Monday, November 23

FBI cites thousands of hate crimes in '08

(CNN) -- More than 9,000 hate crime offenses -- more than half of them motivated by racial bias -- were reported last year, the FBI announced Monday.http://www.cnn.com/2009/CRIME/11/23/hate.crimes.fbi.report/


.....There were 105 anti-Islamic incidents reported in 2008, about one-tenth the amount of anti-Semitic incidents, which totaled 1,103 in 2008, according to the agency.

Health Net's loss of 1.5 million patient records

November 19, Wired – (Connecticut) Health insurer loses 1.5 million patient records. A health insurer lost 1.5 million patient records last May but waited six months to disclose the incident. The data, which was stored on a portable disk drive that disappeared from the insurer’s office, was unencrypted and included patient Social Security numbers, bank account numbers and health data, according to the Hartford Courant. The disk also contained personal information on at least 5,000 physicians. Health Net discovered the loss in May but never informed patients, law enforcement or government entities, despite data breach laws in some states that require data spillers to notify victims and state officials when residents are affected by a breach. The insurer finally sent a letter to Connecticut’s attorney general and the state’s Department of Insurance this week. Health Net claimed it took six months to determine what data was on the missing disk. It said that data on the disk was compressed and stored in an image format that required special software to view, which was available only to HealthNet. Source: http://www.wired.com/threatlevel/2009/11/healthnet

Tuesday, October 20

Quote

"Many of life's failures are people who did not realize how close they were to success when they gave up." - Thomas Edison

Friday, September 4

Ronald S. Gray Memorial Service Set For September 26th


RONALD S. GRAY MEMORIAL SERVICE - Was held with a funeral mass at St. Francis of Assissi Church in Belchertown, MA on September 26th and a Dedication by the MA State Police of Belchertown at the Windsor Dam.

The Marines Honor Guard gave tribute to this great man.  Nancy, his loving wife was presented the American Flag on behalf of the President.

http://www.findrongray.com/?p=92#more-92

17 Minutes of Silence in Remembrance of September 11 event will be Forman Park in the city of Syracuse.

The city of Syracuse held its annual Commemoration Ceremony at the site of the Police Memorial in Forman Park, on Friday, September 11,2009 in memory of the victims of the Terrorist Attacks on September 11, 2001.

Tuesday, August 11

Minneapolis FBI Agents Raid Travel Agency

FBI raids Minneapolis travel agency in connection with terror probe
by Laura Yuen, Minnesota Public Radio
August 7, 2009

Minneapolis ? FBI agents raided a Minneapolis travel agency earlier this week in support of a broader investigation into the disappearances of about 20 Somali-American men.

Saturday, August 8

Plane, copter collide over Hudson River, killing 9

Saturday, 8/7/09 Noon
NEW YORK ? A sightseeing helicopter carrying five Italian tourists collided with a small plane above the Hudson River on Saturday, sending debris into the water and forcing people on New Jersey's waterfront to scamper for cover. Authorities believe all nine people aboard the two aircraft were killed.

The accident, which Mayor Michael Bloomberg called "not survivable," happened just after noon and was seen by hundreds and maybe even thousands of people out enjoying a crystal clear summer day.

The two aircraft went down just south of the stretch of river where a US Airways jet landed safely seven months ago. But this time, there was no miracle.
http://news.yahoo.com/s/ap/20090808/ap_on_re_us/us_hudson_mid_air_collision%22

Friday, August 7

FBI Intelligence Directorate Head - Kevin Favreau

"We need to know about the threat more than anyone else does because we need to go head-to-head with it"
-- Kevin Favreau, HEAD OF THE FBI'S INTELLIGENCE DIRECTORATE

Twitter, Google, Facebook cyber attacks article

http://news.cnet.com/8301-27080_3-10305200-245.html

Thursday, July 30

Graphic Photo Posted on Facebook

Graphic Photo Posted on Facebook at <http://www.foxnews.com/story/0,2933,535461,00.html> Center of Pending Lawsuit
FOXNews
A responding EMT, retired NYPD detective Frank Musarella, 46, allegedly snapped a photo of Wimmer's body using his cell-phone camera and posted it on his ...

Laurie Venditti
PartnerForSecurity
NYC
917-596-3037

Thursday, July 23

A Cyber-Attack on an American City

Bruce Perens

Just after midnight on Thursday, April 9, unidentified attackers climbed down four manholes serving the Northern California city of Morgan Hill and cut eight fiber cables in what appears to have been an organized attack on the electronic infrastructure of an American city. Its implications, though startling, have gone almost un-reported.

That attack demonstrated a severe fault in American infrastructure: its centralization. The city of Morgan Hill and parts of three counties lost 911 service, cellular mobile telephone communications, land-line telephone, DSL internet and private networks, central station fire and burglar alarms, ATMs, credit card terminals, and monitoring of critical utilities. In addition, resources that should not have failed, like the local hospital's internal computer network, proved to be dependent on external resources, leaving the hospital with a "paper system" for the day.

http://perens.com/works/articles/MorganHill/

Monday, July 20

In Jakarta, A New Terrorist Tactic Revealed

How hotel attacks are changing.

According to Indonesian Security Minister Widodo Adi Sucipto, nine persons were killed and at least 42 injured in two powerful blasts that hit the Marriott and the Ritz-Carlton hotels in the Mega Kuningan business area in Jakarta early on the morning of July 17. Widodo told reporters that six of the victims were killed at the Marriott hotel, two others at the Ritz-Carlton hotel and one died in the hospital. Of the 42 injured, 13 were foreigners.
http://www.forbes.com/2009/07/17/marriott-hotel-attack-jakarta-opinions-contributors-terrorism-indonesia.html

How New York Became Safe: The Full Story

A citywide effort, involving many agencies and institutions, helped restore order.

....By the early 1990s, these highly visible successes, especially in the subway, had begun to express themselves politically. Better than any other politician, Rudy Giuliani understood the pent-up demand for public order and built his successful 1993 run for mayor on quality-of-life themes. Once in office, he appointed Bratton, who had orchestrated the subway success and understood the importance of order maintenance, as New York?s police commissioner.

Under Bratton, the NYPD brought enormous capacities to bear on the city?s crime problem?particularly Compstat, its tactical planning and accountability system, which identified where crimes were occurring and held local commanders responsible for their areas. Giuliani and Bratton also gave the force?s members a clear vision of the ?business? of the NYPD and how their activities contributed to it. In short, a theory previously advocated largely by elites filtered down to?and inspired?line police officers, who had constituted a largely ignored and underused capacity.
http://www.city-journal.org/2009/nytom_ny-crime-decline.html

Ron Gray Missing Person - 9-8-08 Idaho

http://community.discovery.com/eve/forums/a/tpc/f/1641975849/m/45819700101

Data Breaches: The Cost of Being Unprepared- Thought Leadership Panel Perspectives

Data breach incidents have seen a 47% increase since 2007. Breached companies can suffer devastating reputational effects; can lose valuable business; and become inundated with expensive lawsuits. But unless more companies and financial institutions increase their focus on data protection, there's no telling where - or if - this crime will ever end.
http://www.csoonline.com/webcast/491387/Data_Breaches_The_Cost_of_Being_Unprepared_Thought_Leadership_Panel_Perspectives?source=CSONLU_nlt_securityleader_2009-07-20_1

Friday, July 10

man arrested for allegedly stealing 500 identities -- by dumpster diving

Low Tech Hacks All Too Common

It was just May when we blogged about thousands of medical records being dumped in plain sight by someone, apparently, employed at the Hutcheson Medical Center in Chattanooga, Tennessee. It was not only a clear HIPAA violation, but also placed people at risk to medical identity theft.
From channel CBS13, Sacramento:
The criminal complaint filed against 30-year-old suspect Jonah Nelson claims that he made more than 1,000 fake ID cards that he used to rip off people, stores and banks. Nelson also allegedly admitted to stealing the identities of more than 500 people all across Northern California, ranging from the Bay Area to the Central Valley.
Published Jul 09 2009, 12:13 PM by George Hulme
Filed under: incident
https://www.hitrustcentral.net/blogs/ht/archive/2009/07/09/low-tech-hacks-all-too-common.aspx

Sunday, July 5

FBI: Newest 'Most Wanted' Terrorist Is American

A fugitive animal rights activist believed to be hiding outside the United States has become the first domestic terror suspect named to the FBI's list of 'Most Wanted' terrorists. (April 21)
http://www.blinkx.com/video/fbi-newest-most-wanted-terrorist-is-american/r8YW17B4ppXG8TAyr5G39g

Tuesday, June 23

Murder: New York City

http://projects.nytimes.com/crime/homicides/map
Each day, the New York Police Department announces major crimes, including most homicides, in the five boroughs. This data is compiled from those reports, in addition to news accounts, court records and additional reporting. The map will be updated as new information becomes available.

Monday, June 22

5th Avenue Skyscraper Center of Iranian Mystery

When anyone enters the gleaming stone skyscraper on New York's Fifth Avenue, they have no idea they have walked into the middle of an international mystery. Just blocks from Rockefeller Center , 650 Fifth Avenue is at the center of a federal probe, involving the FBI, two firms linked to Iran 's national bank and a wealthy U.S. foundation that supports Islamic charitable causes ? whose former president has been accused of obstruction of justice. In December, the Department of Justice charged the building's co-owners, the Assa Corporation and Assa Limited, of being front companies for Iran 's national bank, Bank Melli. The bank had been sanctioned by the U.S. Treasury Department for allegedly helping fund Iran 's nuclear and ballistic missile programs. The other owner of the building is the Alavi Foundation, which was founded by the Shah of Iran and has been operating as a New York state charity for 35 years. Alavi owns 60 percent of the building and bills itself as a charitable effort to "support Interfaith harmony and promote Islamic culture and Persian language, literature and civilization." It claims assets of more than $121 million.A look at its donation list from tax records shows some of America 's most prominent institutions have benefited from Alavi's largess, from Harvard and Columbia universities, to former President Clinton's work. Tax records show the William J. Clinton Foundation was given $30,000 in 2006. Alavi has also distributed millions to schools, mosques and Islamic Centers through the years... But others have accused the Alavi Foundation of doing Iran 's bidding right here in America , and even alleged it is "controlled" by Tehran ?
http://www.foxnews.com/story/0,2933,526766,00.html

Thursday, June 18

Training cleaning staff on security awareness

Reliance launches integrated shopping centres solution

23 Apr 09

By Anthony Hildebrand

Reliance Facilities Management has launched SecureClean, a new solution for shopping centres integrating the management of security and cleaning services.

