Monday, December 31
Guantanamo Terror Convict to Be Set Free - washingtonpost.com
Homeland Security Intelligence: Just the Beginning
DHS puts cybersecurity toward top of 2008 to-do list
Cyber Security Threats To Pipelines and Refineries
The cyber security threat to critical infrastructure systems continues to be a clear and present danger. Terrorists and hackers that want to paralyze the United States could deal a devastating blow by disabling key infrastructure systems such as power plants, oil and gas pipelines and refineries. Pipelines are especially vulnerable because they tend to be located in unpoliced and isolated areas. Although the Supervisory Control and Data Acquisition (SCADA) system offers a measure of protection, an entire pipeline could be taken out of commission if an attacker gained access to a physical Ethernet port at a field site. An combined cyber and physical attack also poses major implications, particularly if an attacker accesses critical servers in a SCADA control center. By infiltrating a server in the control center, the hacker could feed false information to the asset owner, making it appear as though an event was in the making at a far off site in a bid to distract emergency sources at the site so that it could target another critical site at a separate location. While such an attack seems far-fetched, several power companies in the U.S. routinely report instances of hackers trying to circumvent their security to tap into their computer networks. A similar event took place in Estonia this spring after hackers pummeled the government and other Website with cyber attacks as retribution for the removal of a beloved Russian war memorial there.
FBI Prepares Vast Database Of Biometrics - washingtonpost.com
City Is Doubling Police Program to Reduce Crime - New York Times
Thursday, November 29
Silent Attack - Government Technology
On April 25, skin-burning water flowed from the tap in Spencer, Mass., sending 100 people to the hospital and forcing everyone else to avoid their faucets and hoses.
One week after the incident, investigators discovered that two city workers accidentally released an excessive amount of sodium hydroxide, also known as lye, into the water system after they forgot to switch the feed system from manual to automatic.
Silent Attack - Government Technology
Wednesday, November 28
Ammonia pipeline incident paralyzes FL community
http://www.alliedaviation.com/locations/nyo/corpcontact.html
Sunday, November 18
Jean Nouvel Tower Near MoMA - Architecture - New York Times
Played for a Sucker - New York Times
"But Mr. Obama’s Social Security mistake was, in fact, exactly what you’d expect from a candidate who promises to transcend partisanship in an age when that’s neither possible nor desirable."......
"As Peter Orszag, the director of the Congressional Budget Office, put it in a recent article co-authored with senior analyst Philip Ellis: “The long-term fiscal condition of the United States has been largely misdiagnosed. Despite all the attention paid to demographic challenges, such as the coming retirement of the baby-boom generation, our country’s financial health will in fact be determined primarily by the growth rate of per capita health care costs.”"
Saturday, November 17
Texas Security Issues Survey Results
Thursday, November 15
THERE'S NO HIDING FROM THE TRUTH - YOU'RE ON CAMERA!
Security Industry News
"The proliferation of security cameras, analytics and digital video recording devices has lead to the dilemma of data overload.Security professionals are tasked with protecting critical assets, but for decades they have been forced to struggle with grainy video, reduced manpower and financial resources, and technology shortcomings that have kept them in an unfavorable position of reactive threat assessment.The idea that installing more surveillance cameras provides more security is not a panacea. What if that video data cannot be searched in a useful way? The proliferation of security cameras, analytics and digital video recording devices has lead to the dilemma of data overload: numerous hours and security personnel are required to troll through raw video in the hope of pinpointing the exact time of a security violation. This is hardly conducive to rapid investigation and resolution.
With the advent of Intelligent Video Management Systems (IVMS), however, security personnel are finally being empowered to take a more proactive role in preempting incidents and rapidly resolving investigations. New IVMS advances can convert the unstructured video content captured by surveillance systems into a powerful base of structured information -- a central source of security information that can be readily accessed, analyzed and used to meet today’s security needs." ....Stephen Russell - 3VR
Security Industry News
Tuesday, November 13
Cameras would give police much-needed help, remind people they should behave properly
http://www.cantonrep.com/index.php?ID=386114&Category=7&subCategoryID=
Monday, November 12
NY Investigates - Mike Filardi - Investigator
Identity Theft
Computer Crimes
Email Harassment
Protection of Intellectual Property
Personal Injury
Civil Liberty
Insurance Claims
Fraud
Child Custody & Protective Cases
Missing Persons
Parental Screening
Marital Infidelity
Metropolitan Police Department: CCTV - Neighborhood Locations
Churches using security cameras to fight crime | WINK News - Southwest Florida | Local & Florida
Wednesday, November 7
National Infrastructure Advisory Council Members
http://www.dhs.gov/xprevprot/committees/biography_0082.shtm
Statement by Homeland Security Secretary Michael Chertoff on the Release of the Import Safety Action Plan
Protecting our country from dangerous cargo of every kind remains a top priority for the Department of Homeland Security (DHS). Through our own U.S. Customs & Border Protection, DHS is strengthening its mitigation guidelines and increasing maximum penalties against importers who repeatedly import products that violate U.S. law; has developed an implementation plan for the International Trade Data System (ITDS) which will provide all appropriate agencies a single point of access to consolidated import information through a secure web portal; and will continue to expand existing public-private partnerships in order to seek and share recommendations and best practices within the importing community.
