ift.tt/2rzhtC0
via IFTTT

Monday, June 19, 2017

Paris attack: Champs-Elysees driver had explosives and rifle, was flagged for extremism | Fox News

Another vehicle attack in France, attacker had explosives and a rifle
from CTI Consulting http://ift.tt/2tkocRN
via IFTTT

Wikileaks Unveils 'Cherry Blossom' — Wireless Hacking System Used by CIA

This version used by the CIA maybe new, but the type of hack has been out there for a long time, and virtually all big time hackers use it. Plus of course the boys in the band, China, Russia, North Korea among others. What is neat is once they get into the router, like the one a Starbucks, or that free Hotel system you used last night, a hacked router can monitor all the data going through it. Like your passwords, who you are emailing as well as who is emailing you. In my Cyber Security class, I show one of the data inquires that can be sitting on the router, it is one very short burst, that then sits and waits for the systems attached to the router to cough up a whole range of sensitive data, that allows the attacker virtual access not only to your computer, but every computer you then access. So the next time you log on to a free router hot spot, just remember that your computer will take that bad software with it, and then attack your home router, or business router. There are patches for routers that help keep them free from some of these attacks, but have you ever installed a patch for your router? Would you even know how? Now look at the list of systems this Cherry Blossom or other attack like it can hit. Cameras, WIFI adapters, WIFI extenders, it is a 24 page list and includes most of the routers sold in America or around the world.
from CTI Consulting http://ift.tt/2rkJbCq
via IFTTT

Data on 198M voters exposed by GOP contractor | TheHill

This is another problem we have in the information war's, just simple errors by contractors even employee's. Yes the leak was stopped, but for China and Russia this was like a gift from the RNC. It will be interesting to see how soon this data is put up for sale on the dark web, fire up your Tor browsers and see how soon it appears. There is so much sensitive data available, that the price for a mere 25 terabyte's of data is in the range of 100 dollars or so.
from CTI Consulting http://ift.tt/2sKq3SO
via IFTTT

Mexican Govt. Allegedly Used Spyware Against Journalists, Activists & A Child

This is not new to a lot of us, and be aware that the Cartels have perhaps and even better capability of cyber attacks on all three. But this attack on Journalists should not be taken lightly. By the way the Cartel folks have also launched attacks on both Mexican and USA camera systems, and it is rumored that they have total access to most if not all our border patrols cameras at the border crossings as well as many of the systems that local law enforcement use along the border to include McAllen, Mission, Donna among others. The first of the Cartel Technicians that advanced this type of cyber attacks is now believed to be in the witness protection program, but used to live in McAllen, Tx and had a business there as well, he was hired at times to work on local police radio systems to include their mobile data systems. This gave him access to many if not all the data as well as cctv along the border. The Mexican Govt can have access to many of the very sophisticated monitoring systems used by our and other governments around the world. The problem is that these systems often end up in the hands of the Cartels for their use. This is true of software attacks as well.
from CTI Consulting http://ift.tt/2sKVUCV
via IFTTT

Arrests made in killings of 2 Md. students shot on eve of graduation - The Washington Post

Drug violence is not just on the border. These folks are part of a number of shootings in the area of Montgomery County Md. Montgomery County Md. is considered one of the richest counties in the USA, and has a gang problem that is totally out of the control. How innocents did not get injured in this rain of bullets, is a wonder to all.
from CTI Consulting http://ift.tt/2rweIkQ
via IFTTT

Google Says It Will Do More to Suppress Terrorist Propaganda - Bloomberg

This is a very good move on Google's part. I hope they get it right
from CTI Consulting http://ift.tt/2tCmp9J
via IFTTT

Sunday, June 18, 2017

Finsbury Park: One killed, eight injured in 'potential terrorist attack' as van hits worshippers at London mosque

There is still a lot of confusion about this attack at this point, and people are waiting to get more information on the attack, to even know how to respond. If it does turn out to be a revenge attack, it is so wrong, these are most likely not the folks that would attack, they are as innocent as the victims of the ISIS attacks. But remember ISIS is not happy with many of the followers of Islam, so it is possible the attack is just another ISIS attack. We just do not know at this point, and need to wait. What we can say is people need to be aware of the risk of this type of attack, and be on the look out for one. When walking keep an eye out for places that be used to defend yourself from a ramming attack. Light posts other cars, and barrier that will deflect the vehicle. Moving sideways from the point of attack is also a good move to reduce the chance of being hit. the driver has to pick out targets and yet still keep up speed and stay in control. The knife attack is also something to look out for, and moving away from the attackers is your best chance. If you can get to a reasonably safe area, turn around and throw things at them, distracting them from attacking others. If cornered look for items like chairs and long boards and rods to keep the attacker away from you, it is going to be who has the better training as to how effective this will be, but if cornered, it maybe your only move, and could keep the attacker off you long enough for the Police to respond. If told by police to drop, do so, so they can shoot with out hitting you as well. We can win in these situations, and trying to put bollards at all points is not a viable solution, there are just to many attack points. Remember lets wait to see what the actual problem was.
from CTI Consulting http://ift.tt/2thR4Kd
via IFTTT

