Monday, December 31

Guantanamo Terror Convict to Be Set Free - washingtonpost.com

Guantanamo Terror Convict to Be Set Free - washingtonpost.com: "ADELAIDE, Australia -- Convicted terror supporter David Hicks was due to walk free Saturday after more than six years of captivity in Guantanamo Bay and Australia, but will face strict controls on his movements after a court found he was still a security risk."

Homeland Security Intelligence: Just the Beginning

Homeland Security Intelligence: Just the Beginning: "Since the 11 September 2001 attacks, the federal government has proposed and implemented numerous new domestic intelligence programs to bolster its counter-terrorism capabilities. These domestic intelligence programs run the gamut from increased aerial surveillance to increased wiretap authority to the creation of passive surveillance systems to detect the presence of nuclear, chemical, or biological agents. Additional controversial domestic intelligence programs include the Justice Department’s proposed Operation TIPS for public reporting of suspicious activity, the modification of the Foreign Intelligence Surveillance Act to increase the use of information acquired in court-approved wiretaps, and the creation of the Total Information Awareness program—since renamed the Terrorism Information Awareness program—to determine whether large-scale data mining could be a feasible way to track or catch terrorists."

DHS puts cybersecurity toward top of 2008 to-do list

DHS puts cybersecurity toward top of 2008 to-do list: "Cybersecurity, immigration and border security, secure identification, and continuing to “institutionalize the department's functions” are the four areas that the department’s agenda will focus on in 2008, said Chertoff, who will mark his third year as secretary of DHS in February 2008."

Cyber Security Threats To Pipelines and Refineries

"Cyber Security Threats To Pipelines And Refineries"Pipeline & Gas Journal (11/07) Vol. 234, No. 11, P. 56 ; Williams, Tyler
The cyber security threat to critical infrastructure systems continues to be a clear and present danger. Terrorists and hackers that want to paralyze the United States could deal a devastating blow by disabling key infrastructure systems such as power plants, oil and gas pipelines and refineries. Pipelines are especially vulnerable because they tend to be located in unpoliced and isolated areas. Although the Supervisory Control and Data Acquisition (SCADA) system offers a measure of protection, an entire pipeline could be taken out of commission if an attacker gained access to a physical Ethernet port at a field site. An combined cyber and physical attack also poses major implications, particularly if an attacker accesses critical servers in a SCADA control center. By infiltrating a server in the control center, the hacker could feed false information to the asset owner, making it appear as though an event was in the making at a far off site in a bid to distract emergency sources at the site so that it could target another critical site at a separate location. While such an attack seems far-fetched, several power companies in the U.S. routinely report instances of hackers trying to circumvent their security to tap into their computer networks. A similar event took place in Estonia this spring after hackers pummeled the government and other Website with cyber attacks as retribution for the removal of a beloved Russian war memorial there.

FBI Prepares Vast Database Of Biometrics - washingtonpost.com

FBI Prepares Vast Database Of Biometrics - washingtonpost.com: "CLARKSBURG, W. Va. -- The FBI is embarking on a $1 billion effort to build the world's largest computer database of peoples' physical characteristics, a project that would give the government unprecedented abilities to identify individuals in the United States and abroad."

City Is Doubling Police Program to Reduce Crime - New York Times

City Is Doubling Police Program to Reduce Crime - New York Times: "Every new police officer in New York City will be sent onto the streets of some of the city’s toughest neighborhoods as part of a broad anticrime operation that the authorities say has helped produce historic drops in crime, the city announced on Wednesday."

Thursday, November 29

Silent Attack - Government Technology

Nov 21, 2007, By Jessica Jones
On April 25, skin-burning water flowed from the tap in Spencer, Mass., sending 100 people to the hospital and forcing everyone else to avoid their faucets and hoses.

One week after the incident, investigators discovered that two city workers accidentally released an excessive amount of sodium hydroxide, also known as lye, into the water system after they forgot to switch the feed system from manual to automatic.

Silent Attack - Government Technology

Wednesday, November 28

Ammonia pipeline incident paralyzes FL community

Ammonia pipeline incident paralyzes FL community: "It all started when a 16-year-old boy drilled into an ammonia pipeline at the river Monday night, unleashing a gas cloud that seriously burned him, caused emergency evacuations and closings and potentially harmed the environment. Damage to the pipeline itself, officials say, will be about $250,000. "

http://www.alliedaviation.com/locations/nyo/corpcontact.html

Sunday, November 18

Jean Nouvel Tower Near MoMA - Architecture - New York Times

Jean Nouvel Tower Near MoMA - Architecture - New York Times: "Commissioned by Hines, an international real estate developer, the tower will house a hotel, luxury apartments and three floors that will be used by MoMA to expand its exhibition space. The melding of cultural and commercial worlds offers further proof, if any were needed, that Mr. Nouvel is a master at balancing conflicting urban forces."

Played for a Sucker - New York Times

Played for a Sucker - New York Times: .....
"But Mr. Obama’s Social Security mistake was, in fact, exactly what you’d expect from a candidate who promises to transcend partisanship in an age when that’s neither possible nor desirable."......
"As Peter Orszag, the director of the Congressional Budget Office, put it in a recent article co-authored with senior analyst Philip Ellis: “The long-term fiscal condition of the United States has been largely misdiagnosed. Despite all the attention paid to demographic challenges, such as the coming retirement of the baby-boom generation, our country’s financial health will in fact be determined primarily by the growth rate of per capita health care costs.”"

Saturday, November 17

Texas Security Issues Survey Results

The survey found that while administrators consider video to be the single most important tool in securing school environments, budgets for investing in newer security technologies are tight, with only about a quarter of schools expecting a security budget increase in 2008. Distributed online to administrators from public K-12 schools across Texas, the survey asked participants to rank their most significant security issues and their level of preparedness in dealing with those issues. Results indicated that, while Texas schools are moving to address security in their schools, they are not yet adequately prepared to deal with the many types of threats they face in today's world. The high level findings of the survey revealed the following: * The majority of schools (62 percent) consider unauthorized and dangerous people entering the building to be an extremely important concern; however, 78 percent of schools reported being only "somewhat prepared" to deal with an armed intruder on campus. * Funding for security technologies is not currently met with school budgets: almost 75 percent of respondents expect their budgets for video surveillance technologies to either remain steady or decrease in 2008. * Eighty-four percent indicated that if they could select just one tool to help improve security on campus, they would invest in video surveillance; 81 percent of respondents said they are currently using some kind of video cameras in their schools. * Although the majority of schools (60 percent and 72 percent, respectively) feels "extremely prepared" to deal with student infractions such as fights and vandalism and major weather or fire events, only 13 percent feels extremely prepared to deal with an armed intruder on campus. Only 9 percent feels extremely prepared to deal with student abductions from campus. In their fight to protect students, 81 percent of survey respondents indicated they are currently using some kind of video, but only 42 percent are using video proactively to identify problems before they occur. When asked if they could invest in a single security tool, 84 percent of respondents said they would invest in video over intrusion alarms, metal detectors or identity badges. However, 72 percent said they expected security budgets to remain the same or decrease in 2008 and 69 percent said they would need to conduct fundraising to pay for new security equipment. According to the survey, 35 percent of Texas schools are still relying on VCRs and tapes -- a system known as legacy or analog, that is nearly impossible to use proactively. "This survey tells us that Texas schools recognize the power of video technologies to keep students safe on campus," says Andrew Wren, president of Wren. "However, a lot of education still needs to take place to help them learn not only how to use video surveillance in a more proactive manner, but also how to leverage their existing technologies when faced with budget limitations. Cost-effective network video solutions can help schools address both of these issues."

Thursday, November 15

THERE'S NO HIDING FROM THE TRUTH - YOU'RE ON CAMERA!

THERE'S NO HIDING FROM THE TRUTH - YOU'RE ON CAMERA!: " Mayor Bloomberg has said New Yorkers must face the fact that they're being watched by security cameras all the time. He isn't kidding. It's not just the Police Department and MTA watching them. Countless private security cameras eye the city at all times - and some are broadcast to the masses. "

Security Industry News

The Era of Searchable Surveillance Has Come
"The proliferation of security cameras, analytics and digital video recording devices has lead to the dilemma of data overload.Security professionals are tasked with protecting critical assets, but for decades they have been forced to struggle with grainy video, reduced manpower and financial resources, and technology shortcomings that have kept them in an unfavorable position of reactive threat assessment.The idea that installing more surveillance cameras provides more security is not a panacea. What if that video data cannot be searched in a useful way? The proliferation of security cameras, analytics and digital video recording devices has lead to the dilemma of data overload: numerous hours and security personnel are required to troll through raw video in the hope of pinpointing the exact time of a security violation. This is hardly conducive to rapid investigation and resolution.