Reliance says SecureClean ?meets retail landlords? need to reduce costs whilst maintaining a focus on increased security threats?.

The results of the 2008 Reliance Shopping Centre survey, demonstrated the changing demands and pressures on retail landlords, the company says. It says SecureClean enables shopping centre owners and managers to reduce service costs and efficiently manage large scale assets.

A launch statement said: ?Integrating the management of services reduces costs, creates operational efficiencies and increases productivity. SecureClean combines the delivery of security and cleaning to shopping centres, providing a dedicated service manager across both service streams.

?This one dedicated service manager presents shopping centre managers? with one single point of contact for all security and cleaning operations, reducing service costs and driving quality through integrated management.?

Reliance says that all cleaning personnel will receive basic security awareness training and familiarisation with anti-terrorism initiatives such as Project Argus, as well as customer service training.

Along with Reliance?s security training and Security Industry Authority (SIA) licensing, security personnel will also attend on-going ?excellence in customer service? courses. This one team approach leverages manpower to protect shopping centre interests, improve the environment and enhance the customer experience.

Paul Crilly, Reliance Facilities Management deputy chairman, said: ?We have developed the SecureClean approach in response to shopping centres? evolving requirements. SecureClean is a solution that allows shopping centre owners and managers to achieve significant financial and operational efficiencies through a managed approach to integrated services.?
http://www.info4security.com/story.asp?sectioncode=10&storycode=4122163&c=1

Wednesday, June 10

Jeff Moss, founder of the Black Hat and Defcon hacker and security conferences, was among 16 people sworn in on Friday to the Homeland Security Advisory Council.

The HSAC members will provide recommendations and advice directly to Secretary of Homeland Security Janet Napolitano.

Moss' background as a computer hacker (aka "Dark Tangent") and role as a luminary among young hackers who flock to Defcon in Las Vegas every summer might seem to make him an odd choice to swear allegiance to the government. (Although before running his computer conferences, Moss also worked in the information system security division at Ernst & Young.)

I'd like to hear some of the banter as he rubs elbows with the likes of former CIA (Bill Webster) and FBI directors (Louis Freeh), Los Angeles County sheriff, Miami mayor, New York police commissioner, governors of Maryland and Georgia, former Colorado Sen. Gary Hart, and the president of the Navajo Nation.

In an interview late on Friday, Moss, who is 39, said he was surprised when he got the call and was asked to join the group.

Tuesday, June 9

National Recall

June 5, U.S. Food Safety and Inspection Service ? (National) Recall notification report: Class I recall ? wholesale level. Cameco, Inc., a Verona, New Jersey, establishment is recalling approximately 79,312 pounds of various fully cooked, readyto- eat meat and poultry products because the products may contain under-processed ham components after contacting surfaces of equipment. The fully cooked, ready-to-eat meat and poultry products were produced on May 29, 2009 and June 1, 2009, and were distributed to wholesale distributors in Alabama, Arizona, California, Connecticut, Michigan, North Carolina, Ohio, Puerto Rico, South Carolina, Texas and Virginia. The distribution of the products was limited only to wholesale distributors; none of these products are available to consumers. The problem was discovered by the company. Source: http://www.fsis.usda.gov/Fsis_Recalls/RNR_029_2009/index.asp

Orgnaized Retail Crime Video

http://www.cagrocers.com/files/RetailCrime.wmv

CIA, FBI push 'Facebook for spies'

WASHINGTON (CNN) -- When you see people at the office using such Internet sites as Facebook and MySpace, you might suspect those workers are slacking off.
A social-networking site for the world of spying officially launches for the U.S. intelligence community this month.

A social-networking site for the world of spying officially launches for the U.S. intelligence community this month.

But that's not the case at the CIA, the FBI and the National Security Agency, where bosses are encouraging their staff members to use a new social-networking site designed for the super-secret world of spying.

"It's every bit Facebook and YouTube for spies, but it's much, much more," said Michael Wertheimer, assistant deputy director of national intelligence for analysis.

The program is called A-Space, and it's a social-networking site for analysts within the 16 U.S. intelligence agencies.

Instead of posting thoughts about the new Avenged Sevenfold album or Jessica Alba movie, CIA analysts could use A-Space to share information and opinion about al Qaeda movements in the Middle East or Russian naval maneuvers in the Black Sea.

The new A-Space site has been undergoing testing for months and launches officially for the nation's entire intelligence community September 22.
http://www.cnn.com/2008/TECH/ptech/09/05/facebook.spies/index.html

Sunday, June 7

Twitter To Offer ?Verified Accounts?

The post also said that Twitter would be launching ?Verified Accounts? later this summer:

The experiment will begin with public officials, public agencies, famous artists, athletes, and other well known individuals at risk of impersonation. We hope to verify more accounts in the future but due to the resources required, verification will begin only with a small set.

Twitter could easily verify a larger number accounts by providing automated verification in a variety of ways. My Time For Verified Twitter Accounts & An Easy Way To Do It covers some options on this.

Still, it?s a start, and a welcome one. Verified Accounts will have a special seal that shows, as illustrated in the screenshot above.

http://searchengineland.com/twitter-to-offer-verified-accounts-20620

Friday, June 5

EBay arms smugglers jailed

The three breached British arms embargoes by arranging deals to export to the Middle East nation after importing a host of military parts to the UK via the bidding website.

Their complex plot involved an attempt to supply Iran with equipment for F-14 Tomcat fighter jets, similar to those which featured in the Hollywood blockbuster starring Tom Cruise, Southwark Crown Court heard.

Mohsen Akhavan Nik and his son Mohammad Akhavan Nik, who were granted political asylum in the UK having apparently fled from Iran in 1995, together with Nithish Jaitha, were caught after HM Revenue and Customs officers stopped a consignment of oxygen cylinders at Heathrow Airport which were bound for Tehran.

Mohsen Nik, 49, and Mohammad Nik, 26, of Ascot, Berkshire, were jailed for five years and two and a half years respectively while Jaitha, 43, of Chalgrove, Oxford, was sentenced to two and a half years for the conspiracy to export controlled goods.

Iran's ageing jet fighters, including the F-14 Tomcat, F4 Phantoms, F5 Tigers and Cobra Attack helicopters, can only be kept in service through parts purchased in the United States and then illegally shipped to Iran using fraudulent paperwork.

The items were sourced on eBay in the US and shipped to an address in Florida to avoid the need for an export licence.
http://www.telegraph.co.uk/news/uknews/5445615/EBay-arms-smugglers-jailed.html

Baby formula a costly commodity for families and a hot item for thieves

TORONTO ? It's not just parents of hungry infants that are seeking out baby formula - the product has become a hot commodity for thieves on both sides of the border.

Police recently arrested 21 suspects and dismantled a theft ring in Florida allegedly responsible for stealing thousands of cans of the powdered product.

In another case, one trucker was sentenced to jail and another to probation this week for their roles in stealing US$200,000 in baby formula and other products from a Pennsylvania warehouse. The items were sold on the black market.

And in Toronto, a 19-year-old man was arrested and charged with aggravated assault and theft, accused of stabbing a security guard who tried to stop him from leaving a department store with stolen formula.

The cost for baby formula is fairly steep. At a downtown Toronto drugstore, a 680-gram tin of powdered formula containing omega-3s was around $31. For parents without a lot of extra cash to spare, the pricetag can prove to be a barrier.
http://www.google.com/hostednews/canadianpress/article/ALeqM5iWtjC4hU_ITwbdUEyk8tZCU6R-Gg

Secretary Napolitano Announces $60 Million in Operation Stonegarden Grants for Border States

U.S. Department of Homeland Security (DHS)
http://www.dhs.gov/ynews/releases/pr_1244070019405.shtmSecretary Janet Napolitano today announced fiscal year 2009 Operation Stonegarden grants?totaling $60 million?for 13 border states and the Territory of Puerto Rico to enhance the capabilities of federal, state, local and tribal law enforcement agencies to jointly secure U.S. borders and territories.

?Operation Stonegarden grants direct critical funding tostate, local and tribal law enforcement operations across the country,? said Secretary Napolitano. ?I am proud to announce that the 2009 funding provides additional flexibility to ensure that our first responders are equipped with the resources they need to confront the complex and dynamic challenges that exist along our borders.?

The 2009 allocations reflect President Obama?s increased emphasis on the Southwest border in response to cartel violence along the U.S.-Mexico border. Based on greater risk, heavy cross-border traffic and border-related threat intelligence, nearly 76 percent of Operation Stonegarden funds will go to Arizona, California, New Mexico and Texas?up from 59 percent in fiscal year 2008.

Fiscal year 2009 Operation Stonegarden funds will be used for additional law enforcement personnel, overtime, travel and other related costs in order to further increase our presence along the borders. This risk-based allocation of resources complements ongoing DHS efforts?including the Southwest Border Initiative and U.S. Border Patrol deployment at the Northern border. By the end of fiscal year 2010, DHS plans to add nearly 700 additional agents at the U.S.-Canada border.

This year, eligibility for Operation Stonegarden awards was expanded to include 39 applicants?24 more than fiscal year 2008?encompassing states with international land and coastal borders.
FY 2009 Operation Stonegarden Grant Program
State

Amount
Arizona
$ 12,774,896
California
$ 11,919,340
Idaho
$ 229,008
Maine
$ 1,524,973
Michigan
$ 2,047,093
Minnesota
$ 1,005,561
Montana
$ 1,813,102
New Mexico
$ 3,981,414
New York
$ 3,558,187
North Dakota
$ 1,138,829
Puerto Rico
$ 529,947
Texas
$ 16,719,377
Vermont
$ 501,079
Washington
$ 2,257,194
Total
$ 60,000,000

Secretary Napolitano made the announcement as part of a two-day visit to the Southwest border, during which she joined U.S. Attorney General Eric Holder and Office of National Drug Control Policy Director Gil Kerlikowske to unveil the 2009 National Southwest Border Counternarcotics Strategy; announced the formation of the Homeland Security Advisory Council Southwest Border Task Force; and met with state and local law enforcement and first responders to discuss issues affecting Southwest border states.

Operation Stonegarden is appropriated by the Consolidated Security, Disaster Assistance and Continuing Appropriations Act of 2009. For more information on Operation Stonegarden, visit www.dhs.gov and at www.fema.gov/government/grant/opsg/index.shtm.

U.S., Canada to continue beefed up waterway patrols

Detroit -- The United States and Canada today signed an agreement that allows both countries to patrol each other's waters and to pursue cross-border criminals into each country's territory.