Friday, June 16, 2017

This is a must have resource if you ever have to search or determine the vulnerability of rail road tank cars. http://ift.tt/2sHl6cI


via CTI Consulting http://ift.tt/2ro9Myy

American Airlines testing new airport screening device with U.S. government | Reuters

This technology has been around for a while so it does have a proven track record, just not in the Aviation sector. I think the big reason this is being implemented now, is that the Units have downsized a lot and the weight factor has been resolved a bit. The first machines that could have done this where so big and heavy using them at screening check points would have reduced the number of lane available, and in many cases would have required a lot of additional floor supports to handle the weight. Both issues operationally made the older devices non starters. If you have ever seen a high end CAT scan unit at a hospital, they can do 3 D images and even slice up the image for better views. For all you airport designers, you need to get a good feel for the foot print and weight requirements for these devices. All in all this is a significant up grade to airport screening systems.
from CTI Consulting http://ift.tt/2rnYQAT
via IFTTT

10-Month-Old Child Fatally Shot While On Walk With Father – 710am KURV

This is why not paying attention to cross border violence is so dangerous. Innocents are often in the line of fire. Crack down on all cross border violence, even drug on drug, get these guys off the street.
from CTI Consulting http://ift.tt/2s9enaM
via IFTTT

Facebook post leads to mistrial in Donna murder case | KGBT

This is one everyone should read, if you are involved in a court case in anyway, be careful on what you are saying on any social media form.
from CTI Consulting http://ift.tt/2rz19oO
via IFTTT

Thursday, June 15, 2017

Route Planning and Analysis by Steve Powers | International Security Driver AssociationInternational Security Driver Association

This is a must read article for anyone in the business. The key points here are fundamental, but unless you are actively doing this each and every time, it will not be fundamental to you, and it needs to be.
from CTI Consulting http://ift.tt/2sxEsSd
via IFTTT

WSRMayJun17.pdf

This is a great report on World Security, and one we all can learn from.
from CTI Consulting http://ift.tt/2sfFjUF
via IFTTT

Charleston, SC: FBI investigating dirty bomb report at Wando Terminal

This is always a viable threat, a dirty bomb is not all that hard to get the products needed to make one. The level of damage is usually not as big as some would wish, or expect. Teams from NIST have plans for limiting the damaged caused by the various types of dirty bombs. Clean up plans have already been developed, contamination risks can be quantified very quickly. It is going to scare people, and should, but the fear itself will be overblown. Do not breath in anything in the area of device, contamination of clothes and even the dust on your skin is problematic. Taking clothes off, and scrubbing down your skin with approved materials, will go a long way to reducing your risk. Get into clean clothes, and standing by for an all clear by NIST staff, perhaps even your own trained FEMA or first responders will have the needed equipment to clear you. If it is suspected that you need to go to a hospital, do so, inhaling contaminated dust is a big concern. Another concern is that shrapnel from the bomb area, may have cut you or even be inbeded in you skin, this shrapnel may or may not be contaminated by the Nuclear material of the bomb. As always distance is your friend, so if a bomb is suspected get some distance. Looking for drift patterns of contaminated dust in the air will also help make critical movement decisions, with sheltering in place a viable option, just filter the air coming in as best you can. All in all a dirty bomb is a threat, but not the devastation many think about.
from CTI Consulting http://ift.tt/2srfint
via IFTTT

TCCC Quick Reference Guide

Great resource to have in that Advance Manual
from CTI Consulting http://ift.tt/2rAeKHA
via IFTTT

Wednesday, June 14, 2017

The TSA Is Testing the Use of Fingerprints to Replace Boarding Passes

TrentonScottH : Fingerprint biometrics would be effective, but not universally so. Not everyone has prints that can be read easily https://t.co/UmkvfCHLff
from CTI Consulting http://ift.tt/2sBYxpU
via IFTTT