http://www.dhs.gov/xnews/releases/pr_1194449982712.shtm
Friday, October 26
"Blackwater Call for Cameras Denied"
Secretary of State Condoleezza Rice on Oct. 5 ordered that video cameras and recording equipment be installed in convoy vehicles guarded by Blackwater USA. But according to internal Blackwater documents, the security firm asked the Department of State in May 2005 to install cameras in official U.S. motorcades protected by its employees "in response to a false accusation against one of our teams in Baghdad." The company considered the fact that that footage could be used against it but decided in the end that the cameras and recording devices would work to its advantage and planned to use footage for training purposes. Following the request, a former official with the Bureau of Diplomatic Security, the Department of State's law-enforcement arm, contacted Blackwater and asked it to "stand down" due to unresolved legal issues. The matter was then dropped.
Wednesday, October 10
N T P A C
Northern Technology and Product Assessment Committee secured funding from the NIJ in November. NETPAC has long range plans to expand its membership beyond the NorthEast
2 Day sessions are held 4x per year allowing vendors to introduce products to DOC administrators giving them a chance to hear in advance about development and manufacturing of products for the correctional market.
Chairman - Alexander Fox, Superintendent of Correctional Facilities in MA DOC, & NETPAC's Chairmain.
https://www.ntpac.org/index.cfm?fuseaction=newsdetail&id=5
Tuesday, October 2
Bloomberg calls surveillance-camera critics 'ridiculous'
"It's just ridiculous people who object to using technology," the mayor said, adding that he had not talked with anyone in London who wasn't "thrilled" at the presence of security cameras in their capital.
The Daily News reported yesterday that a camera in lower Manhattan has been secretly recording license plates in a test of the planned "Ring of Steel" surveillance system.
The plates are compared against a database so the NYPD can immediately know when a suspicious car or truck is in the area. London has such a system in place in its financial district.
Bloomberg, appearing with London Mayor Ken Livingstone at a news conference, said New Yorkers are "very naïve" if they don't realize they are already being watched.
"We are under surveillance all the time," he said, pointing out that cops grab video from private closed-circuit cameras when crimes are committed.
As for privacy concerns, he said, "You've already given that away when you buy a car and register it and put a license plate on the back, which is basically putting your name on the back of the car."
Livingstone agreed that Londoners feel safer because of the cameras, saying he couldn't recall a single letter of complaint.
The mayor called his visit a "busman's holiday." He rode a double-decker bus with Livingstone, viewed a hybrid taxi and visited a police control room, where he saw the original "Ring of Steel" in action.
City of London Police Superintendent Alex Robertson said the surveillance system to monitor every vehicle that enters the square-mile financial district - known as the City of London - was pioneered to combat IRA terrorism.
As a demonstration, he displayed a screen image of the car Bloomberg arrived in. "I'm the handsome one in the back," Bloomberg quipped.
Noting that London has a camera in every bus and subway car, Bloomberg said, "We are way behind and we really do have to catch up."
Bloomberg also talked about another London innovation he admires - congestion pricing, introduced by Livingstone in 2003. Londoners pay $16 to drive into the center of town. Bloomberg said he believed the New York State Legislature would pass his plan to introduce pricing on a pilot basis in the city.
The mayor, who has a home in London's posh Chelsea neighborhood, said he expected to spend more time here once he leaves office.
http://www.nydailynews.com/news/2007/10/02/2007-10-02_bloomberg_calls_surveillancecamera_criti.html?ref=rss
Saturday, September 29
Keyloggers proposed to fight terrorism in cybercafes
FIST, a nonprofit organization in Mumbai, is focused on cybersecurity and has worked with the police on related issues. It aims to get keyloggers on computers in cybercafes throughout India, Mukhi said.
http://www.networkworld.com/news/2007/091207-keyloggers-proposed-to-fight-terrorism.html?fsrc=rss-security
Storm Worm the largest BotNet in the World w/over 1 million infected
Most threat watchers say no one knows who is behind Storm, but Finnish antivirus maker F-Secure, which takes credit for giving Storm its name, says a group called the Zhelatin Gang is responsible and whom the company believes is operating out of Russia. F-Secure also says that Storm is the largest botnet in the world with just more than 1 million infected PCs; however, other researchers say there’s no way to know how many PCs have been infected.
http://dsc.discovery.com/news/2007/09/18/bombtest_tec.html?category=technology&guid=20070918133030&dcitc=w19-506-ak-0009
A Bomb Sniffing Briefcase?
The device is smaller, faster and more comprehensive than other similar tools, Haddad said. http://dsc.discovery.com/news/2007/09/18/bombtest_tec.html?category=technology&guid=20070918133030&dcitc=w19-506-ak-0009
Market Research Report "Global Electronic Surveillance Market Outlook"
This report will help clients to analyze the new opportunities critical to the success of Electronic Surveillance Technology industry at global level and detailed data and analysis will help the potential investors to navigate through the evolving market.The “Global Electronic Surveillance Market Outlook” report reviews global Electronic Surveillance industry at global as well as country level. In this report, global biometric industry, CCTV industry and RFID industry have been included. For evaluating future prospects of the Electronic Surveillance Technology, a rational approach has been adopted in the report; it is not based on a complex economic model, but is intended as a rough guide to the direction in which the market is likely to move.