The "Shiprider Agreement" allows the U.S. Coast Guard and Royal Canadian Mounted Police to cross-train, share resources and personnel, and use each other's vessels in waters that include the Great Lakes and the St. Lawrence Seaway.

According to U.S. Secretary of Homeland Security Janet Napolitano and Canadian Minister of Public Safety Peter Van Loan, the agreement will help ensure that criminal organizations no longer exploit the shared border because of the inherent jurisdictional complications that come with cross-border policing.

Advertisement

"We are working together as friends and allies," Napolitano said at the press conference, which was held at the U.S. Customs and Border Protection facility at the Ambassador Bridge.

"We see our common border as a common responsibility. It's a partnership that at the same time respects the sovereignty of both nations."

According to Van Loan, the Shiprider program was first tested for about two months in 2007.

"The results were very encouraging," Van Loan said. "During that time period, we were able to seize 1.4 million cigarettes and 215 kilos of marijuana. I understand that the look of surprise on the criminals' faces when they were pursued across the border was really something to behold."

Napolitano and Van Loan also said the U.S. and Canada were working together to make sure that the Western Hemisphere Travel Initiative (WHTI) goes into effect "smoothly" when it is enacted on Monday. Under WHTI, any American or Canadian leaving or re-entering the U.S. is required to have proper documentation of citizenship, including a valid passport, Enhanced Driver's License (EDL), passport card or trusted traveler card such as NEXUS, SENTRI or FAST.

A driver's license and a certified birth certificate are no longer valid for entry/re-entry into the U.S.

http://www.detnews.com/article/20090526/METRO/905260401/1409/METRO

EXCLUSIVE: Al Qaeda eyes bio attack from Mexico Seeks white militias as allies

U.S. counterterrorism officials have authenticated a video by an al Qaeda recruiter threatening to smuggle a biological weapon into the United States via tunnels under the Mexico border, the latest sign of the terrorist group's determination to stage another mass-casualty attack on the U.S. homeland.

The video aired earlier this year as a recruitment tool makes clear that al Qaeda is looking to exploit weaknesses in U.S. border security and also is willing to ally itself with white militia groups or other anti-government entities interested in carrying out an attack inside the United States, according to counterterrorism officials interviewed by The Washington Times.

The officials, who spoke only on the condition they not be named because of the sensitive nature of their work, stressed that there is no credible information that al Qaeda has acquired the capabilities to carry out a mass biological attack although its members have clearly sought the expertise.
http://washingtontimes.com/news/2009/jun/03/al-qaeda-eyes-bio-attack-via-mexico-border/

FBI looks into calls to Somalia from Erie County line

Erie County Emergency Management Agency officials say they've asked the FBI to investigate more than 120 calls placed last month from a county-owned phone to locations in Somalia.

"This is something I've never seen in my 30-year career," said Bob Hall, telecommunications coordinator for Erie County Emergency Management Agency. "These people know what they're doing."

Exactly who they are remains to be seen, Hall said. There are concerns this could be terrorism related, which is why it was turned over to the FBI.

The calls were made on at least one Sunday about seven weeks ago from a main phone line in the county's Department ofEnvironmental Services. But the calls weren't made directly from that phone.

Someone had actually called the department's phone number from an outside line at an unknown location, then entered into the voicemail system, which wasn't password-protected, Hall said.

From the department's voicemail system, the caller rerouted the call to two phone numbers in Somalia. All told, the unknown talker racked up more than 20 hours of conversation, resulting in a $212 bill, Hall said.

The bizarre incident was noticed by workers at AT&T, the county's phone-service provider, who immediately shut down the long-distance feature and notified the county, Hall said.

Hall contacted Huron police because the Department ofEnvironmental Services offices are in Huron, but he also called the FBI because the calls wereinternational.

Scott Wilson, spokesman for the FBI's Cleveland office, said FBI agents in Sandusky are aware of the phone calls.

"But we can't comment on anything that we're doing," Wilson said. "The county had supplied our office with some of thesenumbers."

AT&T's fraud department agreed to forgive the $212 charge,Hall said, adding he was expecting the bill to be closer to $1,000 or $1,500.

A 30-year employee with a phone company before his current job, Hall said it'll be almost impossible to trace the origin of the calls because they may have been rerouted through multiple locations before reaching the intended numbers in Somalia.

"It makes it virtually impossible to find out where it's coming from," Hall said.

"The call gets regenerated at one number, then regenerated, then regenerated again."

Most of the county's phones are password-protected, but the Department of Environmental Services' number wasn't until after the incident.
http://www.sanduskyregister.com/articles/2009/05/28/front/1373770.txt

DISTRICT ATTORNEY - NEW YORK COUNTY, Robert M. Morgenthau

Manhattan District Attorney Robert M. Morgenthau announced today the indictment of 18 individuals for operating an identity theft and bank fraud scheme, involving hundreds of victims, thousands of counterfeit checks and numerous commercial banks in Manhattan? The investigation leading to today's indictment revealed that the defendants obtained personal and bank account information belonging to 500 identity theft victims and used it primarily to manufacture thousands of counterfeit checks. By fraudulently cashing and depositing the counterfeit checks, the defendants stole over $1.4 million from one bank's accounts and substantial additional sums from other banks. Victims of this scam included private individuals, corporations, religious institutions, hospitals, and schools, as well as city and state government agencies

Obama: Cyber Security is a National Security Priority

President Barack Obama today pledged to make securing the nation's most vital computer networks a top economic and national security priority, broadly detailing the results of 60-day cyber security review that calls for a range of responses to help improve the security of information networks that power the government and the U.S. economy. Speaking at the White House this morning, the president said he would work to make sure the nation's core digital infrastructure is treated as a national asset? As expected, Obama said he plans to create a new office at the White House to be led by a cyber security coordinator "responsible for orchestrating and integrating all cyber security policies for the government; working closely with the Office of Management and Budget to ensure agency budgets reflect those priorities; and, in the event of major cyber incident or attack, coordinating our response." http://voices.washingtonpost.com/securityfix/2009/05/obama_cybersecurity_is_a_natio.html

DHS distributes port and mass transit grants

The Homeland Security Department is distributing $300 million in economic stimulus law funds for port and mass transit grants for projects that include high-tech identification cards and domain-awareness solutions, officials announced.

The department is making available $150 million from the stimulus law available for the Port Security Grant Program, in addition to $389 million already allocated by Congress for fiscal 2009, Secretary Janet Napolitano said in a May 29 news release.

The port program pays for technology and equipment to protect against terrorism, including maritime domain-awareness solutions, risk-management capabilities, protections against improvised explosive devices. It also can be used to support implementation of the Transportation Worker Identification Credential, which is an identification card that contains a photo and digitized fingerprint information.

DHS in April completed a rollout of the TWIC to 1.2 million seaport workers. The department is currently testing readers to process the cards.

The department also announced $150 million in economic stimulus funds for the Transit Security Grant Program to support security solutions at mass transit stations and facilities, in addition to the $389 million already allocated by Congress for the year.

Eligible programs include support for explosive detection screening and security improvements to high-density tunnels, stations and bridges.
http://washingtontechnology.com/articles/2009/06/01/dhs-distributes-port-and-mass-transit-grants.aspx

Sensitive Technology Can Easily End Up In Terrorists Hands

http://www.digtriad.com/news/investigative/2wtk/article.aspx?storyid=125213&catid=19
Washington, DC -- The Government Accountability office found that companies can buy sensitive dual-use and military technology easily, and then turn around and ship the information illegally out of the country to a foreign government.

The GAO used a bogus front company and fictitious identities, then purchased items such as night-vision scopes currently used by the US military. These scopes have special technology to identify targets, detect sensors used in improvised explosive devices and have gyro chips used to help guided missiles and military aircraft.

The GAO then exported a number of dummy versions of these scopes using the mail to a country that is a known to turn around and ship items to terrorist organizations and foreign governments trying to acquire the sensitive technology.

Because of the large amount of packages sent overseas, enforcement officials say it's impossible to search every package or person leaving the US to make sure technology doesn't fall into the wrong hands.

Saturday, May 30

LANGEVIN, ET AL.: Public-private collaboration

The Washington Times

Tuesday, May 26, 2009
James R. Langevin, Mark Gerencser and Charles G. Boyd

COMMENTARY:

Attacks against U.S. computer networks - most of them privately owned - are increasing in number and severity. Let's hope the new administration moves decisively to foster collaboration between the public and private sector so America can become cyberresilient.

The reasons for doing so are manifest. In 2007 alone (the last year for which records are fully tabulated), the Department of Homeland Security tracked more than 37,000 cyber-attacks - a more than 800 percent increase over 2005. The Defense Department's computers are probed hundreds of thousands of times every day, and in 2007, hackers believed to be backed by the Chinese military took down the unclassified e-mail system in the Office of the Secretary of Defense for more than a week.

Meanwhile, U.S. companies lost more than $1 trillion worth of intellectual property last year because of cyber-intrusions. The energy sector is particularly vulnerable, with global utility operations hit by an estimated 1,000 hackers annually. A major cyber-attack could result in weeks-long power outages or cause even more damage to the national economy - a prospect we can hardly afford.

In December, a cyber-attack simulation conducted by the nonpartisan Business Executives for National Security, headquartered in the District, highlighted America's vulnerability and the need for a comprehensive, national approach to cybersecurity. Over two days, more than 230 senior leaders from industry, government, Congress, academia and the military tried to respond to a simulated cyber-attack that decimated telecommunications in the Eastern United States and damaged financial institutions and other targets.

At nearly every turn, the participants encountered difficulty restoring normal operations. Their failure to plan for the attack - and the difficulty they experienced communicating with one another when the simulated attack was under way - prolonged recovery time to the point of major system failures.

The simulation revealed that while parts of the federal government and some private companies are doing a lot to strengthen their own cyberdefenses, the United States is only addressing pieces - and not the whole - of cybersecurity. This approach will fail because cybersecurity is, like a chain, only as strong as its weakest link.

Focusing cybersecurity efforts solely on one's own organization robs attention from the bigger picture. Whether they realize it or not, companies, government agencies and other organizations are part of an interconnected system that cannot absorb a major attack. Narrow-point solutions such as firewalls, anti-virus software and intrusion-detection technology help, but they don't suffice.

True protection requires cyberresilience. That can be achieved only through collective action and cooperation on a scale rarely witnessed before: a national effort involving business, government and society - similar to the way "Y2" - the apprehension about what would occur with the advent of the year 2000 - was approached, but designed for the long haul and not just one event.