With the advent of Intelligent Video Management Systems (IVMS), however, security personnel are finally being empowered to take a more proactive role in preempting incidents and rapidly resolving investigations. New IVMS advances can convert the unstructured video content captured by surveillance systems into a powerful base of structured information -- a central source of security information that can be readily accessed, analyzed and used to meet today’s security needs." ....Stephen Russell - 3VR

Security Industry News

Tuesday, November 13

Cameras would give police much-needed help, remind people they should behave properly

In response to “High-crime areas should have cameras” (Nov. 3),: This is an excellent idea. The police need all the help they can get. Cameras do not require sleep or overtime pay. They also catch things the human eye may miss. One may think that it is easy to misinterpret another’s actions; true, but some things are obvious.
http://www.cantonrep.com/index.php?ID=386114&Category=7&subCategoryID=

Monday, November 12

NY Investigates - Mike Filardi - Investigator

Mike Filardi, retired Sergeant for a prominent New York State Police Department is offering his expert investigative services. His website is http://www.nyinvestigates.com/ . Some of the services that he is offering include:

Identity Theft
Computer Crimes
Email Harassment
Protection of Intellectual Property
Personal Injury
Civil Liberty
Insurance Claims
Fraud
Child Custody & Protective Cases
Missing Persons
Parental Screening
Marital Infidelity

Metropolitan Police Department: CCTV - Neighborhood Locations

Metropolitan Police Department: CCTV - Neighborhood Locations: "CCTV – Locations of Neighborhood Cameras Following are the locations of the CCTV cameras designed to combat crime in DC neighborhoods"

Churches using security cameras to fight crime | WINK News - Southwest Florida | Local & Florida

Churches using security cameras to fight crime WINK News - Southwest Florida Local & Florida: "16 churches have been burglarized in Lee County just this year. While most of those churches are willing to forgive, some are now setting up security cameras that will never forget."

CrimeEye In Washington, DC

CrimeEye on Flickr - Photo Sharing!

Wednesday, November 7

National Infrastructure Advisory Council Members

The National Infrastructure Advisory Council (NIAC) shall provide the President through the Secretary of Homeland Security with advice on the security of the critical infrastructure sectors and their information systems. The council is composed of a maximum of 30 members, appointed by the President from private industry, academia, and state and local government.

http://www.dhs.gov/xprevprot/committees/biography_0082.shtm

Statement by Homeland Security Secretary Michael Chertoff on the Release of the Import Safety Action Plan

This action plan represents the culmination of extensive research, information gathering, and thoughtful discussions among our federal interagency partners, private sector representatives within the importing community, as well as foreign producers, exporters and government officials. Federal partners supporting the Interagency Working Group traveled to more than two dozen cities across the country visiting ports-of-entry; key transportation modes of operation such as railroads, airports, and freight hubs; and major processing sites representing wholesalers, retailers, supermarkets, and meat and seafood processing facilities.
Protecting our country from dangerous cargo of every kind remains a top priority for the Department of Homeland Security (DHS). Through our own U.S. Customs & Border Protection, DHS is strengthening its mitigation guidelines and increasing maximum penalties against importers who repeatedly import products that violate U.S. law; has developed an implementation plan for the International Trade Data System (ITDS) which will provide all appropriate agencies a single point of access to consolidated import information through a secure web portal; and will continue to expand existing public-private partnerships in order to seek and share recommendations and best practices within the importing community.
http://www.dhs.gov/xnews/releases/pr_1194449982712.shtm

Friday, October 26

"Blackwater Call for Cameras Denied"

Print Article
Secretary of State Condoleezza Rice on Oct. 5 ordered that video cameras and recording equipment be installed in convoy vehicles guarded by Blackwater USA. But according to internal Blackwater documents, the security firm asked the Department of State in May 2005 to install cameras in official U.S. motorcades protected by its employees "in response to a false accusation against one of our teams in Baghdad." The company considered the fact that that footage could be used against it but decided in the end that the cameras and recording devices would work to its advantage and planned to use footage for training purposes. Following the request, a former official with the Bureau of Diplomatic Security, the Department of State's law-enforcement arm, contacted Blackwater and asked it to "stand down" due to unresolved legal issues. The matter was then dropped.

Wednesday, October 10

N T P A C

N T P A C
Northern Technology and Product Assessment Committee secured funding from the NIJ in November. NETPAC has long range plans to expand its membership beyond the NorthEast
2 Day sessions are held 4x per year allowing vendors to introduce products to DOC administrators giving them a chance to hear in advance about development and manufacturing of products for the correctional market.
Chairman - Alexander Fox, Superintendent of Correctional Facilities in MA DOC, & NETPAC's Chairmain.
https://www.ntpac.org/index.cfm?fuseaction=newsdetail&id=5

Tuesday, October 2

Bloomberg calls surveillance-camera critics 'ridiculous'

LONDON - Mayor Bloomberg has a message for New Yorkers who don't like surveillance cameras: Get real.
"It's just ridiculous people who object to using technology," the mayor said, adding that he had not talked with anyone in London who wasn't "thrilled" at the presence of security cameras in their capital.
The Daily News reported yesterday that a camera in lower Manhattan has been secretly recording license plates in a test of the planned "Ring of Steel" surveillance system.
The plates are compared against a database so the NYPD can immediately know when a suspicious car or truck is in the area. London has such a system in place in its financial district.
Bloomberg, appearing with London Mayor Ken Livingstone at a news conference, said New Yorkers are "very naïve" if they don't realize they are already being watched.
"We are under surveillance all the time," he said, pointing out that cops grab video from private closed-circuit cameras when crimes are committed.
As for privacy concerns, he said, "You've already given that away when you buy a car and register it and put a license plate on the back, which is basically putting your name on the back of the car."
Livingstone agreed that Londoners feel safer because of the cameras, saying he couldn't recall a single letter of complaint.
The mayor called his visit a "busman's holiday." He rode a double-decker bus with Livingstone, viewed a hybrid taxi and visited a police control room, where he saw the original "Ring of Steel" in action.
City of London Police Superintendent Alex Robertson said the surveillance system to monitor every vehicle that enters the square-mile financial district - known as the City of London - was pioneered to combat IRA terrorism.
As a demonstration, he displayed a screen image of the car Bloomberg arrived in. "I'm the handsome one in the back," Bloomberg quipped.
Noting that London has a camera in every bus and subway car, Bloomberg said, "We are way behind and we really do have to catch up."
Bloomberg also talked about another London innovation he admires - congestion pricing, introduced by Livingstone in 2003. Londoners pay $16 to drive into the center of town. Bloomberg said he believed the New York State Legislature would pass his plan to introduce pricing on a pilot basis in the city.
The mayor, who has a home in London's posh Chelsea neighborhood, said he expected to spend more time here once he leaves office.
http://www.nydailynews.com/news/2007/10/02/2007-10-02_bloomberg_calls_surveillancecamera_criti.html?ref=rss

Saturday, September 29

Keyloggers proposed to fight terrorism in cybercafes

Terrorists are increasingly using the Internet to communicate with one another, as they are aware that telephone and mobile phones connections are under Indian government surveillance, according to Mukhi.
FIST, a nonprofit organization in Mumbai, is focused on cybersecurity and has worked with the police on related issues. It aims to get keyloggers on computers in cybercafes throughout India, Mukhi said.
http://www.networkworld.com/news/2007/091207-keyloggers-proposed-to-fight-terrorism.html?fsrc=rss-security

Storm Worm the largest BotNet in the World w/over 1 million infected

“Storm is a very aggressive worm,” says John Levine, president of consulting firm Taughannock Networks and co-chair of the Internet Research Task Force's Anti-Spam Research Group. “It’s interesting because it uses a [peer-to-peer] control structure that makes it hard to kill.”
Most threat watchers say no one knows who is behind Storm, but Finnish antivirus maker F-Secure, which takes credit for giving Storm its name, says a group called the Zhelatin Gang is responsible and whom the company believes is operating out of Russia. F-Secure also says that Storm is the largest botnet in the world with just more than 1 million infected PCs; however, other researchers say there’s no way to know how many PCs have been infected.

http://dsc.discovery.com/news/2007/09/18/bombtest_tec.html?category=technology&guid=20070918133030&dcitc=w19-506-ak-0009

A Bomb Sniffing Briefcase?

Their system is about the size of a briefcase, and can analyze the components of a bomb residue within 10 minutes, Haddad and colleagues report in the latest issue of the journal Analytical Chemistry.
The device is smaller, faster and more comprehensive than other similar tools, Haddad said. http://dsc.discovery.com/news/2007/09/18/bombtest_tec.html?category=technology&guid=20070918133030&dcitc=w19-506-ak-0009

Market Research Report "Global Electronic Surveillance Market Outlook"

In the wake of increasing security threats and global terrorism, the market research report “Global Electronic Surveillance Market Outlook”, published by RNCOS, provides an in-depth study of the current market trends, evolving technologies and growth prospects of the Electronic Surveillance and security surveillance technology market worldwide.

This report will help clients to analyze the new opportunities critical to the success of Electronic Surveillance Technology industry at global level and detailed data and analysis will help the potential investors to navigate through the evolving market.The “Global Electronic Surveillance Market Outlook” report reviews global Electronic Surveillance industry at global as well as country level. In this report, global biometric industry, CCTV industry and RFID industry have been included. For evaluating future prospects of the Electronic Surveillance Technology, a rational approach has been adopted in the report; it is not based on a complex economic model, but is intended as a rough guide to the direction in which the market is likely to move.

This forecast is based on a correlation between past market growth and growth of drivers.Market AnalysisGlobal Electronic Surveillance Industry is largely driven by the CCTV industry followed by global biometric and RFID industry. North America was the largest market in the Electronic Surveillance industry globally in 2006.The expanding business establishments have become the other major market for the security systems, such as biometric, RFID and CCTV. Increasing threat to global security, constant desire for personal protection, and acceptance of new technologies is driving the Electronic Surveillance market and opening limitless opportunities for the future.Key Findings - In Europe, UK remain the leading market for the CCTV industry.