This forecast is based on a correlation between past market growth and growth of drivers.Market AnalysisGlobal Electronic Surveillance Industry is largely driven by the CCTV industry followed by global biometric and RFID industry. North America was the largest market in the Electronic Surveillance industry globally in 2006.The expanding business establishments have become the other major market for the security systems, such as biometric, RFID and CCTV. Increasing threat to global security, constant desire for personal protection, and acceptance of new technologies is driving the Electronic Surveillance market and opening limitless opportunities for the future.Key Findings - In Europe, UK remain the leading market for the CCTV industry.
Security and safety applications accounted for the majority of the market share while the other applications, such as traffic control and monitoring of industrial plants, had relatively smaller share. - Security and safety along with government support remains the largest driving forces for the global Electronic Surveillance technologies. - In Biometric industry, fingerprint recognition remains the largest revenue generator although its share has declined in overall revenue terms. - The global CCTV market is anticipated to grow at a CAGR of 12.4% for the period spanning from 2005 to 2008. However, the global demand for conventional CCTV systems is showing downward trend with the escalating demand for IP-based CCTV surveillance. - At country level, Japan remains the largest player in CCTV market and it is among the largest markets for biometric application in ATM. - The RFID industry is expected to represent a CAGR of over 19% for the period from 2007 to 2016. The driving factors include various initiatives that worldwide countries are assuming in order to get benefits from RFID technology.Key Issues & Facts Analyzed - What are the various technologies in global Electronic Surveillance industry and what are their respective market values? - How the Electronic Surveillance technology market is growing presently? - What is the outlook of the Electronic Surveillance Technology at country level? - What opportunities exist for the manufacturers at global level? - What are the major driving forces and challenges for the industry? - Overview of the global Electronic Surveillance market. - Analysis of the Electronic Surveillance market by segments. - What is the future potential for the industry?Key Players AnalyzedThis section provides a complete overview of key players including Aiphone Co., Ltd, BIO-key International, Inc, 3I Security International SRL, SRL, Sagem SA, L-1 Identity Solutions, Inc., Bell Group Plc, ALFACOD SRL & AHB Electronic GmbH.Research Methodology UsedInformation SourcesThe information has been compiled from authentic and reliable sources like books, newspapers, trade journals, and white papers, industry portals, government agencies, trade associations, monitoring industry news and developments, and access to more than 3000 paid databases.Analysis MethodMethods like ratio analysis, historical trend analysis, linear regression analysis using software tools, judgmental forecasting and cause and effect analysis have been used in the report to prudently analyze the market.
http://www.rncos.com/Report/IM553.htm
Weakest Security Link = People?
Business partners and third parties also represent a cause of computer security breaches, one example given being the loss of up to 48 million credit and debit card details from a well-known discount retailer.
Deloitte called for the financial services sector to provide a concerted effort to educate customers, employees, third parties and business partners of IT risk. 'Until there is a concerted effort to provide tailored security knowledge and awareness programms to all of the people who comprise an organization's risk categories, organizations will continue to be at the mercy of the growing threat profile,' the report says.
Although errors and omissions by employees were identified as major factors contributing to ongoing security failures, almost a quarter (22 percent) of respondents provided no employee security training over the past year and only around one third of respondents (30 percent) say their staff is well skilled, with adequate competencies to respond to security needs. "
IronKey: The World's Most Secure Flash Drive
If you are interested in buying the Iron Key for your corporation, contact me at lvenditti@totalrecallcorp.com for a quote on quantities.
DHS video shows potential impact of cyberattack
Deutsche demolition probed for payments to mob-linked firm
Judge: NYC can make cabbies get GPS, credit card machines
Dolphin spotted swimming in Coney Island Creek
Former FBI agent now a senior pastor at Brooklyn church
COPPOLA 'FAMILY' STOLEN | AP | International News | Latest World News | Current
FBI'S THREE-FRONT WAR ON TERRORISTS | AP | International News | Latest World News | Current
Cyber Security Awareness Month
ABC News: 21.7 Million Lbs. of Ground Beef Recalled
Related Stories Burgers May Have Caused 21 to Get . The recall represents all Topps products with either a 'sell by date' or a 'best if used by date' between Sept. 25 this year and Sept. 25, 2008. The Elizabeth-based company said this information is found on a package's back panel. All recalled products also have a USDA establishment number of EST 9748, which is located on the back panel of the package and-or in the USDA legend, the company said."
