Report: Texas saw increase in student arrests for threats | State | themonitor.com
This is a problem that is looking for a solution, how to decide when it is time to act against a Student before they cause a dangerous event. I am not sure this is the solution for everyone. But it is well worth the look http://www.aggressionmanagement.com/lets-prevent-the-next-school-shooting.html It allows for easy documentation of precursor acts that have historically led up to dangerous acts. Mr. Byrnes has developed a web based solution that can be used by folks with an app on a smart phone to report suspicious events and acts that may lead to a dangerous situation. With the app teachers, school security, or anyone authorized can report the event it goes into a database to be analysed and can point to levels of reports of suspensions that should or could require a formal evaluation of the students actions. This same reporting structure can be used by manufactures, or any group of people that may face workplace violence and or active shooter incidents. If gives the users a documented method to constantly evaluate threats or other suspect actions.
Tuesday, July 17, 2018
Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States - Motherboard
Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States - Motherboard
PC Anywhere is the most visible of the remote software applications that can inserted into other operating programs, and the largest. Many other remote software applicaitons are very small, and much harder to detect. Rumor has it that most of the voting software vendors have some sort of remote access capability. By the way the majority of specialty programs sold, have some sort of back door remote access software embedded into it. They do it to be able to check on their software and on their fixes to the software.
PC Anywhere is the most visible of the remote software applications that can inserted into other operating programs, and the largest. Many other remote software applicaitons are very small, and much harder to detect. Rumor has it that most of the voting software vendors have some sort of remote access capability. By the way the majority of specialty programs sold, have some sort of back door remote access software embedded into it. They do it to be able to check on their software and on their fixes to the software.
Russian prosecutors want to question US intel agents - ABC News
Russian prosecutors want to question US intel agents - ABC News
This is the part our Press do not want to know, that others like Russia think, and sometimes with good reason or at least some reason, that we the USA are meddling in their business. And they want us to admit it and stop it, sort of like our wishes on their meddling.
This is the part our Press do not want to know, that others like Russia think, and sometimes with good reason or at least some reason, that we the USA are meddling in their business. And they want us to admit it and stop it, sort of like our wishes on their meddling.
Pathway to Violence Video | Homeland Security
Pathway to Violence Video | Homeland Security
This is a great video for getting a pathway to understanding where violence is coming from, it is very similar to the planning stages of Terrorist events, but starts one step forward from it, the Grievance step. IE the stepping off point, for a terrorist it could be the perceived slight against Islam, or for a work place violence issue it could be, that other person getting the promotion. It maybe hard to pickup on prior to the event, but it should always be there when investigated.
This is a great video for getting a pathway to understanding where violence is coming from, it is very similar to the planning stages of Terrorist events, but starts one step forward from it, the Grievance step. IE the stepping off point, for a terrorist it could be the perceived slight against Islam, or for a work place violence issue it could be, that other person getting the promotion. It maybe hard to pickup on prior to the event, but it should always be there when investigated.
Thursday, April 12, 2018
IAVM
Just finished addressing 80 members of the International Association of Venue Managers, Dist. 6 on Event Security. These are event managers from arenas, stadiums and campuses in a 4 state area. With the evolving threats Special Events are facing keeping up with the newest techniques is critical. Most questions in the end dealt with active shooter situations in large arenas. Like everything, it requires planning.
Mexican Drug Traffickers Stuffed Mickey Mouse, Pluto With Crystallized Meth
There is no end of how they will smuggle these devices in. At one point they molded the drugs into miniature Statues of Liberty for import into New York and Washington DC. Plastic Explosives have been molded into the toys and figurines all over the world. Which is why CTI teaches our students to read people as much as you rely on tools like x-rays and metal detectors. Reading people and how they react to the world around them, can tell you much more that a lot of tools that do not think and can always be beaten for just that problem. Watching people react as they receive a package of counter-ban after being screened, can often tell you more that the screening tools can.
Active Shooter & Medical Care Under Fire
This was a very well done and instructive talk. Probably the best to the point talk on the use of tourniquets I have seen. It would make a great YouTube training video for everyone, and would probably save a lot of lives.