Security and safety applications accounted for the majority of the market share while the other applications, such as traffic control and monitoring of industrial plants, had relatively smaller share. - Security and safety along with government support remains the largest driving forces for the global Electronic Surveillance technologies. - In Biometric industry, fingerprint recognition remains the largest revenue generator although its share has declined in overall revenue terms. - The global CCTV market is anticipated to grow at a CAGR of 12.4% for the period spanning from 2005 to 2008. However, the global demand for conventional CCTV systems is showing downward trend with the escalating demand for IP-based CCTV surveillance. - At country level, Japan remains the largest player in CCTV market and it is among the largest markets for biometric application in ATM. - The RFID industry is expected to represent a CAGR of over 19% for the period from 2007 to 2016. The driving factors include various initiatives that worldwide countries are assuming in order to get benefits from RFID technology.Key Issues & Facts Analyzed - What are the various technologies in global Electronic Surveillance industry and what are their respective market values? - How the Electronic Surveillance technology market is growing presently? - What is the outlook of the Electronic Surveillance Technology at country level? - What opportunities exist for the manufacturers at global level? - What are the major driving forces and challenges for the industry? - Overview of the global Electronic Surveillance market. - Analysis of the Electronic Surveillance market by segments. - What is the future potential for the industry?Key Players AnalyzedThis section provides a complete overview of key players including Aiphone Co., Ltd, BIO-key International, Inc, 3I Security International SRL, SRL, Sagem SA, L-1 Identity Solutions, Inc., Bell Group Plc, ALFACOD SRL & AHB Electronic GmbH.Research Methodology UsedInformation SourcesThe information has been compiled from authentic and reliable sources like books, newspapers, trade journals, and white papers, industry portals, government agencies, trade associations, monitoring industry news and developments, and access to more than 3000 paid databases.Analysis MethodMethods like ratio analysis, historical trend analysis, linear regression analysis using software tools, judgmental forecasting and cause and effect analysis have been used in the report to prudently analyze the market.
http://www.rncos.com/Report/IM553.htm

Weakest Security Link = People?

Weakest Security Link = People?: "People remain the weakest security link for financial companies, according to consultancy firm Deloitte. The compromising of customers' systems continues to be the major cause of security breaches in financial institutions, according to the 2007 Global Financial Services Security Survey.

Business partners and third parties also represent a cause of computer security breaches, one example given being the loss of up to 48 million credit and debit card details from a well-known discount retailer.

Deloitte called for the financial services sector to provide a concerted effort to educate customers, employees, third parties and business partners of IT risk. 'Until there is a concerted effort to provide tailored security knowledge and awareness programms to all of the people who comprise an organization's risk categories, organizations will continue to be at the mercy of the growing threat profile,' the report says.

Although errors and omissions by employees were identified as major factors contributing to ongoing security failures, almost a quarter (22 percent) of respondents provided no employee security training over the past year and only around one third of respondents (30 percent) say their staff is well skilled, with adequate competencies to respond to security needs. "

IronKey: The World's Most Secure Flash Drive

IronKey: The World's Most Secure Flash Drive: "Data encryption is becoming so important that the Executive Office of the President of the United States is recommending all government agencies encrypt all mobile devices and computers (pdf). IronKey's hardware-encrypted flash drives and online protection services are ideal for companies who want to secure their endpoints and protect their data from leaking into the hands of unauthorized people. Equip your employees, sales people and your best customers and partners with IronKey devices, and enjoy the peace of mind that always-on hardware encryption can bring."

If you are interested in buying the Iron Key for your corporation, contact me at lvenditti@totalrecallcorp.com for a quote on quantities.

DHS video shows potential impact of cyberattack

DHS video shows potential impact of cyberattack: "The short film, created by Idaho National Laboratories, shows the results of a simulated attack on a power network, including a turbine that dramatically overheats and shuts down. The test, known as the Aurora Generator Test, happened in March when researchers investigated the impact of a vulnerability that has since been fixed, the AP reported. 'They've taken a theoretical attack and they've shown in a very demonstrable way the impact you can have using cyber means and cyber techniques against this type of infrastructure,' Amit Yoran, former U.S. cybersecurity chief for the Bush administration, told the AP. 'It's so graphic. Talking about bits and bytes doesn't have the same impact as seeing something catch fire.'"

Deutsche demolition probed for payments to mob-linked firm

Deutsche demolition probed for payments to mob-linked firm: "Prosecutors are probing allegations that a mob-linked demolition firm slipped no-show jobs into the ill-fated Deutsche Bank demolition project, the Daily News has learned. Among those suspected of getting paid without doing any work is Bruce Greenberg, the convicted-felon brother of reputed Gambino associate Harold Greenberg, according to two sources familiar with the investigation. Harold Greenberg was barred from getting any financial benefits from the Deutsche Bank job because of his criminal past."

Judge: NYC can make cabbies get GPS, credit card machines

Judge: NYC can make cabbies get GPS, credit card machines: "A federal judge yesterday refused to stop the city from requiring all yellow cabs to be equipped with Global Positioning Systems and credit card machines."

Dolphin spotted swimming in Coney Island Creek

Dolphin spotted swimming in Coney Island Creek: "The graceful aquatic mammal was spotted in Coney Island Creek by fishermen about 2 p.m. and it hung around for a couple of hours before swimming back out to sea."

Former FBI agent now a senior pastor at Brooklyn church

Former FBI agent now a senior pastor at Brooklyn church: "Retired FBI agent Lucian Gandolfo, whose career highlights include putting away gangsters and ex-con Martha Stewart, is now fully involved in his other vocation - as a minister. Gandolfo, who was ordained in 1996 and has a doctorate in theology, will be installed tomorrow as senior pastor of the Trinity Tabernacle, an evangelical church in Gravesend, Brooklyn."

COPPOLA 'FAMILY' STOLEN | AP | International News | Latest World News | Current

COPPOLA 'FAMILY' STOLEN AP International News Latest World News Current: "September 29, 2007 -- BUENOS AIRES, Argentina - Francis Ford Coppola said yesterday he lost 15 years of computer data, including writings and family photographs, when robbers raided his Argentine studio. "

FBI'S THREE-FRONT WAR ON TERRORISTS | AP | International News | Latest World News | Current

FBI'S THREE-FRONT WAR ON TERRORISTS AP International News Latest World News Current: "Robert Mueller, addressing the Council on Foreign Relations in Manhattan, said the United States is fighting a three-tiered threat from terrorists. On top is the traditional al Qaeda organization, and the second level is comparable to 'al Qaeda franchises' - small groups with ties to an established terrorist organization. The third threat comes from homegrown extremists inspired by al Qaeda's message of violence. The results in that struggle are not easily translated to numbers or statistics, he said."

Cyber Security Awareness Month

SANS Internet Storm Center; Cooperative Network Security Community - Internet Security - isc: "October is Cyber Security Awareness Month and the Internet Storm Center is going to focus on one security awareness subject per day. We plan to provide useful information for information security professionals who want to educate their users but do not have a ready set of awareness tips. "

ABC News: 21.7 Million Lbs. of Ground Beef Recalled

ABC News: 21.7 Million Lbs. of Ground Beef Recalled: "TRENTON, N.J. Sep 29, 2007 (AP) Font Size E-mail Print Share The Topps Meat Co. on Saturday expanded its recall of frozen hamburger patties to include 21.7 million pounds of ground beef that may be contaminated with E. coli bacteria that sickened more than a dozen people in eight states. The recall of products distributed to retail grocery stores and food service institutions in the United States was a drastic increase from the 332,000 pounds recalled Tuesday.

Related Stories Burgers May Have Caused 21 to Get . The recall represents all Topps products with either a 'sell by date' or a 'best if used by date' between Sept. 25 this year and Sept. 25, 2008. The Elizabeth-based company said this information is found on a package's back panel. All recalled products also have a USDA establishment number of EST 9748, which is located on the back panel of the package and-or in the USDA legend, the company said."

Retailer Steve & Barry's Gets Surveillance Upgrade @ The Latest for Security Executives SecurityInfoWatch.com

http://www.securityinfowatch.com/article/article.jsp?id=11797&siteSection=305: "Retailer Steve & Barry's is getting a security upgrade in the form of track-based video surveillance system. The casual clothes retailer signed a contract with security systems vendor Sentry Technology Corporation to deliver the company's CCTV solutions in 33 stores as well as the distribution center for Steve & Barry's. "

Grocer Finds Security Cameras Help Identify Scam @ The Latest for Security Executives SecurityInfoWatch.com

http://www.securityinfowatch.com/article/article.jsp?id=11807&siteSection=305: "The CBS affiliate in Sunrise, Fla., reports that surveillance cameras helped a local grocery store avoid a slip-n-fall liability. The story of the cameras' usage, reported by CBS4, is that a grocery store's camera system caught evidence of a woman planning and executing a slip-n-fall scam."

Bush Signs Maritime, Air Cargo Inspection Bill @ The Latest for Security Executives SecurityInfoWatch.com

http://www.securityinfowatch.com/article/article.jsp?id=12049&siteSection=305: "In a decision that will have a major impact on how cargo moves through the global supply chain, President George W. Bush officially signed into law ?H.R. 1 Implementing Recommendations of the 9/11 Commission Act of 2007? earlier this month. This bill, which was signed off on by the United States Senate and House of Representatives in late July, is expected to significantly alter how maritime and air cargo is inspected. The bill calls for the 100-percent scanning of maritime cargo?before it?s loaded onto vessels heading for the United States?to be required within the next five years. "

As NASCO Honors Its Own, Industry Faces Change @ The Latest for Security Executives SecurityInfoWatch.com

http://www.securityinfowatch.com/article/article.jsp?id=12613&siteSection=305: "Recognized were two individuals; one was a young man named Tim Foster from Pittsburgh who worked as a security officer for U.S. Steel and had to be the 'first responder' to a serious employee accident that left a plant worker in a life-threatening health condition. nine stories up in the air. The other was none other than Guido 'Rick' Massimei from U.S. Security Associates. Rick was honored with the Colonel Minot Dodson Award to recognize of long-time commitment and service to the private security industry. ".......
As one New York-based security firm told me as we discussed this issue of regulation, "Nevada can be a real problem, as can other states if they don't offer reciprocity." The challenge for this particular man's security officer services and protection detail company is that client's don't know state boundaries, and while a client may focus 90 percent of your work in the state you are licensed, you might need to be in a non-reciprocal state in two weeks and not have the license to do it.
"If there's going to be more licensing and regulation for our industry," said the company owner, "then it really needs to come from the national level. I don't mind being regulated and having to meet national standards -- and I think it would be good for us to weed out the bad companies -- but at our size, we can't go from state to state to meet all the individual rules and licenses."