Retailer Steve & Barry's Gets Surveillance Upgrade @ The Latest for Security Executives SecurityInfoWatch.com
Grocer Finds Security Cameras Help Identify Scam @ The Latest for Security Executives SecurityInfoWatch.com
Bush Signs Maritime, Air Cargo Inspection Bill @ The Latest for Security Executives SecurityInfoWatch.com
As NASCO Honors Its Own, Industry Faces Change @ The Latest for Security Executives SecurityInfoWatch.com
As one New York-based security firm told me as we discussed this issue of regulation, "Nevada can be a real problem, as can other states if they don't offer reciprocity." The challenge for this particular man's security officer services and protection detail company is that client's don't know state boundaries, and while a client may focus 90 percent of your work in the state you are licensed, you might need to be in a non-reciprocal state in two weeks and not have the license to do it.
"If there's going to be more licensing and regulation for our industry," said the company owner, "then it really needs to come from the national level. I don't mind being regulated and having to meet national standards -- and I think it would be good for us to weed out the bad companies -- but at our size, we can't go from state to state to meet all the individual rules and licenses."
Pentagon Has Near And Long-Term Biometrics Strategy @ The Latest for Security Executives SecurityInfoWatch.com
Monday, September 24
Vote to arm university officers in Regents' hands
http://www.securitydirectornews.com/index.php?p=article&id=sd200709sDr6Fi
COUNCIL BLUFFS, Iowa--The Iowa Board of Regents voted last week to develop a comprehensive security policy for Iowa's three public universities that would include arming qualified campus police officers.Directors of public safety at those schools say a comprehensive security policy is what their officers need to be prepared in any situation.
Friday, September 21
Weighing in on School Video Surveillance Policies @ The Latest SecurityInfoWatch.com
SBInet Virtual Border Fence Still Not Successful @ The Latest SecurityInfoWatch.com
2 Students Shot at Delaware State Univ. @ The Latest SecurityInfoWatch.com
Student Brings Fake Bomb into Logan Airport @ The Latest SecurityInfoWatch.com
Blackwater License Revoked in Iraq @ The Latest for Security Executives SecurityInfoWatch.com
Monday, September 17
'Jihadi' Images, Detonator Video Found
Armed student's motives unclear Dearborn
Bush Selects Ex-Judge as Attorney General Nominee - washingtonpost.com
US investigates into Blackwater incident - Yahoo! News
Sunday, September 9
New group to help first responders with ID cards - Network World
Schlage Keyless Deadbolt Locks
Dedicated Micros Analog Camera Series
Judge overturns portion of PATRIOT Act
BBC NEWS | Technology | Mobile phone technology turns 20
Happy Birthday Cellular/Mobile Communications*****In September of 1987 I worked for Cellular One in Syracuse, within 6 months I lead the sales team as the top revenue producer! Jeff Rubenstein sold his company off in 1988 and walked away with over $25 Million...Not a bad call Jeff! LVenditti
Monday, August 27
City Council Bill Would Take Out City's Styrofoam - August 23, 2007 - The New York Sun
Google Reader (100+)
BBC NEWS | England | London | Man arrested over wi-fi 'theft'
BBC NEWS | Technology | Millions hit by Monster site hack
ABC News: Arabic Public School Draws Protests
Broncos Beef up Security @ The Latest for Security Executives SecurityInfoWatch.com
Bush Signs Maritime, Air Cargo Inspection Bill @ The Latest for Security Executives SecurityInfoWatch.com
ABC News: Attorney General Gonzales Resigns
My personal prediction for his replacement is Fran Townsend! Laurie
Friday, August 24
"Strategy Game Trains Cops and Firefighters"
Graduate students from the University of Southern California's Viterbi School of Engineering are collaborating with Sandia National Laboratories on a real-time strategy game that allows police officers, fire fighters, and other first responders to practice emergency scenarios. The game, Ground Truth, is realistic because events in the game occur in real time, putting added pressure on first responders to act swiftly. Jim Pointer, the medical director of Alameda County's Emergency Medical Services Agency, recently completed an intense session of Ground Truth that called for him to oversee a city's response to a toxic chemical spill. During the scenario, he was responsible for managing traffic barriers, putting hazmat teams and police cars in position to respond to the spill, and managing medical collection points while keeping an eye out for toxic plumes. Pointer says the game is fun, educational, and has great promise. Blizzard Entertainment's Warcraft III game provided inspiration for Ground Truth, which could eventually receive funding from private industry or even the Homeland Security Department.(go to web site)
"Missouri Task Force Recommends How to Make College Campuses Safer"
Missouri's Campus Security Task Force has released a set of 33 guidelines designed to make the state's college campuses safer. The task force, formed in the wake of April's shootings at Virginia Tech, recommends creating a "culture of preparedness" by coordinating response plans with local police and fire departments. The guidelines also say that schools should train faculty, staff, and students on what they should do in the case of an emergency. Although the report describes Missouri colleges as safe, it also shows that while 86 percent of the schools have an emergency plan, less than 30 percent have coordinated with local police and fire departments. About two-thirds of the schools have a system in place for identifying and managing troubled students, but just 40 percent of the schools participate with nationally accredited crisis training programs. The report also suggests that colleges expand counseling services and train staff on how to assess students that could present a threat. Many of the recommendations in the report could be addressed by colleges for a low cost, especially considering the increased state funding that they should receive in the next three years.(go to web site)
"Va. Tech Review Recommends Steps to Avert Another Tragedy"
The latest recommendations from three review committees in the wake of the April 16 shootings at Virginia Tech focus on university communication systems improvements, better privacy issue training for staff members, increased security for students and faculty, and reforms for the university's counseling system to ensure troubled students get the help they need. In terms of communication recommendations, the review committees indicated electronic banners in classrooms and hallways could be used to alert students to emergencies, and a location system could be used to pinpoint where students are should emergencies arise. Security recommendations included the use of locks on the inside of classroom doors to prevent killers from entering classrooms at random. The review panels also indicated changes be made to the counseling system to increase monitoring of students deemed a possible danger to themselves or others. Additionally, student health records should be shared among university staff to ensure monitoring systems are functional; it is not clear whether Virginia Tech's officials shared information on the April 16 gunman. Parents, however, continued to criticize university officials for not locking down the campus to prevent more student and faculty deaths, but the officials rebutted, "A lockdown is simply not feasible on a campus the size of a small city."(go to web site)
"Can a Government Remotely Detect a Terrorist's Thoughts?"