No single organization has the capacity to build this resilience. We need to work as a large and inclusive community across government, industry and nonprofit organizations - a megacommunity of sorts.

Melissa Hathaway, recently named by President Obama to review the nation's cybersecurity policies, was chosen in part for her ability to foster collaboration within government to deal with cyberthreats. We hope her report urges collaboration beyond government - involving business and society as a whole - so America can become cyberresilient.

Resilience is different from risk avoidance (working to ensure nothing happens) or even risk management (choosing what to protect and what not to protect). Resilience assumes bad things will happen and requires advance planning and preparation. "We will need to end a culture where we ignore problems until they become full-blown crises," Mr. Obama said recently when discussing the economy. This is also true of cybersecurity.

A lot is at risk: financial systems, power grids, air traffic control and more. A major cyber-attack will happen, and it will affect more than we think. The question is: Will we be ready - and resilient?

Rep. James R. Langevin, Rhode Island Democrat, is co-chairman of the Center for Strategic and International Studies (CSIS) Commission on Cybersecurity for the 44th Presidency. Mark Gerencser is a senior vice president at Booz Allen Hamilton. Charles G. Boyd is president and chief executive officer of Business Executives for National Security.

Tuesday, May 26

FBI Explains Its CAIR Cut Off

Bureau says CAIR is not "an appropriate liaison partner"



The Council on American-Islamic Relations (CAIR) is not "an appropriate liaison partner" for the FBI because of evidence linking the organization and its founders to Hamas, an FBI assistant director said in a letter to a U.S. Senator. "In light of that evidence, the FBI suspended all formal contacts between CAIR and the FBI," Richard C. Powers, an assistant director in the FBI's office of Congressional Affairs, wrote in a letter to Sen. Jon Kyl (R-AZ). Today, the FBI is unsure whether the relationship between CAIR and Hamas ever was severed, Powers wrote. In February, Kyl was joined by fellow senators Charles Schumer (D-NY) and Tom Coburn (R-OK) in writing FBI Director Robert Mueller to praise the FBI's policy toward CAIR. IPT News, May 7, 2009
http://www.investigativeproject.org/1029/fbi-explains-its-cair-cut-off

Call the Terrorists What They Are

The foiled plot to bomb New York synagogues, disclosed today, highlights the absurdity, and danger, of Obama's avoiding the term "Islamic radicals."

There are several lessons that the U.S. government and public should learn from the foiled plot by four radical Muslims, disclosed today, to bomb synagogues in New York and shoot down a military plane using a Stinger missile.

For President Obama, the "enemy" can no longer be limited to just al Qaeda, as he has insisted in pre- and post- campaign interviews. When asked who the enemy is, he reflexively says "al Qaeda." He has categorically refused to use the term "radical Islam" or "Islamic extremism." But that is exactly what we are facing?and have been facing for the past three decades.
http://www.thedailybeast.com/blogs-and-stories/2009-05-21/call-the-terrorists-what-they-are/full/

Monday, May 25

Fox News covers the Explosion on 3rd & 92nd at 3:30am NYC


NEW YORK - Windows were shattered at a Starbucks on Manhattan's Upper East Side early Monday morning.

Police Commissioner Ray Kelly says an explosive-like device, possibly containing fireworks, went off outside the store at 3:30 a.m.

There are no injuries. Kelly says there are no witnesses to the blast.

The NYPD bomb squad is on the scene at 1642 Third Avenue at 92nd Street.

Speaking at the scene of the explosion Monday morning, Kelly told reporters there was no call to police before the explosion. Seven calls to 911 came in immediately following the explosion.

There is a history of low-order explosions outside Starbucks stores across the country, said Kelly.

The city has experienced other early morning explosions in recent years. Small explosions occurred at the British and Mexican consulates and at a military recruiting station in Times Square.

Police Commissioner Kelly says the only similarity between Monday morning's explosion and other small blasts in New York City is the time. All have occurred between 3:30 a.m. and 4:30 a.m.

Police investigators say no one was inside the shop at the time of the explosion. There is no damage inside the store.

The explosion left a gaping hole in the bench.

An apartment building above Starbucks was evacuated. Seven people were forced from their homes and returned hours later.

No one was injured in the blast.

Several lanes of Third Avenue near 92nd Street are closed due to a massive police investigation. Expect bus diversions in the area of the explosion. The M 98, M 101, M 102 and M 103 bues are re-reouted.

Thursday, May 21

FBI Makes Arrest

Four men accused in an alleged terror plot to bomb a Jewish center and synagogue in Riverdale, Bronx could face life in prison, as they are arraigned in federal court later today.

Tuesday, May 12

Will Marketing Kill Social Media?

Anyone reading this post is likely to be someone who spends some, if not all, of his or her time at work trying to make use of social media to market products & brands. We spend hours trying to maximize the benefit for our employers or clients from sites such as Facebook, YouTube & Twitter as well as the millions of blogs that litter the web. And yet I?ve started to wonder whether these very activities might not result in exactly the opposite result to the one we?re hoping for.
http://searchengineland.com/will-marketing-kill-social-media-18940

Monday, May 4

US 'should go on cyber-offensive'

"I recommend that we make our botnet - the botnet I propose - public. The whole world knows about it. That we exercise it on ranges that other countries can see electronically, that they know what we're doing and then they are going to be more likely to back off before doing an attack because they have to take this into account," he said.
http://news.bbc.co.uk/2/hi/technology/8026964.stm

Sunday, May 3

BIRTH-CERTIFICATE TERROR ALARM

By LARRY CELONA and ANDY GELLER

April 25, 2009 --

A stack of blank birth certificates has been stolen from the city Health Department's offices, leading investigators to worry that they may have fallen into the hands of terrorists, The Post has learned.

On March 12, an employee discovered that 104 certificates with the agency's stamp on them were missing from the department's offices at 125 Worth St., near City Hall, sources said.

It was the first time in 10 years that blank birth certificates were stolen from the department.

The NYPD and the city's Department of Investigation are investigating.

"It's like hitting the Lotto for a terrorist," one investigator said.

"Forged documents are one of the primary concerns of Homeland Security. After you get that birth certificate, you can get any document you want. This is extremely serious."

The missing documents were in a box of blank certificates that was stacked on other similar boxes.

The employee noticed they were missing because there was a break in the numbers on the certificates.

Investigators believe the theft was carried out by someone who has access to the offices, probably an employee.

larry.celona@nypost.com

http://www.nypost.com/php/pfriendly/print.php?url=http://www.nypost.com/seven/04252009/news/regionalnews/birth_certificate_terror_alarm_166135.htm

New legislation targets organized shoplifting

The state is losing more than $32 million a year in sales tax because of the rise in organized shoplifters who swipe large quantities of merchandise to resell, retailers told a state Senate committee Wednesday.

The Public Safety and Human Services Committee heard a presentation from retailers, police and prosecutors hoping to encourage the passage of a Senate Bill 1059, which would make organized retail theft a separate criminal charge and a Class 4 felony.

Under current state laws, a shoplifter can be charged with a misdemeanor or a felony, depending on the value of the goods, and be punished by up to two years in prison. Under the bill, organized retail theft - defined as shoplifting with the intent to resell or trade the merchandise - would be a felony, regardless of the value of the stolen goods. It would be punishable by up to 3 1/2 years in prison.

Committee chairwoman Linda Gray, R-Phoenix, who sponsored the bill, said the legislation will be among the first to go through committee for a vote after the budget is completed. "I think (the response) will be good," she said. "It affects all of us. Those are prices we're absorbing."

The bill would bring Arizona on par with 35 other states that have either enacted legislation or have introduced bills to combat organized retail theft, according to Michelle Ahlmer, president of the Arizona Retail Association. The bill comes at the recommendation of a task force commissioned during the 2007 session to look into the growing trend.

The two-page report also recommended more education and training for officers and a full-time law-enforcement task force that would work with retailers to combat the crime full time.

Retailers insist they're doing their part to work with law enforcement to battle the growing trend by sharing information about suspects and trends and protecting their merchandise.
http://www.azcentral.com/arizonarepublic/local/articles/2009/04/30/20090430politics-shoplifting0430.html

Cybersecurity Review Sets Turf Battle

>>>>>Congress is moving ahead on cybersecurity. On Thursday, the chairmen of the House and Senate homeland security committees introduced legislation to require the Federal Energy Regulatory Commission to set cybersecurity standards for power companies and to allow it to issue emergency orders if a cyber threat is imminent.

That measure followed two others introduced earlier this week on the electric grid and a proposed White House cybersecurity office. Cybersecurity experts say they expect some version of these or related bills to become law.
http://online.wsj.com/article/SB124113159891774733.html

Monday, April 27

Low-flying Air Force One lookalike freaks out NYC

Posted By admin On April 27, 2009

Military jet in NYC Raw Story [2]
Monday, April 27, 2009

A number of buildings in New York City were evacuated Monday morning after a trio of low-flying planes flew near the Statue of Liberty.

“An Air Force One lookalike, the backup plane for the one regularly used by the president, flew low over Manhattan on Monday morning, accompanied by two F-16 fighters, so Air Force photographers could take pictures,” the New York Times reports [3]. “But a lack of awareness about the flyover led to the evacuation of several buildings in Lower Manhattan and Jersey City, N.J., and perplexed officials at the Port Authority of New York and New Jersey and other authorities were inundated with calls from anxious ferry passengers, office workers and residents in the area.”

“It is pre-planned, pre-coordinated with everyone involved,” FAA spokesman Jim Peters said [1]. “It’s a military flight over New York to take photos.”

Peters added, “We’ve gotten reports several buildings in Jersey City were evacuated.”

One eyewitness told the New York Times, “People came pouring out of the buildings, the American Express Building, all the buildings in the Financial District by the water. And even the construction guys over by 100 North End Avenue area, they all got out of their buildings. Nobody knew about it. Finally some guy showed up with a little megaphone to tell everyone it was a test, but the people were not happy. The people who were here 9/11 were not happy. New York City police were standing right there and they had no knowledge of it. The evacuations were spontaneous. Guys from the floor came out, and one guy I talked to was just shaking.”

One NYC television station received a number of phone calls from New York City residents “furious that local authorities hadn’t notified anyone about the fly-over.”

“According to many callers who flooded CBS 2 with their concerns, at about 10 a.m. the aircraft were seen flying at low altitudes over the Statue of Liberty and parts of lower Manhattan,” WCBS reports [5].