Pentagon Has Near And Long-Term Biometrics Strategy @ The Latest for Security Executives SecurityInfoWatch.com

http://www.securityinfowatch.com/article/article.jsp?id=12630&siteSection=305: "Turning to DoD's long-term needs, Dee said that 'CENTCOM is not the end all to the Department of Defense's requirements.' In classic DoD style, the Pentagon plans to go through the operational user community to learn what the various combatant commanders need, he said."

Monday, September 24

Vote to arm university officers in Regents' hands

Welcome to Security Director News
http://www.securitydirectornews.com/index.php?p=article&id=sd200709sDr6Fi

COUNCIL BLUFFS, Iowa--The Iowa Board of Regents voted last week to develop a comprehensive security policy for Iowa's three public universities that would include arming qualified campus police officers.Directors of public safety at those schools say a comprehensive security policy is what their officers need to be prepared in any situation.

Friday, September 21

Weighing in on School Video Surveillance Policies @ The Latest SecurityInfoWatch.com

http://www.securityinfowatch.com/article/article.jsp?id=12364&siteSection=306: "A new 'best practices' policy from the Arkansas School Boards Association suggests how to deal with video surveillance footage captured at the state's public schools. Not surprisingly, the suggested policy (download it from the ASBA [MSWord document]), which was released earlier this summer, does not get into details of frame rate, or video resolution, or any technical specifics. Rather, the ASBA looks at such issues as how to transfer video footage to other schools, whether video surveillance clips should be attached to the student record, and how the campus should be notified that cameras are being used. "

SBInet Virtual Border Fence Still Not Successful @ The Latest SecurityInfoWatch.com

http://www.securityinfowatch.com/article/article.jsp?id=12413&siteSection=306: "TUCSON, Ariz. -- Because of a software glitch, the first high-tech 'virtual fence' on the nation's borders remains inoperable, three months after its scheduled debut. Homeland Security Secretary Michael Chertoff said he is withholding further payment to the prime contractor, Boeing Co., until the success of the pilot project stretching 28 miles near the border southwest of Tucson."

2 Students Shot at Delaware State Univ. @ The Latest SecurityInfoWatch.com

http://www.securityinfowatch.com/article/article.jsp?id=12417&siteSection=306: "DOVER, Del. -- Two students were shot and wounded, one seriously, at Delaware State University early Friday, and the campus was locked down as police searched for a gunman, officials said. Classes were canceled for the day and students were being kept inside. 'They've been directed to stay in their dorms,' said Carlos Holmes, a university spokesman. 'We don't know where the shooter's at.' At the university's main entrance, swing-arm gates were down to prevent people from driving onto campus. The students were shot near the Memorial Hall gymnasium around 1 a.m., according to a news release on the university's Web site."

Student Brings Fake Bomb into Logan Airport @ The Latest SecurityInfoWatch.com

http://www.securityinfowatch.com/article/article.jsp?id=12431&siteSection=306: "BOSTON -- A 19-year-old student at the Massachusetts Institute of Technology walked into Boston's Logan International Airport on Friday with a fake bomb strapped to her chest and was arrested at gunpoint, authorities said. Star Simpson, who is from Hawaii, wore a computer circuit board, wiring and a putty that later turned out to be Play-Doh strapped over her black hooded sweat shirt and in plain view, said State Police Maj. Scott Pare, the commanding officer at the airport. 'She's extremely lucky she followed the instructions or deadly force would have been used,' Pare told The Associated Press. 'And she's lucky to be in a cell as opposed to the morgue.'"

Blackwater License Revoked in Iraq @ The Latest for Security Executives SecurityInfoWatch.com

http://www.securityinfowatch.com/article/article.jsp?id=12335&siteSection=305: "BAGHDAD -- The Iraqi government said Monday that it was revoking the license of an American security firm accused of involvement in the deaths of eight civilians in a firefight that followed a car bomb explosion near a State Department motorcade."

Monday, September 17

'Jihadi' Images, Detonator Video Found

'Jihadi' Images, Detonator Video Found: "TAMPA - A laptop computer deputies found when they pulled over two University of South Florida students in South Carolina contained a video made by one of the men showing how to use a toy to detonate a bomb remotely, a federal prosecutor said Friday. On that video, the student, Ahmed Mohamed, said the detonator could 'save one who wants to be a martyr for another day, another battle,' Assistant U.S. Attorney Jay Hoffer said. The prosecutor said that video was posted by Mohamed on YouTube, a popular Web site."

Armed student's motives unclear Dearborn

Armed student's motives unclear Dearborn: "His face painted black, Houssein Zorkot entered a park in east Dearborn Sept. 8, cocked an AK47 he had bought the same day, and then tried to flee police after they confronted him, authorities say. Were those the actions of a confused young man or those of a potential terrorist with ill intentions?"

Bush Selects Ex-Judge as Attorney General Nominee - washingtonpost.com

Bush Selects Ex-Judge as Attorney General Nominee - washingtonpost.com: "President Bush today announced his nomination of retired federal judge Michael B. Mukasey to become the nation's 81st attorney general, moving to install a law-and-order conservative at the Justice Department to help wage the war on terrorism while hoping to avoid a confirmation fight with Senate Democrats."

US investigates into Blackwater incident - Yahoo! News

US investigates into Blackwater incident - Yahoo! News: "WASHINGTON - The State Department moved quickly Monday to tamp down anger and possible repercussions after the alleged killing of eight Iraqi civilians by a private security firm hired to protect U.S. diplomats in Iraq. "

Sunday, September 9

New group to help first responders with ID cards - Network World

New group to help first responders with ID cards - Network World: "But complying with the FIPS 201 standard can be expensive, and the consortium thinks that it can help local departments cut costs by offering them a helping hand with the process. 'What we're trying to do is make it easier and more effective for first responders to be FIPS-compliant... so they can go and do their jobs,' said Howard Schmidt, the former cybersecurity advisor to the White House, and a backer of the project. "

Schlage Keyless Deadbolt Locks

Schlage Keyless Deadbolt Locks: "Schlage King Cobra 2 (KC-2) keyless metal electronic locks integrate with the company’s Access Control Management System and are rated ANSI/BHMA Grade 2. They are suitable for apartment, condo, student and military housing applications and have a low susceptibility to kick-in, drilling and wrench attacks. Each lock can accommodate up to 1,000 users and operates with an iButton rather than a key to lock or unlock a door. To use, residents touch their iButtons to the sensor on the face of the lock. Property managers can use supplier software to personalize each iButton so that only one device is needed to gain access to necessary areas of the property. Service professionals can program time-and-date-controlled access. The locks are available in two styles and eight finishes to complement various interiors. Visit securitysolutions.com/productinfo or schlage.com. "

Dedicated Micros Analog Camera Series

Dedicated Micros Analog Camera Series: "Dedicated Micros’ analog camera line includes box, dome and pan/tilt/zoom (PTZ) domes. They are available in standard or vandal-resistant versions. The hot-swappable PTZ dome cameras are available with various housings and installation accessories. Users can select from high or standard resolution, color, true day/night (TDN) and wide dynamic range formats. Visit securitysolutions.com/productinfo or dedicatedmicrosus.com. "

Judge overturns portion of PATRIOT Act

Judge overturns portion of PATRIOT Act: "Congress passed the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act in 2001, granting law enforcement the power to request information on phone calls and e-mail correspondence from electronic communication service providers. In 2006, Congress reauthorized and amended portions of the law to only allow government agents to require that NSL recipients remain silent on the existence of such orders only if the Director of the FBI or a special agent-in-charge designated by the Director has certified that such disclosure would be dangerous. Following the reauthorization of the provisions of the USA PATRIOT Act, the Office of Inspector General for the Department of Justice reported that the use of National Security Letters had climbed quickly at the FBI. The federal law enforcement agency used NSL requests 39,000 times in 2003, 56,000 times in 2004 and 47,000 times in 2005, according to the OIG report. Judge Marrero stayed the ruling until the government can appeal."

BBC NEWS | Technology | Mobile phone technology turns 20

BBC NEWS Technology Mobile phone technology turns 20: "Mobile phone technology turns 20 Nokia's 1100 is the world's best-selling handset The technology behind the mobile phone is celebrating its 20th anniversary. On 7 September 1987, 15 phone firms signed an agreement to build mobile networks based on the Global System for Mobile (GSM) Communications. Mobile phone technology turns 20 Nokia's 1100 is the world's best-selling handset The technology behind the mobile phone is celebrating its 20th anniversary. On 7 September 1987, 15 phone firms signed an agreement to build mobile networks based on the Global System for Mobile (GSM) Communications. "

Happy Birthday Cellular/Mobile Communications*****In September of 1987 I worked for Cellular One in Syracuse, within 6 months I lead the sales team as the top revenue producer! Jeff Rubenstein sold his company off in 1988 and walked away with over $25 Million...Not a bad call Jeff! LVenditti

SecurityDreamer

SecurityDreamer

Sign on Fence that reads:

Warning Fence Treated with Lubricant

Monday, August 27

City Council Bill Would Take Out City's Styrofoam - August 23, 2007 - The New York Sun

City Council Bill Would Take Out City's Styrofoam - August 23, 2007 - The New York Sun: "New York City restaurants and government agencies could soon face a ban on Styrofoam-type fast food containers if the City Council passes a bill introduced yesterday."