The U.S. Homeland Security Department's Project Hostile Intent (PHI) has the ambitious goal of projecting "current or future hostile intentions" among the 400 million people who enter the country each year through remote behavior analysis systems, according to DHS representative Larry Orluskie. He explains that PHI intends to identify physical markers (blood pressure, heartbeat, facial expressions, etc.) associated with hostility or the desire to deceive, and apply this knowledge toward the development of "real-time, culturally independent, non-invasive sensors" and software that can spot such behaviors. Such sensors could include infrared light, heart rate and respiration sensors, eye tracking, laser, audio, and video. For four years, the U.S. Transportation Security Administration has been using the Screening Passengers through Observation Techniques (SPOT) program to detect suspicious people through study of micro-expressions--involuntary facial telltales that indicate attempts to deceive--but the process is costly and arduous, and is not something a baggage screener or customs official can do in addition to their regular duties. The automation of the SPOT program, with computers instead of people screening for micro-expressions and other suspicious bodily indicators, is the impetus behind PHI. Experts doubt that such capability could be accomplished by the end of the decade, if at all, and are skeptical that such systems could identify hostile micro-expressions in a potential terrorist, given the lack of knowledge about and complexity of such expressions. Another unknown factor is whether such signs could be spotted hours or even weeks before a terrorist incident. There is also the danger that innocents who are highly emotional or aggravated due to stress might be flagged as potential terrorists.(go to web site)
"Office Computer Monitoring Gets More Sophisticated"
Sale of Major League Baseball Caps With Gang Colors
"Major League Baseball … is very concerned about the issue," said Silvia Alvarez, the league's director of multicultural and charitable communications, in a statement. She indicated that MLB would encourage and support the pulling of these caps from stores.
The Coalition to Protect our Children said the group would continue its efforts to stop the sale of caps with gang colors and symbols and plans to hold gang-awareness workshops for families in the community.
Firm Hired to Monitor Gambling on Open
After a sports summer rocked by a gambling scandal involving the former N.B.A. referee Tim Donaghy and a betting investigation involving a match played by the fourth-ranked men’s tennis player Nikolay Davydenko, the United States Tennis Association has hired a consulting firm to detect and monitor potential gambling activity at the United States Open.
The firm of SafirRosetti, run by Howard Safir, a former city police commissioner, has begun work at the Billie Jean King United States National Tennis Center, the site of the Open.
Besides monitoring areas throughout the grounds — included those restricted to players, their entourages and medical personnel — the firm will try to keep tabs on all betting activity surrounding the Open.
On the Front Line in the War on Terrorism
Cops in New York and Los Angeles offer America two models for preventing another 9/11.
Three time zones, 3,000 miles, and a cultural galaxy apart, New York and Los Angeles face a common threat: along with Washington, D.C., they’re the chief American targets of Islamic terror. And both cities boast top cops, sometime rivals—the cities are fiercely competitive—who know that ensuring that a dog doesn’t bark will determine their legacies. After investing millions of dollars in homeland security, Police Commissioner Raymond W. Kelly of New York and Chief William J. Bratton of L.A. can both claim counterterror successes. What can we learn from their approaches? And will they be able to continue preventing terrorist attacks in their cities?
On the face of it, the nation’s two biggest metropolitan forces seem to have adopted kindred counterterrorism strategies. Both have roving SWAT or “Emergency Service Unit” teams, equipped with gas masks and antidotes to chemical and biological agents. Both have set up “fusion” centers to screen threats and monitor secret intelligence and “open-source” information, including radical Internet sites, and both have started programs to identify and protect likely targets. Both have tried to integrate private security experts into their work. Both conduct surveillance that would have been legally questionable before September 11. Both have sought to enlist support from mainstream Muslims and have encouraged various private firms to report suspicious activity.
Saturday, August 18
Biometrics and security in Iraq | Tech news blog - CNET News.com
Senate rejects extra $300 million for Real ID | CNET News.com
BBC NEWS | Technology | Bluetooth helps Facebook friends
ABC News: I Spy: Inside an Air Force Spy Plane
At Issue on College Campus: The Right to Bear Arms @ The Latest for Security Executives SecurityInfoWatch.com
FTC Leaks Whole Foods' Corporate Strategy @ The Latest for Security Executives SecurityInfoWatch.com
Registered Traveler Program Launched at San Francisco International Airport - Government Technology
ABC News: A City's Eyes: Do Cameras Reduce Crime?