One sample follows: “We saw a low-flying 747 buzz the Southwest edge of Manhattan, at Battery Park City, with a fighter jet appearing to chase it on its left wing. At about Rector Street or so, it took a hard left and looked to be headed straight for Jersey City. It flew over J.C., turned south, and continued to climb over Newark. It left our sight, only to return on the same path a second time about five minutes later. It was confusing and panicked the office. We dialed 9-1-1 and considered whether to evacuate. We were told by 9-1-1 that it was ‘authorized’ to be there. We later learned, from your website, that it was part of a DOD ‘photo op.’ NotifyNYC advises it was ‘part of an approved federal activity.’ To conduct a ‘photo op,’ unwarned in advance to Lower Manhattan residents and workers, in that manner was completely irresponsible.”

Newsday notes [6], “About 1,000 workers gathered along the Hudson River esplanade until a security officer with a bullhorn told them it was a planned exercise.”

“After the incident, New York City released an advisory that the flyover was ‘part of an approved federal activity,’” Reuters reports [7].

Data Security Breaches Present Emerging Risks, Opportunities for Agents

By Patricia-Anne Tom
April 27, 2009
http://www.insurancejournal.com/news/national/2009/04/27/99922.htm

Excerpts from the news article

Data security represents both a new market opportunity to sell insurance coverage and a new risk ? especially for independent insurance agencies that may not be compliant with data security laws or have plans in place to protect their own companies from data breaches.

While data security is an evolving issue, failing to protect data can have a huge financial impact on a company. The average total per-incident cost of a data security breach was $6.65 million, compared to an average per-incident cost of $6.3 million in 2007, according to the "U.S. Cost of Data Breach Study" conducted by data protection company PGP Corp. and information management research firm The Ponemon Institute.

The PGP/Ponemon study indicated that data breach incidents cost U.S. companies $202 per compromised customer record in 2008, meaning that companies incur additional costs with an abnormal churn in lost customers. More than 84 percent of data breach cases in 2008 involved organizations that had more than one data breach. And, more than 88 percent of all cases in the study involved insider negligence.

The cost of lost business continued to be the most costly effect of a breach, averaging $4.59 million or $139 per record compromised. Lost business now accounts for 69 percent of data breach costs, up from 65 percent in 2007, compared to 54 percent in the 2006 study.

"After four years of conducting this study, one thing remains constant: U.S. businesses continue to pay dearly for having a data breach," said Dr. Larry Ponemon, chairman and founder of The Ponemon Institute. "As costs only continue to rise, companies must remain on guard or face losing valuable customers in this unpredictable economy."

>>>>Nevertheless, it's important for business owners to get up to speed about how to handle a breach. "If a breach occurs, the ability to respond must be timely," said Shena Crowe, Infragard Coordinator for the Federal Bureau of Investigation. "Companies only have about 30 days or less."

>>>>>Of course, that means agents and brokers must educate themselves. "Our major challenge as an industry right now is educating agents and brokers as to what kind of questions they need to ask their insureds, to get their arms around what kind of information their clients have," Katona said.

Among questions to consider are:

* Does the client transacts business over the Internet?
* Does the client move information to another party over the Internet?
* What are the underpinnings of the client's technology?
* Does the data environment have a firewall?
* What processes and procedures are in place for things like encryption?
* What processes and procedures are in place for people accessing company computers?

"Spend time to manuscript coverage to match the client's exposure," Cisco Systems' Lamb said.

Above all, agents and brokers should take steps to ensure they're covered themselves.

"Insurance agents and brokers, obviously, capture a lot of information to write coverage for their insureds," Katona said. The Gramm-Leach-Bliley Act requires companies to have certain security measures in place. For smaller agencies, absorbing the costs of securing doors or having password protection and certain security measures in place can be difficult. But "98 percent of the agents we deal with are not Gramm-Leach compliant," Katona said. "As a group of insurance agents and brokers, we have a responsibility to protect that data."

Wednesday, April 22

Call to rally against cyber crime

Collaboration

,,,At the conference, RSA President Mr Coviello suggested a number of ways the industry could come together to mitigate the cyber security threat.
RSA President Art Coviello
Mr Coviello said the global cyber threat continues to escalate

He outlined three key practices that included collaborating on standards, sharing technologies and integrating technologies and controls into the infrastructure.

Brett Galloway, Senior Vice-President of Cisco's Wireless Technology Group, agreed with that collaborative approach and said it was already happening to some degree.

"The work that goes on between the companies, the standards and the work that goes on between companies operationally to integrate, inter-operate and make sure that our customers bring these solutions together is actually quite profound and important.

"We clearly live in an era of increasing sensitivity and increasing threat not only from commercial bad guys but other sorts of bad guys as well," noted Mr Galloway.

http://news.bbc.co.uk/1/hi/technology/8011160.stm

Friday, April 17

ODNI ANNOUNCES STUDENT OPPORTUNITY THIS SUMMER IN NATIONAL INTELLIGENCEANALYSIS

The Office of the Director of National Intelligence is seeking about 30 highly motivated graduate students and college seniors interested in careers in intelligence analysis to study and work with currently serving analysts during an intensive two-week residential seminar.

The hands-on seminar, the first such exercise sponsored by the ODNI, will be held July 13 through July 24 in Washington , D.C. and will address the theme: ?Political Instability ? International Systems in Transition.?

The program will include lectures, field trips to agencies and work on an intelligence problem under the direction of analysts drawn from the Intelligence Community. Students who qualify will receive Secret level security clearances for the duration of the seminar.

The curriculum is being developed by the Philip Merrill Center for Strategic Studies of the Paul H. Nitze School of Advanced International Studies of the Johns Hopkins University and by the seminar?s co-sponsors, the Deputy Director of National Intelligence for Analysis and the Office of the Intelligence Community Centers for Academic Excellence. Successful applicants will receive travel expenses, room and board, course materials and a $1,000 stipend.

Application deadline is April 30.
http://www.dni.gov/cae/index.htm

Monday, April 13

Be on the Lookout for New Police Tool: Twitter

When Milwaukee police wanted to get word of a murder out quickly, they did it in 113 characters on Twitter.

"Latest homicide in the city is NOT a random act. Male, 33, shot in 1500 block N. 39. More details as we have them," read the recent entry.
http://www.officer.com/web/online/Top-News-Stories/Be-on-the-Lookout-for-New-Police-Tool--Twitter/1$46213

Wednesday, April 8

Mistake by 911 operator could have been prevented with technology

LV writes: Technology exists that would have translated this communication in real-time, understood the information content and sent an alert out to flag that a weapon was at the site of the domestic disturbance.


Mistake by 911 operator is cited
http://www.philly.com/philly/news/local/20090408_Mistake_by_911_operator_is_cited.html
Pittsburgh Post-Gazette

PITTSBURGH - When Richard Poplawski's mother called 911 to ask that her son be removed from their home in the Stanton Heights section of the city, she acknowledged that he had weapons. But that crucial piece of information never was relayed to the three Pittsburgh police officers who responded Saturday and were fatally shot.
"It should have gone out," said Robert A. Full, Allegheny County's chief of emergency services.

"There was human error," Full said Monday. "We are all living this, now, forever and ever."

Full would not identify the 911 call-taker other than to say she had been on the job for less than a year, including training. She was placed on paid administrative leave and has been offered counseling.

Former Fraternal Order of Police President James Malloy described such an omission as "heartbreaking." Officers knowing that someone involved in a domestic dispute has guns would handle the situation with more caution, he said.

Margaret Poplawski called 911 at 7:03 a.m. Saturday asking for police to remove her son from her home.

On a recording of that call, she sounded calm, even irritated, several times when she was asked to repeat basic information. She paused twice to chide her son in the background, saying, "Are you moving or what? Or the police gotta come?"

Poplawski: I'm requesting that he gets out. He came in last night when I was gone. . . . He stays, he comes and goes, but I want him out.

911 call taker: Does he have any weapons or anything?

Poplawski: Yes. They're all legal.

Call taker: OK, but he's not threatening you with anything?

Poplawski: Look, I'm just waking up from a sleep. I want him gone.

Call taker: OK, we'll send 'em over, OK?

Poplawski: Sounds good.

The message went to the police dispatcher: "No weapons."


DHS Announces Nearly $970 Million in Preparedness Grant Final Allocations

?Transit Security Grant Program (TSGP) ? $388.6 million to protect critical transit infrastructure from terrorism, including:
?Freight Rail Security Grant Program (FRSGP) ? $15 million to target resources for security plans, vulnerability assessments, employee security awareness training and GPS tracking systems for railroad cars transporting toxic inhalation materials.
?Intercity Passenger Rail (Amtrak) ? $25 million for Amtrak to protect critical surface transportation infrastructure and the traveling public from acts of terrorism, major disasters and other emergencies within the Amtrak rail system.
?Intercity Bus Security Grant Program (IBSGP) ? $11.7 million to assist operators of fixed-route intercity and charter bus services to support security plans, facility security upgrades and vehicle and driver protection.
?Trucking Security Program (TSP) ? $2.2 million to implement security improvement measures and policies that focus on the purchase, installation or enhancement of equipment and systems related to tractor and trailer tracking systems; to help develop a system for DHS to monitor, collect and analyze tracking information; and to develop plans to improve the transport and distribution of supplies and commodities during catastrophic events. DHS did not receive enough applications to fully fund the program through the initial solicitation, so only $2.2 million is being announced at this time.
?Port Security Grant Program (PSGP) ? $388.6 million to protect critical port infrastructure from terrorism, enhance maritime domain awareness and risk management capabilities to protect against improvised explosive devices and other non-conventional weapons; and to conduct training and exercises and support implementation of the Transportation Worker Identification Credential (TWIC).
?Buffer Zone Protection Program (BZPP) ? $48.6 million to increase preparedness capabilities of jurisdictions responsible for safeguarding critical infrastructure sites and key resource assets, such as chemical facilities and nuclear power plants, through planning and equipment acquisition.
?Emergency Operations Center (EOC) Grant Program ? $33 million to improve emergency management and preparedness capabilities by supporting flexible, sustainable, secure and interoperable EOCs to address identified deficiencies and needs. The grant provides funding for construction or renovation of a state, local or tribal government?s principal EOC.
?Interoperable Emergency Communications Grant Program (IECGP) ? $48.6 million for planning, training, exercises and equipment to states, territories, local and tribal governments to carry out initiatives identified in Statewide Communication Interoperability Plans, and improve interoperable emergency communications for responding to natural disasters and acts of terrorism.
?Driver?s License Security Grant Program (DLSGP) ? $48.6 million to prevent terrorism, reduce fraud and to improve the reliability and accuracy of personal identification documents that states and territories issue.
http://www.dhs.gov/ynews/releases/pr_1239203061205.shtm

Homeland Security shifts policy to target employers with illegal workers

By Josh Meyer and Anna Gorman Chicago Tribune Washington Bureau March 31, 2009
www.chicagotribune.com/news/nationworld/chi-immigration_tuesmar31,0,5809124.story
WASHINGTON ? Stepping into the political minefield of Immigration reform, Homeland Security Secretary Janet Napolitano will soon direct federal agents to emphasize targeting American employers for arrest and prosecution over the laborers who enter the country illegally to work for them, department officials said Monday. The shift in emphasis will be outlined in revamped field guidelines issued to agents of Homeland Security's Immigration and Customs Enforcement division as early as this week, according to several officials familiar with the change in policy. It is in keeping with comments that President Barack Obama made during last year's campaign, when he said past enforcement efforts have failed because they focused on illegal immigrants rather than the companies that hire them?