Google Reader (100+)

Google Reader : "We couldn't help but stop at this one, which shows Helmsley posing with Imelda 'Steel Butterfly' Marcos, the wife of former Filipino dictator Ferdinand Marcos. Also pictured is Rick 'Loins of Doom' Hilton, father of Paris. To have three people who have unleashed such hardship on the world gathered in one photograph is a rare sight indeed. "

BBC NEWS | England | London | Man arrested over wi-fi 'theft'

BBC NEWS England London Man arrested over wi-fi 'theft': "Man arrested over wi-fi 'theft' A man has been arrested in connection with using a wi-fi broadband connection without permission. He was initially detained by two Police Community Support Officers in Chiswick, west London, on Tuesday. They became suspicious when they saw the 39-year-old using his laptop outside a house in Prebend Gardens. When questioned he admitted to using someone else's unsecured wi-fi broadband connection. He has been bailed pending further inquiries. The case is now being handled by the Metropolitan Police's computer crime unit. Det Con Mark Roberts said: 'This arrest should act as a warning to anyone who thinks it is acceptable to illegally use other people's broadband connections.' Dishonestly obtaining free internet access is an offence under the Communications Act 2003 and a potential breach of the Computer Misuse Act. Man arrested over wi-fi 'theft' A man has been arrested in connection with using a wi-fi broadband connection without permission. He was initially detained by two Police Community Support Officers in Chiswick, west London, on Tuesday. They became suspicious when they saw the 39-year-old using his laptop outside a house in Prebend Gardens. When questioned he admitted to using someone else's unsecured wi-fi broadband connection. He has been bailed pending further inquiries. The case is now being handled by the Metropolitan Police's computer crime unit. Det Con Mark Roberts said: 'This arrest should act as a warning to anyone who thinks it is acceptable to illegally use other people's broadband connections.' Dishonestly obtaining free internet access is an offence under the Communications Act 2003 and a potential breach of the Computer Misuse Act. "

BBC NEWS | Technology | Millions hit by Monster site hack

BBC NEWS Technology Millions hit by Monster site hack: "The vast majority of those affected by the attack are based in the US. Monster estimates that less than 5,000 people outside the US had their details stolen in the attack. Monster said it had more than 73 million CVs in its database. The vast majority of those affected by the attack are based in the US. Monster estimates that less than 5,000 people outside the US had their details stolen in the attack. Monster said it had more than 73 million CVs in its database. "

ABC News: Arabic Public School Draws Protests

ABC News: Arabic Public School Draws Protests: "One of the city's newest public schools is named for poet who promoted peace and published his most famous work while living in New York, but there has been little peace for the Khalil Gibran International Academy. "

Broncos Beef up Security @ The Latest for Security Executives SecurityInfoWatch.com

http://www.securityinfowatch.com/article/article.jsp?id=12048&siteSection=305: "IRVING, Texas - Dave Abrams became the Denver Broncos' shadow in January. His official title is vice president of security. After Darrent Williams was shot and killed Jan. 1 following a nightclub party, the Broncos created the position. Abrams spent 37 years in the Denver Police Department. He worked in SWAT, homicide, internal affairs, patrol and was gang captain. He retired as a deputy chief. The Broncos hired him to help the players in many ways, but foremost he teaches them how to protect themselves."

Bush Signs Maritime, Air Cargo Inspection Bill @ The Latest for Security Executives SecurityInfoWatch.com

http://www.securityinfowatch.com/article/article.jsp?id=12049&siteSection=305: "The bill calls for the 100-percent scanning of maritime cargo?before it?s loaded onto vessels heading for the United States?to be required within the next five years. However, the Department of Homeland Security (DHS) may extend the deadline by two-year increments, if necessary. It also calls for the scanning of all cargo on passenger planes within the next three years. The bill will require specific annual benchmarks on the percentage of maritime cargo containers headed for the U.S., an analysis of how to best incorporate existing maritime security initiatives, including the Container Security Initiative and C-TPAT, and an analysis of the scanning equipment, personnel, and technology needed to reach the 100-percent container scanning objective. On the air cargo side, the Transportation Security Administration will be charged with establishing a system to screen all cargo transported on passenger aircraft operated by domestic or foreign air carriers."

ABC News: Attorney General Gonzales Resigns

ABC News: Attorney General Gonzales Resigns: "Attorney General Alberto Gonzales stepped down from his post Monday, after months of growing criticism from Congress. "

My personal prediction for his replacement is Fran Townsend! Laurie

Friday, August 24

"Strategy Game Trains Cops and Firefighters"

PC World (08/23/07) ; McMillan, Robert

Graduate students from the University of Southern California's Viterbi School of Engineering are collaborating with Sandia National Laboratories on a real-time strategy game that allows police officers, fire fighters, and other first responders to practice emergency scenarios. The game, Ground Truth, is realistic because events in the game occur in real time, putting added pressure on first responders to act swiftly. Jim Pointer, the medical director of Alameda County's Emergency Medical Services Agency, recently completed an intense session of Ground Truth that called for him to oversee a city's response to a toxic chemical spill. During the scenario, he was responsible for managing traffic barriers, putting hazmat teams and police cars in position to respond to the spill, and managing medical collection points while keeping an eye out for toxic plumes. Pointer says the game is fun, educational, and has great promise. Blizzard Entertainment's Warcraft III game provided inspiration for Ground Truth, which could eventually receive funding from private industry or even the Homeland Security Department.(go to web site)

"Missouri Task Force Recommends How to Make College Campuses Safer"

Kansas City Star (08/21/07) ; Wagar, Kit

Missouri's Campus Security Task Force has released a set of 33 guidelines designed to make the state's college campuses safer. The task force, formed in the wake of April's shootings at Virginia Tech, recommends creating a "culture of preparedness" by coordinating response plans with local police and fire departments. The guidelines also say that schools should train faculty, staff, and students on what they should do in the case of an emergency. Although the report describes Missouri colleges as safe, it also shows that while 86 percent of the schools have an emergency plan, less than 30 percent have coordinated with local police and fire departments. About two-thirds of the schools have a system in place for identifying and managing troubled students, but just 40 percent of the schools participate with nationally accredited crisis training programs. The report also suggests that colleges expand counseling services and train staff on how to assess students that could present a threat. Many of the recommendations in the report could be addressed by colleges for a low cost, especially considering the increased state funding that they should receive in the next three years.(go to web site)

"Va. Tech Review Recommends Steps to Avert Another Tragedy"

Washington Post (08/23/07) P. B1 ; Jenkins, Chris L.; Horwitz, Sari

The latest recommendations from three review committees in the wake of the April 16 shootings at Virginia Tech focus on university communication systems improvements, better privacy issue training for staff members, increased security for students and faculty, and reforms for the university's counseling system to ensure troubled students get the help they need. In terms of communication recommendations, the review committees indicated electronic banners in classrooms and hallways could be used to alert students to emergencies, and a location system could be used to pinpoint where students are should emergencies arise. Security recommendations included the use of locks on the inside of classroom doors to prevent killers from entering classrooms at random. The review panels also indicated changes be made to the counseling system to increase monitoring of students deemed a possible danger to themselves or others. Additionally, student health records should be shared among university staff to ensure monitoring systems are functional; it is not clear whether Virginia Tech's officials shared information on the April 16 gunman. Parents, however, continued to criticize university officials for not locking down the campus to prevent more student and faculty deaths, but the officials rebutted, "A lockdown is simply not feasible on a campus the size of a small city."(go to web site)

"Can a Government Remotely Detect a Terrorist's Thoughts?"

New Scientist (08/11/07) Vol. 195, No. 2616, P. 24 ; Marks, Paul
The U.S. Homeland Security Department's Project Hostile Intent (PHI) has the ambitious goal of projecting "current or future hostile intentions" among the 400 million people who enter the country each year through remote behavior analysis systems, according to DHS representative Larry Orluskie. He explains that PHI intends to identify physical markers (blood pressure, heartbeat, facial expressions, etc.) associated with hostility or the desire to deceive, and apply this knowledge toward the development of "real-time, culturally independent, non-invasive sensors" and software that can spot such behaviors. Such sensors could include infrared light, heart rate and respiration sensors, eye tracking, laser, audio, and video. For four years, the U.S. Transportation Security Administration has been using the Screening Passengers through Observation Techniques (SPOT) program to detect suspicious people through study of micro-expressions--involuntary facial telltales that indicate attempts to deceive--but the process is costly and arduous, and is not something a baggage screener or customs official can do in addition to their regular duties. The automation of the SPOT program, with computers instead of people screening for micro-expressions and other suspicious bodily indicators, is the impetus behind PHI. Experts doubt that such capability could be accomplished by the end of the decade, if at all, and are skeptical that such systems could identify hostile micro-expressions in a potential terrorist, given the lack of knowledge about and complexity of such expressions. Another unknown factor is whether such signs could be spotted hours or even weeks before a terrorist incident. There is also the danger that innocents who are highly emotional or aggravated due to stress might be flagged as potential terrorists.(go to web site)

"Office Computer Monitoring Gets More Sophisticated"