The New York Police Department is creating a web of surveillance in lower Manhattan that will eventually include 3,000 public and private security cameras to track terrorists. By the end of this year, 116 license plate readers will monitor cars moving through the area, which is the city's financial district. (AP Photo)
Friday, August 17
The Exploding Market for Video Analytics
Frost & Sullivan research analyst Dilip Sarangan predicts that the market for video analytics technology will increase to more than $400 million by 2012, nearly a sevenfold increase from the $60 million posted in 2005. "The market for video analytics is poised to explode," says Sarangan. "The explosive nature of the market is tied to the increased need for more proactive surveillance, the elimination of human error, the convergence of physical and electronic systems, and increased scalability." Alan Lipton, CTO of ObjectVideo in Reston, Va., concurs, saying, "[Video analytics] has already become table stakes in the world of government security and quasi-government security…and now, for the first time, we're seeing analytics becoming a requirement in the commercial world."(go to web site)
**** My technology preference is Vidient, www.vidient.com Mark Steffler and I are working closely together, offering product briefings. Call me to schedule a briefing at your office! 917-596-3037, Laurie Venditti. If you call Mark directly please mention that you were referred from my site. Tks, Laurie
Thursday, August 16
Michael McCann -President, McCann Protective Services, LLC
I had the pleasure of meeting with Michael McCann, the former Chief of Security of the United Nations, In addition to serving as a Security Subject Matter Expert appearing on the Network News like MSNBC & CNN, Mike also serves as a personal and trusted advisor in New York City and beyond. His company McCann Protective Services LLC delivers discreet and customized security services for the diplomatic community, corporate executives, celebrities and their families.
Mike McCann's Bio
President of McCann Protective Services, LLC. Mike served as Chief of Security for the UN, McCann was responsible for the protection of delegates, staff, visiting dignitaries, and other visitors at the United Nations headquarters and at conferences and meetings organized by the United Nations held in the United States and overseas. In addition to his responsibilities for the safety of the Secretary-General and other senior UN officials, McCann provided strategies and executive direction for UN security operations, including emergency preparedness, crisis management plans and the development of uniform security standards and practices for UN offices globally. The UN Security and Safety Service are recognized internationally for its diversity, professionalism and ability to carry out its mission under challenging circumstances. McCann is a former senior ranking officer from the New York City Police Department. Prior to working at the UN, McCann was a Commanding Officer of Investigative Support for the New York City Police Department where he led the Intelligence Division’s international officials visiting New York City. http://www.mccannprotectiveservices.com/about/profile_michael_mccann.php
Jack J. O’Connor Co-Founder - John J. O’Connor is the Co-Founder of McCann Protective Services, LLC. In 1970 Mr. O’Connor founded OCS Security, a company that provided security services to the New York tri-state region. Over the course of 35 years, OCS grew to 1500 employees with an annual revenue of 30 million dollars. OCS was recognized as a leading security firm providing high quality security services. It was recently acquired by Initial Security. Prior to co-founding McCann Protective Services and being the CEO of OCS Security, O’Connor also had a distinguished career with the the NYPD. His career included many challenging assignments as a Detective Sergeant. He supervised many sensitive criminal investigations, provided protection for foreign dignitaries and presidential candidates
News Clips - CNN, MSNBC, etc.
http://www.mccannprotectiveservices.com/news/viewmedia?id=3852
Wednesday, August 15
NYPD EYES NEW RADICALIZED WAVE
"A dangerous radicalization process is turning frustrated young Muslim men into potential killers who easily blend into society," Police Commissioner Ray Kelly said after releasing the report.
"The people who take this path come from all walks of life," Kelly said at a news conference. "We cant know who for certain will take the radicalization process to its ultimate end, but we can trace their movement through distinct phases along this path."
Kelly's assessment was backed by an intelligence assessment by NYPD terror analysts, which examined domestic plots thwarted since the 2001 World Trade Center attack. http://www.nypost.com/seven/08152007/news/regionalnews/nypd_eyes_new_radicalized_wave_regionalnews_philip_messing_and_leonard_greene.htm
Monday, August 13
Buffalo, N.Y., Announces Security Camera Pilot Program - Government Technology
Wednesday, August 8
GIS Integration
Narrowing the Focus - Jim McKay
Together, they allow investigators at the North Texas Fusion Center (NTFC) to search millions of documents and identify trends without having to peruse each file.
The NTFC is one of many fusion centers in the country whose function is to exchange and analyze data that might relate to homeland security threats. The NTFC is unique because it deals with all hazards - man-made and natural disasters.
The NTFC collaborates with the U.S. Department of Homeland Security Operations Center, the Centers for Disease Control and Prevention, the North Texas High Intensity Drug Trafficking Activity Intelligence Center, the FBI Dallas Emergency Response Network and the local FBI office concerning detection and prevention of critical all-hazards situations.