ALERRT.ORG
If you get a chance to attend any of the ALERRT courses, you should do so. They are well done and thought out. There is very little difference between "Avoid Deny Defend" and "Run Hide Fight?", it's more of a change in lingo to make it sound less violent. The key in both is to plan before it happens. Get ready to run, have a plan, know the exits, do not stay at the X, for there you will die. Move, as soon as you walk into a room find the straight line to the nearest exit, then look for the next exit, and have a straight line to that as well. Start moving as soon as you feel something is not right, and keep moving till the situation improves, or you are out. If you can, get folks to follow you, but never stay in place. More people will follow you out than will listen to you tell them to leave. Anyone with a plan has a better chance of success, even if they do not follow the plan for some reason in the end. Without a plan you tend to stand in place and think about your next move, which can get you and those around you killed. So the plan is move on the straight line to an exit, even pick the exit as you stand there, it can always change if something happens, but your mind will react faster if you have at least an original plan.
Friday, March 30, 2018
ESI Special Event Security Course
Just finished the ESI Special Event security course. The students are great, and they are ready to take on your special event security needs. As arenas and stadiums are upgrading their security to meet the every changing threats and security requirements, these students understand the new and existing threats, and how to use both technology as well as training to increase their security posture. In this course we also taught the students how to read crowds and how to recognize aggression that some people will show, and defuse the problem prior to them causing and incident. We need to understand ways to prevent incidents from happening, rather than just responding to incidents.
IoT
The Internet of Things, is the fastest growing field in Cyber Security. If you are looking for a challenging new career, that pays well and is in great demand from virtually every segment of the economy. IoT Security, is the place to be.
Troopers added to security detail at Stoneman Douglas High School after several security incidents
School officials are taking provocative instagram posts seriously, and they should. It’s not always easy to tell who’s fooling and who’s serious. Back in my intel days, we would have loved access to something like social media to identify security threats.
Data hacked from 150 million MyFitnessPal accounts, Under Armour says
Another data breach, this time at Under Armour. If you use the MyFitnessPal app or website, your username, email address, and hashed passwords may have been stolen.
Here's what those who carried out 28 attacks in the US have in common: Secret Service
A secret Service report details the common elements of 28 mass shootings in 2017: 100% were committed by males ages 15-66; 79% sent threatening or concerning communications and 64% experienced mental health symptoms prior to attack. Know the warning signs.
Tuesday, March 27, 2018
‘Suspicious packages’ received at military installations in Washington area
As seen in Austin, mail and package bombs are serious business. But federal agencies and installations are well-equipped and well-prepared to deal with the threat. Many local entities and businesses are too.
Churches that survived 9/11 give in to the 'madness of the world,' install metal detectors
Protective measures like metal detectors can make some people feel safer, but also make others feel uncomfortable in a normally inviting setting like a church. Whatever you put in place, it needs to make sense based on your level of risk.
Here are the Smart Bags That Will and Won't be Banned Soon
The smart bag ban is in effect for the major airlines. Know which ones will fly and which won’t before you travel.
Stats: 61% Want Faster Deployment of Biometric Technology | Travel Agent Central
Frequent travelers may be OK with increased use of biometrics, but be aware - not everyone has easily readable fingerprints, and casual travelers have yet to get used to fingerprint scans and facial recognition at the airport.
Monday, March 26, 2018
City partners with Knoxville organizers to increase event security
Special event security planning is getting to be a big business and a career option for some security specialists and protection agents. ESI will hold a two day event security class with the added touch of behavioral analysis points for picking out the possible aggressors in the crowd. Rich Roth from CTI has been working special event security since leaving the US Secret Service back in 1985, to include Presidential national conventions for both Democratic and Republican and high risk high threat events for large and small convention centers. In these two days we will cover what is needed to make an event safer and more secure for both the crowds and the people preforming. In this day and age after the Las Vegas shooting at one high level concert to the Manchester bombing of the concert the field of event security has been expanding. The Paris attack included a stadium and the 1,500-seat Bataclan concert hall which was sold out. No one wants to be the next special event attacked, and both cities and the performers are adding requirements for security at their events.