A growing number of companies are implementing new software that automatically monitors employee messages and documents for compliance with security regulations. Because sensitive data can escape through multiple digital channels, companies afraid of insider thefts and data breaches are using technology to oversee employee emails, Web postings, instant messages, and offline documents. Some programs can detect when specific keywords are entered in Web forms or documents, and will then warn the user or thwart the action. Similar technologies dig deeper, reviewing information with databases and documents in file services, and can stop files from being moved to portable devices such as USB drives. Discovering sensitive information in an unsuitable spot is essential to ensuring that the data is not accidentally disseminated. While such software typically warns compliance officers of such sightings, software will increasingly repair such messes automatically. And yet, because these technologies are relatively new, software will sometimes mistakenly block an item or generate irritating streams of pop-up alerts. In addition, less than 1 percent of discovered violations are actually disobeying any rules, and the majority of those infringements are accidental. Moreover, criminals can circumvent the technology. However, in a world where reputation and ethics require vigilant oversight, employers and employees are anticipated to accept the growth of compliance-watchdog technologies.(go to web site) Bergstein, Brian

Sale of Major League Baseball Caps With Gang Colors

http://www.foxnews.com/story/0,2933,294409,00.html
"Major League Baseball … is very concerned about the issue," said Silvia Alvarez, the league's director of multicultural and charitable communications, in a statement. She indicated that MLB would encourage and support the pulling of these caps from stores.
The Coalition to Protect our Children said the group would continue its efforts to stop the sale of caps with gang colors and symbols and plans to hold gang-awareness workshops for families in the community.

Firm Hired to Monitor Gambling on Open

http://www.nytimes.com/2007/08/24/sports/tennis/24tennis.html?ei=5088&en=c6ed2f5075e292d0&ex=1345608000&partner=rssnyt&emc=rss&pagewanted=print

After a sports summer rocked by a gambling scandal involving the former N.B.A. referee Tim Donaghy and a betting investigation involving a match played by the fourth-ranked men’s tennis player Nikolay Davydenko, the United States Tennis Association has hired a consulting firm to detect and monitor potential gambling activity at the United States Open.
The firm of SafirRosetti, run by Howard Safir, a former city police commissioner, has begun work at the Billie Jean King United States National Tennis Center, the site of the Open.
Besides monitoring areas throughout the grounds — included those restricted to players, their entourages and medical personnel — the firm will try to keep tabs on all betting activity surrounding the Open.

On the Front Line in the War on Terrorism

http://city-journal.net/html/17_3_preventing_terrorism.html
Cops in New York and Los Angeles offer America two models for preventing another 9/11.
Three time zones, 3,000 miles, and a cultural galaxy apart, New York and Los Angeles face a common threat: along with Washington, D.C., they’re the chief American targets of Islamic terror. And both cities boast top cops, sometime rivals—the cities are fiercely competitive—who know that ensuring that a dog doesn’t bark will determine their legacies. After investing millions of dollars in homeland security, Police Commissioner Raymond W. Kelly of New York and Chief William J. Bratton of L.A. can both claim counterterror successes. What can we learn from their approaches? And will they be able to continue preventing terrorist attacks in their cities?
On the face of it, the nation’s two biggest metropolitan forces seem to have adopted kindred counterterrorism strategies. Both have roving SWAT or “Emergency Service Unit” teams, equipped with gas masks and antidotes to chemical and biological agents. Both have set up “fusion” centers to screen threats and monitor secret intelligence and “open-source” information, including radical Internet sites, and both have started programs to identify and protect likely targets. Both have tried to integrate private security experts into their work. Both conduct surveillance that would have been legally questionable before September 11. Both have sought to enlist support from mainstream Muslims and have encouraged various private firms to report suspicious activity.

Saturday, August 18

Biometrics and security in Iraq | Tech news blog - CNET News.com

Biometrics and security in Iraq Tech news blog - CNET News.com: "As state-level officials and other critics push back hard against the federal Real ID mandate here at home, the U.S. government is reporting success abroad with a biometric ID system it has installed in Iraq. The automated biometric identity system being used by the Iraqi government now holds more than 350,000 sets of fingerprints, photos and retina scans, and 'we increase the database by 4,000 or 5,000 each week,' Army Lt. Col. John W. Velliquette Jr. said in a teleconferenced briefing this week. Velliquette runs the fingerprint and retina scanning center in Baghdad's International Zone. Iraqis are expected to assume full operation by next summer. The system is used to verify the identity of members of the Iraqi police and military, prisoners and prison guards, and authorized gun owners. (The guns must be kept in homes; they're not to be carried out in the streets.) It's also used to identify criminals and suspects in criminal cases, Velliquette said. 'We will get criminal hits; we get 10 to 20 a week from the minister of Interior.'"

Senate rejects extra $300 million for Real ID | CNET News.com

Senate rejects extra $300 million for Real ID CNET News.com: "Action by a divided U.S. Senate on Thursday raises new questions about the fate of a contentious plan to outfit Americans with new digital identification cards by 2013. By a 50-44 vote mostly along party lines, the chamber set aside a Republican-backed amendment to a homeland security spending bill that would have spread $300 million across the states to help them implement the so-called Real ID Act. The Senate also agreed unanimously to adopt an amendment, proposed by vocal Real ID critic Max Baucus (D-Mont.), which prohibits the use of any of the spending bill's funding for 'planning, testing, piloting, or developing a national identification card.' The votes leave just $50 million in additional Real ID grants for states in the the final bill, which passed by an 89-4 vote late Thursday and is now headed to the president's desk. President Bush has previously vowed to veto the entire measure, but it was not immediately clear whether that was still the case."

BBC NEWS | Technology | Bluetooth helps Facebook friends

BBC NEWS Technology Bluetooth helps Facebook friends: "A team of UK researchers is combining the power of social network Facebook with communications tool Bluetooth to learn more about human interactions. Bath University scientists have created a tool which can use the unique ID of Bluetooth devices, like a mobile phone, to build new friendship networks. Users register with the Facebook tool, called Cityware, that tracks encounters in the real world via Bluetooth. It is part of a wider project A team of UK researchers is combining the power of social network Facebook with communications tool Bluetooth to learn more about human interactions. Bath University scientists have created a tool which can use the unique ID of Bluetooth devices, like a mobile phone, to build new friendship networks. Users register with the Facebook tool, called Cityware, that tracks encounters in the real world via Bluetooth. It is part of a wider project "

ABC News: I Spy: Inside an Air Force Spy Plane

ABC News: I Spy: Inside an Air Force Spy Plane: "At virtually any moment — day or night — you can look up and know that somewhere over Earth there's a U-2 pilot at the edge of outer space, watching and listening. The U-2 is the most famous spy plane in history. Developed in secret for the CIA more than 50 years ago, the U-2 first detected the movement of Soviet nuclear weapons into Cuba, sparking the Cuban Missile Crisis. But the U-2 is not just a piece of Cold War history; it has been quietly brought into the space age and is now flying more than ever."

At Issue on College Campus: The Right to Bear Arms @ The Latest for Security Executives SecurityInfoWatch.com

http://www.securityinfowatch.com/article/article.jsp?id=11933&siteSection=305: "RICHMOND, Virginia -- Some U.S. college students want the right to carry guns on campus, saying they should have the ability to protect themselves in the event of a shooting like the one that left 33 people dead at Virginia Tech this spring Andrew Dysart, a George Mason University senior, has organized a chapter of Students for Concealed Carry on Campus, which hopes to convince state legislators to overturn a Virginia law that allows universities to prohibit students, faculty and staff members with gun permits from carrying their weapons on campus."

FTC Leaks Whole Foods' Corporate Strategy @ The Latest for Security Executives SecurityInfoWatch.com

http://www.securityinfowatch.com/article/article.jsp?id=12018&siteSection=305: "WASHINGTON -- Federal regulators filed court documents Tuesday outlining concerns that stores in competitive markets would close and consumers would face higher prices if Whole Foods Market Inc.'s $565 million purchase of Wild Oats Markets Inc. is completed. The Federal Trade Commission documents revealed that Whole Foods plans to close 30 or more Wild Oats stores, a move that the company believes would nearly double revenue for some Whole Foods stores."

Registered Traveler Program Launched at San Francisco International Airport - Government Technology

Registered Traveler Program Launched at San Francisco International Airport - Government Technology: "Aug 16, 2007, News Report Mayor Gavin Newsom Wednesday announced the opening of a new airport security fast-pass program that will help registered passengers speed through screening check points at San Francisco International Airport safely and securely. "

ABC News: A City's Eyes: Do Cameras Reduce Crime?

ABC News: A City's Eyes: Do Cameras Reduce Crime?
The New York Police Department is creating a web of surveillance in lower Manhattan that will eventually include 3,000 public and private security cameras to track terrorists. By the end of this year, 116 license plate readers will monitor cars moving through the area, which is the city's financial district. (AP Photo)

Friday, August 17

The Exploding Market for Video Analytics

"The Exploding Market for Video Analytics"Access Control & Security Systems (07/01/07) Vol. 50, No. 7, P. 12
Frost & Sullivan research analyst Dilip Sarangan predicts that the market for video analytics technology will increase to more than $400 million by 2012, nearly a sevenfold increase from the $60 million posted in 2005. "The market for video analytics is poised to explode," says Sarangan. "The explosive nature of the market is tied to the increased need for more proactive surveillance, the elimination of human error, the convergence of physical and electronic systems, and increased scalability." Alan Lipton, CTO of ObjectVideo in Reston, Va., concurs, saying, "[Video analytics] has already become table stakes in the world of government security and quasi-government security…and now, for the first time, we're seeing analytics becoming a requirement in the commercial world."(go to web site)

**** My technology preference is Vidient, www.vidient.com Mark Steffler and I are working closely together, offering product briefings. Call me to schedule a briefing at your office! 917-596-3037, Laurie Venditti. If you call Mark directly please mention that you were referred from my site. Tks, Laurie

Thursday, August 16

Michael McCann -President, McCann Protective Services, LLC

I had the pleasure of meeting with Michael McCann, the former Chief of Security of the United Nations, In addition to serving as a Security Subject Matter Expert appearing on the Network News like MSNBC & CNN, Mike also serves as a personal and trusted advisor in New York City and beyond. His company McCann Protective Services LLC delivers discreet and customized security services for the diplomatic community, corporate executives, celebrities and their families.