Alleged Money Scam Roils Islamic Center

Charges, Countercharges at Mosque
By Del Quentin Wilber and Michelle Boorstein Washington Post Tuesday, March 31, 2009; B01
http://www.washingtonpost.com/wp-dyn/content/article/2009/03/30/AR2009033002925.html?
In the Islamic Center of Washington, beneath the 160-foot minaret that towers over Embassy Row, a tale of intrigue has simmered for years. It is marked by bitter recriminations between two men who are credited with rehabilitating its reputation as a prominent symbol of Islam in the United States. The center's business manager has been accused of stealing $430,000 from the mosque in a complicated check scam. The key witness against him is the center's director and imam, a Saudi who says he noticed the crime when he spotted too many checks being written to a gardener. The Iranian-born business manager has a different story. He says the imam told him to take the money. About half was used to pay off debts and living expenses of two women who were close to the imam, and the rest was used to pay informants for tips about the mosque's security, he said. It was enough to confound a jury, which deadlocked 9 to 3 after the business manager's three-week trial last May. Now prosecutors are attempting to retry him, and the manager is firing back. He has accused the imam of committing perjury and obstructing justice. A federal judge is expected to rule in coming weeks on whether to drop the charges or prevent the imam from testifying?

Miami Drug Case Has Hezbollah Tie

by IPT News Mon, 30 Mar 2009 at 11:17 AM
http://www.investigativeproject.org/blog/2009/03/miami-drug-case-has-hezbollah-tie.html
An arrest in Colombia earlier this month seems to support concerns that Hezbollah is working with Mexican and South American drug cartels to establish a better foothold in the West. El Nuevo Herald, the Spanish-language edition of the Miami Herald, reported on the arrest of Jose Alberto Henao Jaramillo, who is wanted in a drug and money laundering case in Miami. That case already netted more than 100 arrests http://www.elnuevoherald.com/noticias/america_latina/story/409615.html by the U.S. Drug Enforcement Agency, El Nuevo Herald reported. Among them is Chekri Mahmoud Harb, who goes by the name "Taliban," and has alleged Hezbollah connections. The paper cites a Colombian government intelligence report which said "part of the money was presumably distributed for terrorist activities of groups like Hezbollah." Harb is charged with four conspiracy counts related to drug trafficking. It's a tangible sign http://www.investigativeproject.org/documents/misc/261.pdf amid growing concerns that Hezbollah is tapping South and Central American drug routes to extend its reach http://www.investigativeproject.org/blog/2009/03/a-journalists-chilling-call-for-competition.html closer to the American border.

Dead bird in black soap seized at BWI Airport

March 31, 2009 - 12:19pm
http://www.wtop.com/?nid=25&sid=1637737
(Photo courtesy of U.S. Customs and Border Protection)
BALTIMORE - Security officials at BWI Airport are still shaking their heads over what they found in the luggage of a traveler from Nigeria. U.S. Customs and Border Protection (CBP) discovered a bird encrusted in black homemade soap while conducting a baggage inspection Friday. The traveler, who arrived from London, repeatedly denied having any animal products. "During the inspection, we uncovered something that looked like black soap," CBP Spokesman Steve Sapp says. "But upon further inspection, it turned out to be a dead bird encrusted inside that black soap. The traveler told us the bird was sacrificed, and she was bringing it in for a friend." Sapp says the concealed bird was a potential threat to American poultry since Nigeria has the bird flu. Investigators also found nearly four pounds of beef and three pounds of chicken bullion in the passenger's luggage?.

TSA's Secure Flight Begins Vetting Passengers

US Transportation and Security Administration (TSA) Press Release
Contact: TSA Public Affairs (571) 227-2829
http://www.tsa.gov/press/releases/2009/0331.shtm
WASHINGTON ? The Transportation Security Administration (TSA) announced today the implementation of the Secure Flight program, which shifts pre-departure watch list matching responsibilities from individual aircraft operators to TSA and carries out a key recommendation of the 9/11 Commission. To date TSA has assumed the watch list matching responsibility for passengers on domestic commercial flights with four volunteer aircraft operators and will add more carriers in the coming months. "The implementation of Secure Flight is a critical step towards mitigating threats we know exist in our aviation system," said TSA Acting Administrator Gale Rossides. "Secure Flight improves security and protects passenger privacy and civil liberties by ensuring the confidentiality of government watch list matching protocols." Under Secure Flight, airlines will gather a passenger's full name, date of birth, and gender when making an airline reservation to determine if the passenger is a match to the No Fly or Selectee lists. By providing the additional data elements of gender and date of birth, Secure Flight will more effectively help prevent misidentification of passengers who have similar names to individuals on the watch list?

Electricity Grid in U.S. Penetrated by Spies

By SIOBHAN GORMAN TECHNOLOGY APRIL 8, 2009 Wall Street Journal
http://online.wsj.com/article/SB123914805204099085.html
WASHINGTON -- Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials. The spies came from China, Russia and other countries, these officials said, and were believed to be on a mission to navigate the U.S. electrical system and its controls. The intruders haven't sought to damage the power grid or other key infrastructure, but officials warned they could try during a crisis or war. "The Chinese have attempted to map our infrastructure, such as the electrical grid," said a senior intelligence official. "So have the Russians." The espionage appeared pervasive across the U.S. and doesn't target a particular company or region, said a former Department of Homeland Security official. "There are intrusions, and they are growing," the former official said, referring to electrical systems. "There were a lot last year." Many of the intrusions were detected not by the companies in charge of the infrastructure but by U.S. intelligence agencies, officials said. Intelligence officials worry about cyber attackers taking control of electrical facilities, a nuclear power plant or financial networks via the Internet. uthorities investigating the intrusions have found software tools left behind that could be used to destroy infrastructure components, the senior intelligence official said. He added, "If we go to war with them, they will try to turn them on." Officials said water, sewage and other infrastructure systems also were at risk?

President Obama Announces His Intent to Nominate Rand Beers as Homeland Security Under Secretary for National Protection and Programs Directorate

Beers? responsibilities at NPPD will include continued operations leadership, as well as oversight on intelligence, cybersecurity, technology and coordination with state, local and tribal partners. IP leads a complex national mission to protect the country?s critical infrastructure and key resources (CIKR) from threats by analyzing intelligence and executing public and private coordination in order to mitigate risks and effects. CS&C works to prevent or minimize disruptions to our critical cyber and communications infrastructure to protect the overall security of the United States.
http://www.dhs.gov/ynews/releases/pr_1239207536374.shtm

Saturday, April 4

Three Officers Killed In Stanton Heights Shootings

PITTSBURGH (KDKA/AP) ?

A man opened fire on officers during a domestic disturbance call Saturday morning, killing three of them, a police official said.

Friends said he feared the Obama administration was poised to ban guns.

Three officers were killed, said a police official at the scene who spoke on condition of anonymity because he was not authorized to speak to the media.

Police spokeswoman Diane Richard would only say that at least five officers were wounded, but wouldn't give any other details.

The man who fired at the officers was arrested after a several-hour standoff.

One witness reported hearing hundreds of shots.

The shootings occurred just two weeks after four police officers March 21 in Oakland, Calif., in the deadliest day for U.S. law enforcement since Sept. 11, 2001.

NY gunman angry over poor English skills, job loss

AP Article by William Kates
cuts from the article read.... A woman who answered the phone at a listing for Henry D. Voong said she was Jiverly Voong's sister but would not give her name. She said her brother had been in the country for 28 years and had citizenship.

Zikuski told "Today" that the shooter had worked in Binghamton for Shop-Vac, which closed in November. The sister told the AP on Friday that her brother worked at a company where "they make the vacuums."
The mayor told ABC that the gunman "had lost a job recently and was somewhat angry." "He had language issues, didn't speak English that well, and was really concerned about his employment situation," Ryan said.

Initial reports suggested Voong had recently been let go from IBM, which has roots in the region, but a person at IBM said there was no record of a Jiverly Voong ever working there. His father, Henry Voong, does work there.

..The attack at the American Civic Association, which helps immigrants settle in this country, came just after 10 a.m. as people from all over the globe ? Latin America, China, Kazakhstan, Vietnam, Africa ? gathered for English and citizenship lessons in an effort to become a bigger part of their new home.
...A string of attacks in the U.S. in the last month left 44 people dead in all.

A gunman killed 10 people and himself in Samson, Ala.; shootings that began with a traffic stop in Oakland, Calif., left four police officers and the gunman dead; an apparent murder-suicide in Santa Clara, Calif., left six dead; and a gunman went on a rampage at a nursing home Sunday, killing seven elderly residents and a nurse who cared for them.

Saturday, March 28

The InfraGard National Members Alliance and the Center for Information Security Awareness Launch FREE Information Security Awareness Course

New Awareness Program Will Provide Free Online Awareness Training For Individuals And Small Businesses Nationwide.

March 27, 2009, Fairfax, VA - The InfraGard National Members Alliance (INMA) and the Center for Information Security Awareness are pleased to announce the launch of a FREE online information security awareness training program that focuses on the workplace as the foundation for better security education and training.

A growing number of studies have identified employees and other insiders as the cause of the majority of data and security breaches and better security awareness and training is central to reducing these incidents.

The web-based course, created by The Center for Information Security Awareness, is professionally narrated throughout and consists of 14 separate lessons covering key information security issues that can impact the workplace. These include cyber threats to the workplace and the nation, understanding how employee behavior is exploited, the importance of regulatory compliance, better workplace security, effective password practices, understanding social engineering, improved email practices, safer web surfing practices, protection of sensitive data, as well as laptop, PDA, and mobile security.