SOS Security LLC Acquires AS Solution, a Global Executive Protection Firm

This should be interesting, wishing the best for both firms as they start to work together
from CTI Consulting http://ift.tt/2tlt9sn
via IFTTT

FOX & friends on Twitter

TrentonScottH : RT @foxandfriends: DEVELOPING: House Majority Whip Rep. Steve Scalise, multiple others shot in Alexandria, Virginia https://t.co/ODRTgpCM5V
from CTI Consulting https://twitter.com/foxandfriends/status/874965735570759680/video/1
via IFTTT

Tuesday, June 13, 2017

Surviving the Attack: Basics of Self-Preparedness | Jonathan Wackrow | Pulse | LinkedIn

Well written and some great points are made.
from CTI Consulting http://ift.tt/2rtVfjZ
via IFTTT

Weaponize a Mouse with WHID Injector for Fun & W00tSecurity Affairs

This is more than a little scary how fast this was put together, I hope he stays on the good side.
from CTI Consulting http://ift.tt/2s70h7Q
via IFTTT

Israeli Intelligence spotted IS plans for Laptop BombSecurity Affairs

This is critical information developed by Israeli Intelligence. Key points are the detonation device, hmm, so expectation of another point of location for the main explosive load. Not clear, but the intention is there that make the possible explosive charge in another container. IE lining of a coat, or some other way of carrying the main charge. This means the threat is the detonation device in the electronic item, with battery, and small charge to facilitate the device detonating the main charge.
from CTI Consulting http://ift.tt/2rcWpRF
via IFTTT

Monday, June 12, 2017

Cabo San Lucas beheadings: Cartel killings traumatize resort town as heads found in cooler - Houston Chronicle

Mexico has to get a handle on this, the Cartels are out touch with reality, and the Government does not seem to be able or want to do anything about it. The idiot President of Mexico, moves around the world like he is a real head of State, but can not even control the Cartels from Tourist sites. With all that Mexico has to offer the world, it is hard to believe that the Government can not or will not put a stop to this problem.
from CTI Consulting http://ift.tt/2rjq1Rf
via IFTTT

Blinking Router LEDs Leak Data From Air-Gapped Networks | Threatpost | The first stop for security news

Now if you can get this to work, we all will have a problem, but as any student from my counter espionage class and cyber security overview knows, we close curtains and look for cameras. Still this is getting nuts, the FM leak talked about in the article is also a problem we have to deal with, but a simple RF detector should show any leaks like this, if you can get the rest of the RF from wireless communications stopped for a second.
from CTI Consulting http://ift.tt/2rjhxdd
via IFTTT

Persirai malware in action: IP cameras all across the world compromised

Problems are growing so fast with IP wireless cameras, it is hard to keep up with the reported let alone patches and fixes for the problems. I keep telling people it is not the camera's view the hackers care about. It is the access to the router and switches so that the can compromise the entire system. Once they get into any of the Internet of Things devices like cctv cameras, they basically use it as a back door into your system. If you CCTV cameras are on your main network for the office or if at home for the families computers, they use this as a way to get deep into your systems. Try putting these devices onto a separate router, one that is not accessing the internet if possible.
from CTI Consulting http://ift.tt/2sgv04D
via IFTTT

Over 8,600 Vulnerabilities Found in Pacemakers

Here is a great note to start your week, if you or a loved one has a pacemaker. Hackers can virtually kill at will anyone with one of the hackable pacemakers. So far it does not look like there is an easy fix, or any fix to some of these devices. How much would you pay if someone gave you a jolt, and then said pay up or we tank the pacemaker now?
from CTI Consulting http://ift.tt/2rVZ8CX
via IFTTT

Insider Threats - YouTube

This is a great you tube video on the problem of insider threats at airports. Well worth the view.
from CTI Consulting https://www.youtube.com/watch?v=fHzTXjt_RaA&feature=youtu.be
via IFTTT

Corporate espionage strikes Fortune 500 oil company in Houston - YouTube

Here is a good view of Corporate Espionage as it is happening, this should be shown to all employees to include security guards, to make them all aware of what type of behavior we are looking for. This guy pings out on all the aspects of a suspect behavior.
from CTI Consulting https://www.youtube.com/watch?v=X_nc5zpAObU
via IFTTT

AST-0179374_WP_-SolutionResearch_PillarAsset_RethinkApproach_to_Cybersecurity.pdf