Mike McCann's Bio
President of McCann Protective Services, LLC. Mike served as Chief of Security for the UN, McCann was responsible for the protection of delegates, staff, visiting dignitaries, and other visitors at the United Nations headquarters and at conferences and meetings organized by the United Nations held in the United States and overseas. In addition to his responsibilities for the safety of the Secretary-General and other senior UN officials, McCann provided strategies and executive direction for UN security operations, including emergency preparedness, crisis management plans and the development of uniform security standards and practices for UN offices globally. The UN Security and Safety Service are recognized internationally for its diversity, professionalism and ability to carry out its mission under challenging circumstances. McCann is a former senior ranking officer from the New York City Police Department. Prior to working at the UN, McCann was a Commanding Officer of Investigative Support for the New York City Police Department where he led the Intelligence Division’s international officials visiting New York City. http://www.mccannprotectiveservices.com/about/profile_michael_mccann.php

Jack J. O’Connor Co-Founder - John J. O’Connor is the Co-Founder of McCann Protective Services, LLC. In 1970 Mr. O’Connor founded OCS Security, a company that provided security services to the New York tri-state region. Over the course of 35 years, OCS grew to 1500 employees with an annual revenue of 30 million dollars. OCS was recognized as a leading security firm providing high quality security services. It was recently acquired by Initial Security. Prior to co-founding McCann Protective Services and being the CEO of OCS Security, O’Connor also had a distinguished career with the the NYPD. His career included many challenging assignments as a Detective Sergeant. He supervised many sensitive criminal investigations, provided protection for foreign dignitaries and presidential candidates

News Clips - CNN, MSNBC, etc.
http://www.mccannprotectiveservices.com/news/viewmedia?id=3852

Wednesday, August 15

NYPD EYES NEW RADICALIZED WAVE

Bookstores, cafes and the Internet are breeding grounds for a new wave of free agent, homegrown terrorists who are every bit as deadly as the foreign operatives behind the 9/11 attacks, according to a chilling NYPD intelligence report released today.
"A dangerous radicalization process is turning frustrated young Muslim men into potential killers who easily blend into society," Police Commissioner Ray Kelly said after releasing the report.
"The people who take this path come from all walks of life," Kelly said at a news conference. "We cant know who for certain will take the radicalization process to its ultimate end, but we can trace their movement through distinct phases along this path."
Kelly's assessment was backed by an intelligence assessment by NYPD terror analysts, which examined domestic plots thwarted since the 2001 World Trade Center attack. http://www.nypost.com/seven/08152007/news/regionalnews/nypd_eyes_new_radicalized_wave_regionalnews_philip_messing_and_leonard_greene.htm

Monday, August 13

Buffalo, N.Y., Announces Security Camera Pilot Program - Government Technology

Buffalo, N.Y., Announces Security Camera Pilot Program - Government Technology: "Buffalo, N.Y., Mayor Byron W. Brown this morning announced the installation of a security camera pilot project that will test the technology prior to the installation of a citywide system. Mayor Brown was joined by Buffalo Police Commissioner H. McCarthy Gipson, Deputy Commissioner Dan Derenda, BPD Chief of Staff Joseph Strano and Captain Mark Makowski, who oversees all City Homeland Security matters."

Wednesday, August 8

GIS Integration

http://www.govtech.com/pcio/125490 This push toward greater integration resulted from CIOs moving beyond viewing GIS simply as a mapping tool, said Chris Thomas, state and local government manager for ESRI, a GIS vendor. "They started to realize they need a central repository so that the GIS data isn't sitting in silos, and so they don't have duplicative GIS efforts in different departments."As more municipalities create enterprise GIS departments, Thomas said, the level of interest in combining GIS data with other systems is getting stronger. He gave the example of Philadelphia's creation of executive dashboards that combine GIS data and legacy financial systems. "It's exciting to see," he added. "The kinds of things we were expecting to see a few years ago are happening now."

Narrowing the Focus - Jim McKay

New data-linking technologies are giving north Texas homeland security, law enforcement and emergency management officials a keen edge. The new tools enable investigators to search and link data by geography, and allows them to identify trends or clusters of events. Officials also use a mining technology to search and group similar data, providing a visual presentation of each data group.
Together, they allow investigators at the North Texas Fusion Center (NTFC) to search millions of documents and identify trends without having to peruse each file.
The NTFC is one of many fusion centers in the country whose function is to exchange and analyze data that might relate to homeland security threats. The NTFC is unique because it deals with all hazards - man-made and natural disasters.
The NTFC collaborates with the U.S. Department of Homeland Security Operations Center, the Centers for Disease Control and Prevention, the North Texas High Intensity Drug Trafficking Activity Intelligence Center, the FBI Dallas Emergency Response Network and the local FBI office concerning detection and prevention of critical all-hazards situations.
"We have a very strong focus on prevention instead of the normal response, recovery, detection," said Kelly Stone, director of homeland security for Collin County, where the facility began operations in February 2006. "That's what's a little different about us. These tools are really beneficial to meeting the mission and answering the needs that are associated with the type of queries and access that you need to accomplish that."
http://www.govtech.com/gt/print_article.php?id=126364

Tuesday, August 7

Counterterrorism Blog: An Arrest in California for Material Support of Terrorism in Southeast Asia

This summary is not available. Please click here to view the post.

Al Qaeda member: U.S. embassies prime targets - CNN.com

Al Qaeda member: U.S. embassies prime targets - CNN.com
(CNN) -- U.S. Embassies and American interests "at home and abroad" are prime targets for terrorist attacks, American al Qaeda member Adam Yahiye Gadahn said in a newly released al Qaeda-produced video. "We shall continue to target you at home and abroad just as you target us at home and abroad ... ," Gadahn -- also known as Azzam the American -- says in the video provided to CNN by www.LauraMansfield.com, a Web site that analyzes terrorism. Later in the video, which is about an hour long and takes the form of a documentary, the self-proclaimed American jihadist makes explicit threats against the United States and U.S. interests, singling out embassies and consulates

Al Qaeda Cell May Be Loose in U.S., British Plot Hints - August 6, 2007 - The New York Sun

Al Qaeda Cell May Be Loose in U.S., British Plot Hints - August 6, 2007 - The New York Sun
WASHINGTON — As an American-born spokesman for Al Qaeda threatens to blow up American embassies abroad, intelligence gleaned from last month's British "doctors plot" of car bombers suggests that a Qaeda cell is on the loose in the American homeland. E-mail addresses for American individuals were found on the same password-protected e-mail chains used by the United Kingdom plotters to communicate with Qaeda handlers in Europe, a counterterrorism official told The New York Sun yesterday. The American and German intelligence community now believe the secure e-mail chains used in the United Kingdom plot have provided a window into an operational Qaeda network in several countries. "Because of the London and Glasgow plot, we now know communications have been made from Al Qaeda to operatives in the United States," the counterterrorism official said on condition of anonymity. "This plot helps to connect a lot of stuff. We have seen money moving a lot through hawala networks and other illicit finance as well." But this source was careful to say that at this point no specific information, such as names, targets or a timeline, was known about any particular plot on American soil. The e-mail addresses that are linked to Americans were pseudonyms…

Sunday, August 5

Watchdog eyeing up CCTV - Law & Policy - Breaking Business and Technology News at silicon.com

Watchdog eyeing up CCTV - Law & Policy - Breaking Business and Technology News at silicon.com: "Watchdog eyeing up CCTV
Too intrusive? You decide...
Tags: privacy, information commissioner, data protection act, cctv
By Tim Ferguson
Published: Friday 3 August 2007
Show related
articlesCCTV operators may soon be banned from recording people's voices if a new code of practice for the technology's use is approved.
The Information Commissioner's Office (ICO) has issued a new set of guidelines for the use of CCTV, now open for public consultation.
The updated guidelines suggest CCTV must not be used to record conversations between members of the public as it is 'highly intrusive and unlikely to be justified'."

Benefits of Video Analytics in a CCTV System - VideoAnalytics.net - Your IVS Source

Benefits of Video Analytics in a CCTV System - VideoAnalytics.net - Your IVS Source: "Video analytics offers many benefits to a new or existing CCTV system. The following are some benefits that allow you to effectively monitor your CCTV system."

Teaching hacking helps students, professors say

Teaching hacking helps students, professors say: "As a professor of computer science at the City College of San Francisco, Bowne wanted to find a way to make computer security accessible to the average student. So, following his trip to DEFCON last year, he talked with the administrators at CCSF and got permission to start up a class with a hacking lab. The first course -- called 'Ethical Hacking and Network Defense' -- was an total success, he told attendees at the DEFCON on Friday."