"We have a very strong focus on prevention instead of the normal response, recovery, detection," said Kelly Stone, director of homeland security for Collin County, where the facility began operations in February 2006. "That's what's a little different about us. These tools are really beneficial to meeting the mission and answering the needs that are associated with the type of queries and access that you need to accomplish that."
http://www.govtech.com/gt/print_article.php?id=126364
Tuesday, August 7
Counterterrorism Blog: An Arrest in California for Material Support of Terrorism in Southeast Asia
Al Qaeda member: U.S. embassies prime targets - CNN.com
(CNN) -- U.S. Embassies and American interests "at home and abroad" are prime targets for terrorist attacks, American al Qaeda member Adam Yahiye Gadahn said in a newly released al Qaeda-produced video. "We shall continue to target you at home and abroad just as you target us at home and abroad ... ," Gadahn -- also known as Azzam the American -- says in the video provided to CNN by www.LauraMansfield.com, a Web site that analyzes terrorism. Later in the video, which is about an hour long and takes the form of a documentary, the self-proclaimed American jihadist makes explicit threats against the United States and U.S. interests, singling out embassies and consulates
Al Qaeda Cell May Be Loose in U.S., British Plot Hints - August 6, 2007 - The New York Sun
WASHINGTON — As an American-born spokesman for Al Qaeda threatens to blow up American embassies abroad, intelligence gleaned from last month's British "doctors plot" of car bombers suggests that a Qaeda cell is on the loose in the American homeland. E-mail addresses for American individuals were found on the same password-protected e-mail chains used by the United Kingdom plotters to communicate with Qaeda handlers in Europe, a counterterrorism official told The New York Sun yesterday. The American and German intelligence community now believe the secure e-mail chains used in the United Kingdom plot have provided a window into an operational Qaeda network in several countries. "Because of the London and Glasgow plot, we now know communications have been made from Al Qaeda to operatives in the United States," the counterterrorism official said on condition of anonymity. "This plot helps to connect a lot of stuff. We have seen money moving a lot through hawala networks and other illicit finance as well." But this source was careful to say that at this point no specific information, such as names, targets or a timeline, was known about any particular plot on American soil. The e-mail addresses that are linked to Americans were pseudonyms…
Sunday, August 5
Watchdog eyeing up CCTV - Law & Policy - Breaking Business and Technology News at silicon.com
Too intrusive? You decide...
Tags: privacy, information commissioner, data protection act, cctv
By Tim Ferguson
Published: Friday 3 August 2007
Show related
articlesCCTV operators may soon be banned from recording people's voices if a new code of practice for the technology's use is approved.
The Information Commissioner's Office (ICO) has issued a new set of guidelines for the use of CCTV, now open for public consultation.
The updated guidelines suggest CCTV must not be used to record conversations between members of the public as it is 'highly intrusive and unlikely to be justified'."
Benefits of Video Analytics in a CCTV System - VideoAnalytics.net - Your IVS Source
Teaching hacking helps students, professors say
FOXNews.com - American Terrorist Threatens U.S. in New Al Qaeda Video - International News | News of the World | Middle East News | Europe News
The 1 hour, 17 minute-long video also featured a computer animated recreation of a March 2006 suicide attack that killed U.S. diplomat David Foy in Karachi, Pakistan and testimony from a man who claimed to be the bomber.
'We shall continue to target you, at home and abroad, just as you target us, at home and abroad, and these spy dens and military command and control centers from which you plotted your aggression against Afghanistan and Iraq,' said Adam Gadahn, also known as Azzan al-Amriki."
Cameras, GPS used to combat bridge failures | Tech news blog - CNET News.com
The small company, a division of Sensible Security, sets up cameras and monitoring systems like GPS to gauge the health of things like bridges, road and other structures. It could become a growing market. "
DEF CON - Hacking conference infiltrated by 'media mole' - Network World
Tuesday, July 31
The IronKey Flash Drive: Ultra-Secure Data Storage, Doesn't Open Chastity Belts, Self-Destructs - One of the most secure portable data storage solutions on the market - Softpedia
In our ultra-technological society, data (and especially very sensitive documents) have become a very valuable commodity and thus the target of many criminals (usually known as hackers, but not necessarily). This is the reason why most users who work with very important documents on a daily basis are generally looking for portable data storage devices that provide very high levels of security and that's exactly the type of device we'll talk about as follows, namely the IronKey, a flash drive that addresses most of the possible security threats these storage solutions might be subjected to (actually, it acts like a chastity belt that keeps the user's data untouched).
****Purchase these secure flash drives from me at Total Recall Corporation. Special pricing for my network is $139.75 please use (LV Secure) as your discount code when placing your order.
Monday, July 30
ABC News: Dog Who Searched for WTC Survivors Dies
ABC News: Dog Who Searched for WTC Survivors Dies: "A black Labrador who became a national canine hero after burrowing through white-hot, smoking debris in search of survivors at the World Trade Center site died Wednesday after a battle with cancer."