Participants can also elect to obtain their personalized Certificate in Information Security Awareness in the Workplace. The examination consists of a 100 randomly-generated questions based upon the material covered in the course materials and an individual may take the exam as many times as necessary to achieve a passing score.

The free course and additional information may be found at www.InfraGardAwareness.com.

This interactive and engaging training targets issues central to Critical Infrastructure Protection (CIP) and dovetails seamlessly with InfraGard National Members Alliances priorities. Were pleased to make this important training available to anyone for free and also encourage people to earn this certification. Each opportunity to gain additional professional development contributes to enhancing the capabilities and contributions of our extensive membership to homeland and national security, said Dr. Kathleen Kiernan, InfraGard National Members Alliances Chairman of the Board.

We at the Center for Information Security Awareness are excited to partner with InfraGard in this important initiative. By working together in offering this free awareness training, well make meaningful progress in improving awareness of computer and information security best practices. Our goal is to reduce the frequency of data security breaches in America, said Jon McDowall, director of education and co-founder of the Center for Information Security Awareness.

About the InfraGard National Members Alliance

InfraGard is a collaborative effort between the Federal Bureau of Investigation (FBI) and private sector experts in the areas of cyber and physical security. Originally initiated in the FBIs Cleveland Office, InfraGard was designed to harness private sector expertise for investigative efforts in the cyber and physical security arenas.

InfraGard quickly expanded to FBI Headquarters in Washington DC with local program responsibility held within each of the FBIs 56 field offices. In 2003, the private sector members of InfraGard formed the InfraGard National Members Alliance (INMA), which currently has over 23,000 members.

More information about the InfraGard National Members Alliance may be found at http://www.infragardmembers.org/

About the Center for Information Security Awareness

The Center for Information Security Awareness (www.GetSecurityAware.com) was formed in 2007 by a group of leading security experts and academics to explore more effective ways to increase security awareness among a number of audiences including consumers, employees, small business owners, and law enforcement.

The Centers Board of Advisors includes Michael Levin, retired U.S. Secret Service and former Deputy Director of the National Cyber Security Division of the Department of Homeland Security, Jon McDowall, CFE, CII, CEO of Fraud Resource Group, Neal OFarrell, renowned authority on end-user security awareness and education, Andy Purdy, former Cyber Security Czar and Acting Director of the National Cyber Security Division/US-CERT of the Department of Homeland Security and Dyann Bradbury, CISSP, CSOX-FT, Associate Director of Compliance for DR globalDirect, Inc., a Digital River company.

More information about the Center for Information Security Awareness may be found at www.GetSecurityAware.com.

Tuesday, March 24

DIFFERENCE MAKERS - Heroes in our Communities!

Director Robert S. Mueller congratulates representatives of four of the nation's largest billboard companies?Clear Channel Outdoor, Adams Outdoor Advertising, Lamar Advertising, and the Outdoor Advertising Association of Georgia. In little more than a year, their efforts in our Digital Billboard initiative have been instrumental in apprehending 18 people sought by authorities.
http://www.fbi.gov/page2/march09/dcla_032009.html

Google Street View Video Report - Fox News

http://www.foxnews.com/video/index.html?playerId=videolandingpage&streamingFormat=FLASH&referralObject=3945189&referralPlaylistId=e059f7416cd3e6a978256d927c7bb152d9988581

Saturday, March 21

Mark Paul Serafin new Mayor of the Village of Manlius, NY

My hometown, the Village of Manlius, voted a new Mayor and my family who still lives in Manlius supports Mark Paul Serafin. A lifelong resident of Manlius, NY, Mark brings the business knowledge, community outreach and the passion for "doing what is right" in the best interest of the people of Manlius. http://videos.syracuse.com/post-standard/2009/03/markpaul_serafin_elected_villa.html

Congratulations Mark Paul!

Ex-Googler: Google Depends Too Much On Data Over Instinct For Design

Does Google depend too much on data over design instinct? Yes, says former Googler Douglas Bowman, who posted a goodbye note to the company on his last day there today. From his post:

Without a person at (or near) the helm who thoroughly understands the principles and elements of Design, a company eventually runs out of reasons for design decisions. With every new design decision, critics cry foul. Without conviction, doubt creeps in. Instincts fail. ?Is this the right move?? When a company is filled with engineers, it turns to engineering to solve problems. Reduce each decision to a simple logic problem. Remove all subjectivity and just look at the data. Data in your favor? Ok, launch it. Data shows negative effects? ?.

Yes, it?s true that a team at Google couldn?t decide between two blues, so they?re testing 41 shades between each blue to see which one performs better. I had a recent debate over whether a border should be 3, 4 or 5 pixels wide, and was asked to prove my case. I can?t operate in an environment like that. I?ve grown tired of debating such miniscule design decisions. There are more exciting design problems in this world to tackle.

Postscript from Matt: For those who may not know, Doug Bowman is a star in the web design world. You?ve probably seen a lot of his work without realizing it ? he created several of the most popular Blogger templates after Google bought the popular blogging platform software, and led the redesign of Blogger itself, too. He also helped design/develop Google Calendar, among other Google products.

Friday, March 20

CyberSecurity Briefing

http://commerce.senate.gov/public/index.cfm?FuseAction=Hearings.Hearing&Hearing_ID=d59f00d0-0ad9-41cd-bde8-b96babb08b7e

Monday, March 16

Community Sharing with Community Supported Agriculture

Nothing says springtime in New York like community-supported agriculture. But before you re-up your regular share of mixed produce and call it a day, consider this new crop of other foods now available on a subscription basis.

The basic concept is the same: You purchase a full or half-share of a supplier's upcoming yield and receive scheduled food deliveries in return. This allows small-scale suppliers who need up-front capital to get in on the action. And because a number of these alt-CSAs also offer home delivery, there's no concern about missed pick-ups. Here are four worth the investment:

Meat The Brooklyn Kitchen is bringing monthly deliveries of pasture-raised chicken ($5.50 a pound; $10 deposit required) and half ($11 a pound, $75 deposit) and whole lambs ($10.50 a pound; $150 deposit) from upstate New York's Awesome Farm (pictured) to its Williamsburg shop. Pick-up begins June 20.

Bread This summer, Hot Bread Kitchen will partner with a handful of local CSAs to offer bread shares ($180). Shareholders can expect to receive corn tortillas, artisanal loaves and the bakery's crispy lavash nine times during the season.

Seafood Upper Meadows Farm in Montague, New Jersey--which supplies the Hell's Kitchen CSA--offers wild-caught seafood (clams, scallops and assorted fish) from local fishermen to premium shareholders ($845 for CSA membership, plus $105 a week). Non-premium shareholders can purchase fish on a per-order basis.

Dairy Though it's not a CSA in the traditional sense, Manhattan Milk nevertheless delivers farm-fresh cheese, eggs, milk and yogurt from local farms to your doorstep every Wednesday. No subscription necessary; delivery service begins April 21.
http://www.nal.usda.gov/afsic/pubs/csa/csa.shtml

Sunday, March 8

2009 Doers, Dreamers and Drivers

2009 Doers, Dreamers and Drivers: "Paul Cosgrave, CIO, New York City and Commissioner, New York City Department of Information Technology and Communications"

$1.6 Billion Stimulus Funding Allocation Announced by Virginia Governor

$1.6 Billion Stimulus Funding Allocation Announced by Virginia Governor: "Virginia Governor Timothy M. Kaine today announced the allocation of $1.6 billion from the American Recovery and Reinvestment Act to education, public safety and transportation needs in Virginia. He also announced that Chief of Staff Wayne Turnage will lead a working group that, starting today, will evaluate and appropriately route projects submitted on the Stimulus.Virginia.Gov Web site. Once work begins, Virginians will be able to track the spending of recovery funds through a Web site currently being developed by the commonwealth, and expected to launch shortly."

Friday, March 6

Terrorist group recruits in Midwest

Washington Times - Terrorist group recruits in Midwest: "As people crowded into the capital for Barack Obama's inaugural celebration, senior counterterrorism officials huddled in the White House situation room, frantically trying to unravel intelligence about a possible attack on Washington.
By the afternoon of Jan. 20, as Mr. Obama took the oath of office, the threat of a terror plot by the Somalia-based al-Shabab organization had been debunked, but the flurry of activity underscored growing worries about this Islamic militant group."

Thursday, March 5

ASIS members say bad economy means both budget cuts and a need for more security

A survey of the economic downturn's impact on the security functions performed by ASIS International members at various-sized companies found them in agreement that the need for security has increased.

Seventy-eight percent of large-firm chief security officers (CSOs) saw an increased need, while 66 percent of security managers at smaller firms saw an increased need.

According to ASIS, "increases in crime and theft, followed by employee lay-offs and furloughs, topped the CSOs' list of reasons," while the security managers at smaller firms "reported increases in theft of, and damage to, physical property, as their primary concerns."
http://www.gsnmagazine.com/cms/features/news-analysis/1592.html

TSA seeks security info from highway and pipeline owners

TSA is seeking permission from the Office of Management and Budget (OMB) to continue making on-site visits under its Corporate Security Review program, in which two or three TSA employees spend a full day in face-to-face discussions with the owners of highway and pipeline assets to learn about any security programs they may have in place.

TSA estimates it conducts 184 such on-site visits per year, each running between three and eight hours.

?At the conclusion of these site visits, TSA completes the Corporate Review form, which asks questions concerning eleven topics: Threat assessments, vulnerability assessments, security planning, credentialing, secure areas, infrastructure protection, physical security countermeasures, cyber security, training, communications, and exercises,? said a TSA notice published in the Federal Register on March 5.

TSA is seeking comments from the public by May 4 on its request to continue this information-gathering effort. Comments can be mailed to ? and further information is available from ? Ginger LeMay, a Paperwork Reduction Act Officer at TSA, at 571-227-3616.

Command Web Consolidation - Daylight Savings Time March 8th

Commander, Naval Meteorology and Oceanography Command is consolidating the command's web presence in accordance with Department of Defense (DoD) and Navy guidance. The U.S. Naval Oceanography portal will be the single access point for all public facing Meteorology and Oceanography products and services. This publicly-accessible portal is currently online at http://www.usno.navy.mil and is being populated. In the near future, non-DoD users will be redirected to this portal.

DoD customers can access all operational data, products and services via the NIPRnet Naval Oceanography Portal site at https://oceanography.navy.mil (CAC required).

http://aa.usno.navy.mil/faq/docs/daylight_time.php

Saturday, February 28

Future security threats: Enterprise attacks of 2009

Future security threats: Enterprise attacks of 2009: "Based on last year's threats and exploits, here are some brief information security predictions for 2009. But remember, many of the new threats we will face in the near and distant future will look similar to the ones we have faced in the past."