Fortinet, does not have a crystal ball, but they are a leader in the industry of Cyber Security, and their main point is right, we really need to rethink our approach to cyber security. From a Global, National, even State level, and from your personal computer to the company enterprise level. We are playing catch up all the time instead of heading the bad guys off at the turn, and that is not an approach that will work in an security situation. The layout the problem and give some very good ideas on ways to move forward. In may not be the total answer, but it is moving in the right direction.
from CTI Consulting http://ift.tt/2sUH9tL
via IFTTT

AST-0175436_Threats-From-Within-EDU-Ebook.pdf

Here is a good overview of the problem and possible solutions for Insider Threats in the Cyber world. Unfortunately the e-book is put out by Kaspersky Lab's who just got caught with leaked internal memos to the Russian Government that they had trap doors in their security system to let the Russians in. But the document here seems solid and I do think the over view of the insider threat is valid. I learned from it, and I study the problem all the time. So well worth the read.
from CTI Consulting http://ift.tt/2s3CANL
via IFTTT

Dangerous Malware Discovered that Can Take Down Electric Power Grids

Everyone needs to read this, the diagrams in the article help make sense of the attack for almost anyone. This is apparently Russia testing their abilities on former Soviet countries. Many of our outdated power grids could fall prey to this attack as well, as I am sure the Russians know. China is also preparing for attacks on the USA, they are actually building power grid systems like ours to test on. When dealing with PLC's Programmable Logic Controllers, once into the control computers, they can hit the PLC's at will on water filtration plants, waste water plants, even security systems in jails, and airports. The gate and cell door controllers are normally under the control of PLC's in the end.
from CTI Consulting http://ift.tt/2rnV3Tr
via IFTTT

Sunday, June 11, 2017

Masquerading as Reporter, Assassin Hunted Putin Foes in Ukraine - The New York Times

Just so you know, they are playing by different rules, and always have. Dealing with the Russians under Putin is working just like the old Soviet Union , we still dealt with them. and must, but always be careful of them. China is no different, they have made some very deadly plays in the past few years, but they always have as well. Both are testing their strength in other countries, China at the moment is working Africa, Russia is playing around in the old Soviet states. Both are working again with certain terrorists around the world, providing key data as needed, key trainers as needed, even weapons and some say over watch support by various platforms they have. It is a dangerous world, and we all need to keep our awareness levels up.
from CTI Consulting http://ift.tt/2sjcTfp
via IFTTT

Saturday, June 10, 2017

TSA Report Warns Against Truck Ramming Attacks by Terrorists - NBC News

This information is a little dated but still very on point considering all that is going on. The document referenced is available online at TSA.gov . It is a very good read and a lot of folks very familiar with the subjects involved contributed to the final document. It has a lot of very good ideas on what the next targets maybe, and some reasonable things we all can do to make our, our families , our communities safer. Take a read, it is worth it. Here is the link to the report, it is for all of us now not just Law Enforcement. http://ift.tt/2rL154R
from CTI Consulting http://ift.tt/2q2cVa2
via IFTTT

IDG Connect – IoT skills set to rise in importance

This is trend in Cyber Security, a bit of time spent on IoT devices is going to be well worth it. Whole careers are going to be built around finding ways to secure IoT systems, and keeping them secure. It would be well worth it to start a business doing nothing but IoT security and offer out your services to almost any business in the area, they are all going to need your help. Everything from Aviation to Automotive, from Heating and Cooling systems to Lighting and Power systems are all going to be effected. If you are under 40 this could be your life's work, and a better career would be hard to imagine.
from CTI Consulting http://ift.tt/2rcIRJL
via IFTTT

Trenton Scott H. on Twitter

TrentonScottH : A good start for many small businesses without the IT or security infrastructure of larger organizations (who are n… https://t.co/OfRDVuwhSv
from CTI Consulting https://twitter.com/i/web/status/873538033236226049
via IFTTT

Friday, June 9, 2017

Officials probe U.S. cleric's possible influence on London attackers: sources | Reuters

We should be ashamed here in the USA letting this clown spout off his radical words, words that helped get people killed in London. If we can go after people that spout off christian Identity movement hate speech why not Islamic hate speech. True it is hard to go after the christian identity folks at times, but when they talk about committing violence it crosses the line and we have found ways to get them, conspiracy, even parts of RICO can be applied if crafted correctly. If they promote hate and violence then they should suffer the consequences.
from CTI Consulting http://ift.tt/2sIgTCV
via IFTTT