The Mojo Barriers » Barrier Load Monitor System
After a number of crush incidents in England, mainly at soccer matches, fixed barriers had to have breakaway load restrictions put on them, these Mojo barriers do not have a break away, but they do have a stress monitoring systems to warn when the pressure on the barrier is getting into the dangerous area. In most cases the performers should be evacuated, which normally reduces the pressure of the crowd on the barriers and the crowd, but if not the linking bolts can be removed and the barriers then pushed out of the way, once the performers are safely moved out of danger.
Worldwide crowd control solutions
MOJOBARRIERS.COM
Crowd Control Warehouse | Belt Barriers, Stanchions & Barricades
As you dive deeper into special event security understanding what products are available can be key to making your event safer and more secure. Simple barriers to include rope and stanchion, as well as bicycle stand type barriers are all that needed or available at times, but for larger high energy crowds you may want to look into an industry standard. These are very substantial barricades and optimal crowd presence, yet provide easy to manage systems for controlling crowds.
Buy Retractable Belt Stanchions, Post & Rope Stanchion, Wall Mounted Belt Barriers and Crowd Control Barricades direct at the lowest wholesale prices. Shop Now!
CROWDCONTROLWAREHOUSE.COM
Atlanta hit by ransomware attack, city employees told not to turn on computers
This Atlanta cyberattack has wide-reaching effects, showing how malicious code can quickly penetrate city networks. Even the airport has shut down their wi-fi to mitigate the risk of spreading. All from someone opening the wrong attachment most likely.
A ransomware attack on the city of Atlanta means city works at city hall can't turn on their computers.
USATODAY.COM
Vehicle explodes at entrance to Air Force base in California, killing driver
If the Facebook account of the incident is accurate, it would be a serious breach attempt. Gate personnel need to be on their guard and avoid complacency; many of the most serious bombing incidents overseas involve taking out the perimeter security first.
How to Hack a Human
The old CIA acronym MICE (money, ideology, compromise, ego) is helpful in describing the insider threat. But the careless or unwitting insider can cause damage to an organization too.
He Gambles. He Tips Staff. He Eats Alone. All the While, He’s Stocking His Vegas Suite With Guns.
This and the following video are a must watch for anyone in security from guards to directors. It outlines in video the days and hours leading up to the Las Vegas mass shooting. The calmness he shows throughout is nothing short of amazing, as a behaviorist it is extremely troubling on so many fronts. Taking each movement and the down times between the set up he is using, he really does not show any gotcha moments. Yes, his eyes are troubling, but could easily be because of his late hours at the tables. The maids and other staff may have noticed some very strange behavior at times, and the lack of him being in the room for extended times, but that is about it. This is a troubling video or set of videos to watch, but we must to try and understand what happen. For a strictly behavior profile, this is as disturbing as the Boston Bombers walking through the crowds to plant their bombs, they are just not flashing the behavior signals expected, much like this guy. But still don't stop working your behavior surveillance and awareness, these really are out of the norm. I have seen purse snatchers in stores flash more behavior clues than this, and almost all the time.
Tuesday, March 20, 2018
Student suspect dead, girl critical, boy stable after shooting at Great Mills HS in Md.
et in on the shooter quickly. As for the students, while there's still a lot of information we don't know, your best chance at survival is to move out of the area as quickly as possible. Hiding under desks or in corners provides very little safety, moving is always your best chance of survival. We call it in bodyguard language getting off the X. A moving target is much harder to hit, and every foot you get away from the shooter, the greater your chance of surviving the attack. Even running past the shooter as fast as possible is better than standing still. It sounds counter intuitive, but the shooter is much more in control shooting at stationary targets. Do not be in the X. Move.
GREAT MILLS, Md. (WJLA) - The suspect, a student, is dead after a shooting Tuesday morning at a high school in St. Mary's County, Maryland, that has left a…
To Catch A Bomb-Maker
Troops in Iraq and Afghanistan have been dealing with IEDs and roadside bombs for over 15 years. As the insurgents got better at disguising bombs, we had to get better at recognizing them. And the FBI got better at tracking them down.
Fifth package bomb strikes Texas, at FedEx facility near San Antonio
Whether this is the work of one bomber or copycats, the end result is the same: fear and uncertainty. If you weren’t expecting a delivery, or see unattended packages or backpacks in public places, don’t even go near it. Call 911
Subscribe to:
Posts (Atom)