Sunday, July 29
www.securitydreamer.com - Steve Hunt's site - Analytics Piece
Object Video and Cisco Share a Board Member
We are all assuming that Cisco is sniffing around video analytics. Will it buy Object Video? If it wants to make the biggest splash initially, that would certainly be a good choice – though arguably not the choice with the best long termimplications for the channel and integration with other Cisco hardware and software initiatives.
A Cisco press release making its rounds these days is the announcement that Cisco and Object Video now share a board member. Here is an excerpt from the PR:
Powell, 43, is currently a Senior Advisor of Providence Equity Partners and Chairman of the MK Powell Group. He was nominated by President William J. Clinton to a Republican seat on the Federal Communications Commission in 1997. He was designated Chairman by President George W. Bush in 2001 and served until 2005. Previously, Powell served as the Chief of Staff of the Antitrust Division in the Department of Justice. Before joining the Antitrust Division, Mr. Powell was an associate in the Washington, D.C. office of the law firm of O'Melveny & Myers LLP, and just prior to joining the firm clerked for the Honorable Harry T. Edwards, Chief Judge of the United States Court of Appeals for the District of Columbia Circuit. Before starting his legal career, Powell served as a policy advisor to Secretary of Defense, Richard B. Cheney. Additionally, Powell's experience includes military service as an armored cavalry officer in the United States Army. Powell earned a bachelor's degree in Government from the College of William and Mary and a Juris Doctor (J.D.) degree from the Georgetown University Law Center.
Powell is a member of the Board of Trustees of the RAND Corporation and the Aspen Institute. Additionally, he serves on the Boards of ObjectVideo and CMWare, Inc. He also currently serves as Rector of the Board of Visitors of the College of William and Mary.
FresnoBee.com: Local: French conglomerate eyes Pelco
Saturday, July 28
Education Campus Security Meeting Planned for Aug. in Virginia @ The Latest for Security Executives SecurityInfoWatch.com
The event comes in the wake of the April 16 massacre at Virginia Tech, where a 23-year-old Fairfax County student gunned down 27 students and five faculty members before killing himself."
Thursday, July 26
When Whippersnappers and Geezers Collide - New York Times
Military, families at risk to data exposure by SAIC - IT Security News - SC Magazine US
Some say schools giving Muslims special treatment - USATODAY.com
Some public schools and universities are granting Muslim requests for prayer times, prayer rooms and ritual foot baths, prompting a debate on whether Islam is being given preferential treatment over other religions. The University of Michigan at Dearborn is planning to build foot baths for Muslim students who wash their feet before prayer. An elementary school in San Diego created an extra recess period for Muslim pupils to pray. At George Mason University in Fairfax, Va., Muslim students using a "meditation space" laid out Muslim prayer rugs and separated men and women in accordance with their Islamic beliefs. Critics see a double standard and an organized attempt to push public conformance with Islamic law… Zuhdi Jasser, a Muslim and chairman of the American Islamic Forum for Democracy, which promotes separation of mosque and state, says he is concerned about the accommodations. "Unusual accommodations for one faith at the cost of everybody else doesn't fall on the side of pluralism," he said...
U.S. Tracks Saudi Bank Favored by Extremists - WSJ.com
JIDDA, Saudi Arabia -- In the 1940s, two Bedouin farm boys from the desert began changing money for the trickle of traders and religious pilgrims in this then-remote and barren kingdom. It was a business built on faith and trust, Sulaiman Al Rajhi once told an interviewer, and for many years he would hand gold bars to strangers boarding flights in Jidda and ask them to give the gold to his brother on their arrival in Riyadh. Following the Sept. 11, 2001, attacks, the bank also set off an intense debate within the U.S. government over whether to take strong action against its alleged role in extremist finance. Confidential reports by the Central Intelligence Agency and other U.S. agencies, reviewed by The Wall Street Journal, detail for the first time how much the U.S. learned about the use of Al Rajhi Bank by alleged extremists, and how U.S. officials agonized over what to do about it.
Al Qaeda seen in search of nukes - Nation/Politics - The Washington Times, America's Newspaper
Al Qaeda terrorists are continuing to plan attacks against the United States and are seeking nuclear and other unconventional arms for the strikes, a senior Pentagon official told Congress yesterday. Retired Air Force Lt. Gen. James Clapper, the undersecretary of defense for intelligence, told a joint House committee hearing that al Qaeda has conducted terrorist attacks against more than two dozen nations since September 11. "Al Qaeda has and will continue to attempt visually dramatic mass-casualty attacks here at home, and they will continue to attempt to acquire chemical, biological, radiological and nuclear materials," Gen. Clapper said in discussing the National Intelligence Estimate (NIE) on threats to the United States. "And if they're so successful in obtaining these materials, we believe they would use them." He spoke before a joint hearing of the House Armed Services Committee and House Permanent Select Committee on Intelligence. Gen. Clapper said that al Qaeda has "reconstituted some of its command and support network" in tribal Pakistan along the Afghan border but that the estimates finding are "not a surprise."…
VideoSave - Secure Off-site Video Storage
LV...Bob Crowe is someone I have known for over 20 years. He has over 30 years of experience in Security Solutions, Video & Access Control. He has found a niche` to offer off site storage for video solutions. If you reach out to him, please mention that I sent you... tks, Laurie