Joe

There are a few takeaways here, one is that the tracker and bug did not result in charges. In many cases the local police or other law enforcement are really not up to speed on Espionage laws even simple wire tapping laws. Still calling them in or calling the victims lawyer in to see the device prior to them being moved, will at least give you a chain of evidence to work with if charges can be put in place. In many cases in domestic situations the facts of espionage is best used to control the settlement of assets as well as custody of children pets. This all of course is controlled in a big part by the locations and laws of the area you are in. It also depends on the time and data of the incident, wire tapping and bugging laws are at long last getting new face lifts, now even cctv is coming under privacy issues.
from CTI Consulting http://ift.tt/2rV1NtV
via IFTTT

Russian malware controls hiding in plain sight — on Britney Spears' Instagram page | ZDNet

To the hacker insiders as well as the Cyber Security Experts this is not a new exploit, but to many of us it is, and it shows just how problematic it can be to show who is the bad guy. I am pretty sure Ms. Spears is not a Russian agent, but some could I guess infer that she is. More and more this type of attack is set up, ready for some unsuspecting user. One more issue we have to deal with and be aware of as we try to safely navigate the web. Security training for this trap as well as others is part of the program we all need to get used too.
from CTI Consulting http://ift.tt/2sj16xe
via IFTTT

Raspberry PI attack compromises networks, steals admin credentials

More and more bad guys, and hopefully good guys are starting to see the potential and risks of these very small Raspberry PI devices and are making sure their staff can recognize them.
from CTI Consulting http://ift.tt/2rSaO94
via IFTTT

Insider threat training deadline here for federal contractors

All Local, State and Private Corporations, even one person shops need to be aware of the problem of insider threats. This is the biggest problem we are facing at the moment, insiders stealing, leaking or just not protecting sensitive data, like those between an FBI Director and the President. It is now a requirement for anyone contracting with the Government and has a Security Clearance of Secret or above, and it should be a requirement for all of us. There are many ways to meet this requirement to include web based training. There are even some free one's available, but the key is to take a course, it is mandatory since the beginning of the month if you are Federal Government Contractor, and should be for all of us. Insider threats are not just a cyber security problem, but one for all of us in all sectors of security.
from CTI Consulting http://ift.tt/2t2xyQR
via IFTTT

Do Mexico's Journalists Want a Safe House?

Here is a good way to help Mexico and the brave Journalists that work their.
from CTI Consulting http://ift.tt/2r9txh2
via IFTTT

Thursday, June 8, 2017

SecMash on Twitter

TrentonScottH : Who needs the dark web when there is so much noise on social media? Don't think ISIS hasn't thought of this too. https://t.co/4WAwjkhwAP
from CTI Consulting https://twitter.com/SecMash/status/872809352951889922
via IFTTT

How Can the United States Secret Service Evolve to Meet the Challenges Ahead? - House Committee on Homeland Security

TrentonScottH : The US Secret Service faces more challenges than ever. Can Director Alles lead the change that's needed? https://t.co/3xMAUTFGKP
from CTI Consulting http://ift.tt/2ruEdFF
via IFTTT

Get ready for the coming business travel crisis

TrentonScottH : New DHS standards for foreign airport security and screening of laptops will mean changes for business travelers. https://t.co/xdNOHpVSNm
from CTI Consulting http://ift.tt/2s0VX9K
via IFTTT

Wednesday, June 7, 2017

U.S. might expand laptop ban to 71 airports: Homeland Security

TrentonScottH : Be prepared - U.S. might expand laptop ban to 71 airports: Homeland Security https://t.co/CZvE38IHTE
from CTI Consulting http://ift.tt/2shhLkq
via IFTTT

"PANILO" GULF POSTER ATACA "POLINEGROS" AND LEFT 5 WOUNDED IN REYNOSA

Police are constantly under attack in Reynosa, even the corrupt ones, since this battle for control of the highly profitable Reynosa Plaza pits Cartels against Cartels, as well as fractions of each attacking each other as well. They the police and the Cartels even use the same type of truck rigged for quick deployment of gunmen that the terrorists do in the Middle East. My Bodyguards in the Gaza strip used similar vehicles, most were Terrorists of some type or another, at least that is what the IDF pushed.
from CTI Consulting http://ift.tt/2r3wgsl
via IFTTT

Twin Attacks Hit Iran's Parliament And Khomeini Mausoleum; ISIS Claims Responsibiilty

TrentonScottH : Still not known if attackers came from outside Iran, or if ISIS is recruiting from Iran's minority Sunni population. https://t.co/98VFU6qKaR
from CTI Consulting http://ift.tt/2rAg28R
via IFTTT