FOXNews.com - American Terrorist Threatens U.S. in New Al Qaeda Video - International News | News of the World | Middle East News | Europe News

FOXNews.com - American Terrorist Threatens U.S. in New Al Qaeda Video - International News News of the World Middle East News Europe News: "CAIRO, Egypt — An American member of Al Qaeda threatened foreign diplomats and embassies in the Islamic world calling them 'spy dens' in the terror network's latest video released Sunday.
The 1 hour, 17 minute-long video also featured a computer animated recreation of a March 2006 suicide attack that killed U.S. diplomat David Foy in Karachi, Pakistan and testimony from a man who claimed to be the bomber.
'We shall continue to target you, at home and abroad, just as you target us, at home and abroad, and these spy dens and military command and control centers from which you plotted your aggression against Afghanistan and Iraq,' said Adam Gadahn, also known as Azzan al-Amriki."

Cameras, GPS used to combat bridge failures | Tech news blog - CNET News.com

Cameras, GPS used to combat bridge failures Tech news blog - CNET News.com: "A key to preventing tragedies like the Minnesota bridge collapse earlier this week is surveillance, according to Aging Infrastructures.
The small company, a division of Sensible Security, sets up cameras and monitoring systems like GPS to gauge the health of things like bridges, road and other structures. It could become a growing market. "

DEF CON - Hacking conference infiltrated by 'media mole' - Network World

DEF CON - Hacking conference infiltrated by 'media mole' - Network World: "That's what organizers of the 15th annual DefCon hacking conference are telling attendees Friday, after being tipped off that the TV news program Dateline NBC has sent a producer with a hidden camera to investigate the show."

Tuesday, July 31

The IronKey Flash Drive: Ultra-Secure Data Storage, Doesn't Open Chastity Belts, Self-Destructs - One of the most secure portable data storage solutions on the market - Softpedia

The IronKey Flash Drive: Ultra-Secure Data Storage, Doesn't Open Chastity Belts, Self-Destructs - One of the most secure portable data storage solutions on the market - Softpedia: "The IronKey Flash Drive: Ultra-Secure Data Storage, Doesn't Open Chastity Belts, Self-Destructs - One of the most secure portable data storage solutions on the market"

In our ultra-technological society, data (and especially very sensitive documents) have become a very valuable commodity and thus the target of many criminals (usually known as hackers, but not necessarily). This is the reason why most users who work with very important documents on a daily basis are generally looking for portable data storage devices that provide very high levels of security and that's exactly the type of device we'll talk about as follows, namely the IronKey, a flash drive that addresses most of the possible security threats these storage solutions might be subjected to (actually, it acts like a chastity belt that keeps the user's data untouched).

****Purchase these secure flash drives from me at Total Recall Corporation. Special pricing for my network is $139.75 please use (LV Secure) as your discount code when placing your order.

Monday, July 30

ABC News: Dog Who Searched for WTC Survivors Dies

Thank you Jake, for your service.
ABC News: Dog Who Searched for WTC Survivors Dies: "A black Labrador who became a national canine hero after burrowing through white-hot, smoking debris in search of survivors at the World Trade Center site died Wednesday after a battle with cancer."

Sunday, July 29

www.securitydreamer.com - Steve Hunt's site - Analytics Piece

April 05, 2007
Object Video and Cisco Share a Board Member
We are all assuming that Cisco is sniffing around video analytics. Will it buy Object Video? If it wants to make the biggest splash initially, that would certainly be a good choice – though arguably not the choice with the best long termimplications for the channel and integration with other Cisco hardware and software initiatives.
A Cisco press release making its rounds these days is the announcement that Cisco and Object Video now share a board member. Here is an excerpt from the PR:
Powell, 43, is currently a Senior Advisor of Providence Equity Partners and Chairman of the MK Powell Group. He was nominated by President William J. Clinton to a Republican seat on the Federal Communications Commission in 1997. He was designated Chairman by President George W. Bush in 2001 and served until 2005. Previously, Powell served as the Chief of Staff of the Antitrust Division in the Department of Justice. Before joining the Antitrust Division, Mr. Powell was an associate in the Washington, D.C. office of the law firm of O'Melveny & Myers LLP, and just prior to joining the firm clerked for the Honorable Harry T. Edwards, Chief Judge of the United States Court of Appeals for the District of Columbia Circuit. Before starting his legal career, Powell served as a policy advisor to Secretary of Defense, Richard B. Cheney. Additionally, Powell's experience includes military service as an armored cavalry officer in the United States Army. Powell earned a bachelor's degree in Government from the College of William and Mary and a Juris Doctor (J.D.) degree from the Georgetown University Law Center.
Powell is a member of the Board of Trustees of the RAND Corporation and the Aspen Institute. Additionally, he serves on the Boards of ObjectVideo and CMWare, Inc. He also currently serves as Rector of the Board of Visitors of the College of William and Mary.

FresnoBee.com: Local: French conglomerate eyes Pelco

FresnoBee.com: Local: French conglomerate eyes Pelco: "French conglomerate eyes PelcoIt's in talks with the Clovis company, but the nature of any deal is not clear"

Saturday, July 28

Education Campus Security Meeting Planned for Aug. in Virginia @ The Latest for Security Executives SecurityInfoWatch.com

http://www.securityinfowatch.com/article/article.jsp?id=11754&siteSection=305: "Gov. Timothy M. Kaine will host a campus security conference Aug. 13 at Virginia Commonwealth University.
The event comes in the wake of the April 16 massacre at Virginia Tech, where a 23-year-old Fairfax County student gunned down 27 students and five faculty members before killing himself."

Thursday, July 26

When Whippersnappers and Geezers Collide - New York Times

When Whippersnappers and Geezers Collide - New York Times: "this is the first time in history that four generations — those who lived through World War II, Baby Boomers, Generation X and Generation Y — are together in the workplace."

Military, families at risk to data exposure by SAIC - IT Security News - SC Magazine US

Military, families at risk to data exposure by SAIC - IT Security News - SC Magazine US: "A federal contractor has said it put hundreds of thousands of military households at risk for identity theft by sending their personal information, including Social Security numbers, over the internet through an unencrypted channel."

Some say schools giving Muslims special treatment - USATODAY.com

Some say schools giving Muslims special treatment - USATODAY.com
Some public schools and universities are granting Muslim requests for prayer times, prayer rooms and ritual foot baths, prompting a debate on whether Islam is being given preferential treatment over other religions. The University of Michigan at Dearborn is planning to build foot baths for Muslim students who wash their feet before prayer. An elementary school in San Diego created an extra recess period for Muslim pupils to pray. At George Mason University in Fairfax, Va., Muslim students using a "meditation space" laid out Muslim prayer rugs and separated men and women in accordance with their Islamic beliefs. Critics see a double standard and an organized attempt to push public conformance with Islamic law… Zuhdi Jasser, a Muslim and chairman of the American Islamic Forum for Democracy, which promotes separation of mosque and state, says he is concerned about the accommodations. "Unusual accommodations for one faith at the cost of everybody else doesn't fall on the side of pluralism," he said...

U.S. Tracks Saudi Bank Favored by Extremists - WSJ.com

U.S. Tracks Saudi Bank Favored by Extremists - WSJ.com
JIDDA, Saudi Arabia -- In the 1940s, two Bedouin farm boys from the desert began changing money for the trickle of traders and religious pilgrims in this then-remote and barren kingdom. It was a business built on faith and trust, Sulaiman Al Rajhi once told an interviewer, and for many years he would hand gold bars to strangers boarding flights in Jidda and ask them to give the gold to his brother on their arrival in Riyadh. Following the Sept. 11, 2001, attacks, the bank also set off an intense debate within the U.S. government over whether to take strong action against its alleged role in extremist finance. Confidential reports by the Central Intelligence Agency and other U.S. agencies, reviewed by The Wall Street Journal, detail for the first time how much the U.S. learned about the use of Al Rajhi Bank by alleged extremists, and how U.S. officials agonized over what to do about it.

Al Qaeda seen in search of nukes - Nation/Politics - The Washington Times, America's Newspaper

7/26/07 Al Qaeda seen in search of nukes - Nation/Politics - The Washington Times, America's Newspaper

Al Qaeda terrorists are continuing to plan attacks against the United States and are seeking nuclear and other unconventional arms for the strikes, a senior Pentagon official told Congress yesterday. Retired Air Force Lt. Gen. James Clapper, the undersecretary of defense for intelligence, told a joint House committee hearing that al Qaeda has conducted terrorist attacks against more than two dozen nations since September 11. "Al Qaeda has and will continue to attempt visually dramatic mass-casualty attacks here at home, and they will continue to attempt to acquire chemical, biological, radiological and nuclear materials," Gen. Clapper said in discussing the National Intelligence Estimate (NIE) on threats to the United States. "And if they're so successful in obtaining these materials, we believe they would use them." He spoke before a joint hearing of the House Armed Services Committee and House Permanent Select Committee on Intelligence. Gen. Clapper said that al Qaeda has "reconstituted some of its command and support network" in tribal Pakistan along the Afghan border but that the estimates finding are "not a surprise."…

VideoSave - Secure Off-site Video Storage

VideoSave - Secure Off-site Video Storage: "VideoSave is the next generation in video recordkeeping, remote business management and surveillance. The VideoSave service takes advantage of inexpensive and universally available broadband connections to capture video from any location and transmit the video to VideoSave’s VideoVault secure data center. Through a standard web browser, the live or recorded video is then available at anytime, from anywhere."

LV...Bob Crowe is someone I have known for over 20 years. He has over 30 years of experience in Security Solutions, Video & Access Control. He has found a niche` to offer off site storage for video solutions. If you reach out to him, please mention that I sent you... tks, Laurie

PartnerForSecurity