Friday, February 27

U.S. spy agency may get more cybersecurity duties by Reuters: Yahoo! Tech

U.S. spy agency may get more cybersecurity duties by Reuters: Yahoo! Tech: "'A number of nations, including Russia and China, can disrupt elements of the U.S. information infrastructure,' Blair said. 'Cyber-defense is not a one-time fix; it requires a continual investment.'
Billions of dollars are at stake. Defense contractors Northrop Grumman Corp, Lockheed Martin and Boeing Co are working on classified cybersecurity projects for the U.S. government.
Software and telecommunications companies also are likely to play a major role, said Democratic Representative Dutch Ruppersberger, whose Maryland district includes the NSA.
Earlier this month, President Barack Obama ordered a 60-day cybersecurity review and named Melissa Hathaway, the top cyber official with the intelligence director's office, to a White House post overseeing the effort."

Thursday, February 12

1 in 5 kids solicited for sex online; Only 25% of parents know | LOCAL NEWS | Local Breaking News and Weather from AZFAMILY.COM & KTVK 3TV - Arizona's Family

1 in 5 kids solicited for sex online
Parents warned to keep kids safe while online PHOENIX - Parents are being warned to keep children safe on the information super-highway due to internet predators, online pharmacies and virtual-bullying. The statistics are alarming. One out of every five children is solicited for sex online but only 25% of parents ever hears about it."

Wednesday, February 11

Muslims in US are hopeful but wary of status under Obama

<http://www.heraldtimesonline.com/stories/2009/01/31/religion.qp-7689896.sto> ...

Thomas Nicpon, assistant special agent in charge in the FBI's New York intelligence division, said deciding which Muslim groups to work with is a " difficult ...

Lights Out for Earth Hour

Mark your calendars...
March 28, 2009, at 8:30 pm. Turn out. Take action.
Excitement is building all over the US and around the world. Here's a quick update on what's developed this week for Earth Hour:
*
More cities turning out: Atlanta, Chicago, Dallas, Las Vegas, Los Angeles, Miami, Nashville, New York, San Francisco, St. Louis and the Village of Homer Glen, Illinois. We've heard rumblings from Houston and Seattle as well and would also love to get Washington, DC on board. If you're a DC resident, let Mayor Fenty know you want the city to turn out!
*
Help us turn out the lights on the US Capitol Dome—write to your Senators or Member of Congress. <http://wwf.worldwildlife.org/site/R?i=zc1Dqesr4g6DvcINoZD1aw..>
*
What goes on in Vegas doesn't always stay there: Earth Hour officially launched in Sin City at a press event featuring a Panda Bear and Vegas showgirls. The Strip will indeed go dark for the full 60 minutes—the only time the lights have been dimmed except briefly in 1998 in honor of Frank Sinatra's death.
*
Other city news: Chicago held its official launch event last week, with Mayor Daley again pledging his support. Next up? Nashville, Los Angeles, San Francisco and Dallas!
*
The city of lights goes dark: Paris and 27 other French cities announced they'll take part in Earth Hour, with the Eiffel Tower and Notre Dame going dark. A total of 405 cities in 74 countries have pledged to participate—double the number of countries from last year.
*
Download a very cool Shepard Fairey poster: The famed Obama-portrait artist has created a series of "Vote Earth" posters urging people to turn off their lights during Earth Hour. Available at www.earthhourUS.org

DHS Enforcement News available with updates

Border Patrol Agents Arrest 77 in Arizona
February 9, 2009 (Tucson, Ariz.) - CBP agents arrested 77 Mexican nationals after camera operators identified the unusually large group crossing the international border fence from Mexico. As the group crossed, a coordinated effort between agents of the Douglas and nearby Naco stations, along with Customs and Border Protection Air and Marine, resulted in the arrest of 77 individuals. More at CBP.gov
CBP Agents Arrest 12 Illegal Aliens
February 4, 2009 (San Clemente, Calif.) - Border Patrol agents apprehended 12 Mexican nationals suspected of illegally entering the country at sea using a smuggling boat. More at CBP.gov
ICE Teams Arrest 95 in Georgia, Carolinas
February 3, 2009 (Atlanta) - ICE officers arrested 92 fugitives aliens and three immigration violators throughout Georgia and the Carolinas during a four-day initiative. Of those arrested, 92 had final orders of deportation, three were immigration violators encountered during the course of the targeted operation; 24 of those arrested had previous criminal convictions that spanned from DUI, larceny and felony credit card fraud, assault, and first degree burglary. More at ICE.gov
ICE Arrests 117 in Florida
February 3, 2009 (Miami) - ICE officers arrested 117 fugitive aliens and immigration violators during a five-day fugitive enforcement operation. ICE officers arrested 89 immigration fugitives who ignored lawful orders of removal and 28 other immigration violators. Of the 117 arrested, 30 had criminal histories that spanned from assault, battery, DUI, aggravated battery, trespassing, larceny, burglary, resisting arrest, soliciting prostitution, cocaine possession, marijuana possession, molestation and transporting narcotics. More at ICE.gov
Coast Guard Conducts Two Migrant Interdictions
February 1, 2009 (San Diego) - The U.S. Coast Guard Maritime Safety and Security Team San Diego interdicted two separate vessels that tried to illegally enter the U.S. The eight illegal immigrants identified on board were turned over to Maritime Task Force officers for further processing. U.S. Customs and Border Protection marine enforcement agents took custody of the two vessels. More at USCG.mil

Coast Guard Rescues, Returns 242 Haitian Migrants
January 30, 2009 (Miami) - The crew of the Coast Guard Cutter Diligence returned 242 Haitian migrants to Port-au-Prince, Haiti after the crew of the Coast Guard Cutter Seneca located a grossly overloaded 50-foot sail freighter about 25 miles west of Ile de la Tortue, Haiti and immediately began rescue efforts due to the large number of migrants aboard the unseaworthy vessel and rapidly increasing seas and winds in the area. More at UCSG.mil
Coast Guard Repatriates 61 Haitian Migrants
January 22, 2009 (Miami) - Crewmembers from the Coast Guard Cutter Seneca returned 61 Haitian migrants to Cap Haitien, Haiti, after rescuing them from their overloaded vessel in the waters northwest of Pointe Ouest, Ile de la Tortue, Haiti. More at USCG.mil
ICE Team Arrests 45 Aliens in Colorado
January 20, 2009 (Denver) - ICE agents arrested 45 fugitives and immigration violators throughout Colorado during a three-day initiative. Of those arrested, 28 were fugitives who already had final orders of deportation and 17 were immigration violators encountered by ICE officers during their targeted arrests. Of the total arrested, 28 had criminal convictions, including sexual assault of a child, car theft and resisting arrest. More at ICE.gov
ICE Teams Arrest 69 Aliens in Dallas Area
January 16, 2009 (Dallas) - ICE officers arrested 69 fugitive aliens and other immigration violators from China, El Salvador, Guatemala, India, Mexico and Venezuela. Of those arrested, 55 had final orders of deportation and 14 were immigration violators. More at ICE.gov
Coast Guard Repatriates 37 Haitian Migrants
January 15, 2009 (Boston) - Crewmembers from the Coast Guard Cutter Seneca returned 37 Haitian migrants to Port au Prince, Haiti. More at USCG.mil
Coast Guard Repatriates 37 Haitian Migrants
January 14, 2009 (Miami) - Crewmembers from the Coast Guard Cutter Seneca returned 37 Haitian migrants to Port au Prince, Haiti. More at USCG.mil
Coast Guard Repatriates 100 Haitian Migrants
January 13, 2009 (Miami) - The Coast Guard Cutter Seneca returned 100 Haitian migrants to Cap Haitien, Haiti, after the Coast Guard Cutters Bear and Seneca rescued them from their grossly overloaded vessel in the waters northeast of Cuba. More at USCG.mil
Coast Guard Repatriates 63 Cuban Migrants
January 7, 2009 (Miami) - The crew of the Coast Guard Cutter Chandeleur repatriated 63 Cuban migrants from four separate interdictions at sea in six days to Bahia de Cabañas, Cuba. More at USCG.mil
Coast Guard Repatriates 218 Haitian Migrants
January 5, 2009 (Miami) - The crew of the Coast Guard Cutter Bear repatriated 218 Haitian migrants from three separate interdictions at sea in five days to Cap Haitien, Haiti. More at USCG.mil
Coast Guard Repatriates 39 Cuban Migrants
January 4, 2009 (Miami) - The crew of the Coast Guard Cutter Kodiak Island repatriated 39 Cuban migrants, from three separate interdictions at sea to Bahia de Cabañas, Cuba. More at USCG.mil
ICE Arrests 110 in Florida
December 23, 2008 (Miami) - ICE agents arrested 110 fugitive aliens and immigration violators in a five-day targeted fugitive enforcement operation in Miami, Broward, Palm Beach, Orlando, and Tampa areas. Of those arrested, 81 were immigration fugitives who ignored lawful orders of removal and went into hiding and 24 had criminal histories that spanned from aggravated assault, battery, marijuana possession, cocaine possession, heroin possession, trespassing, disorderly conduct, resisting officer with violence, sexual battery, social security fraud, burglary, carrying concealed firearm, larceny, grand theft and lewd and lascivious assault on a child. More at ICE.gov
ICE Team Arrests 84 Aliens in Dallas
December 19, 2008 (Dallas) - ICE agents arrested 84 fugitive aliens and other immigration violators in Dallas and surrounding communities as part of a five-day operation. Of those arrested, 64 had final orders of deportation; the remaining 20 were immigration violators. More at ICE.gov
ICE-led Operation Nets 6 Gang Members
December 11, 2008 (Sturgis, Mich.) - ICE agents, in partnership with local law enforcement officers, arrested six illegal alien gang members from Mexico. One of the individuals arrested provided fraudulent documents to the gang members. The operation targeted foreign-born members and associates of the Sureños 13 and Southside 18 street gangs. All six of the individuals were illegally present in the U.S. and will face deportation proceedings. More at ICE.gov
ICE Arrests 15 at Indiana Oil Refinery
December 10, 2008 (Whiting, Ind.) - ICE agents arrested 15 illegal aliens working as contract janitorial workers, 14 from Mexico and one from Guatemala. ICE initiated the investigation after receiving information that illegal aliens had access to secure areas of the plant. ICE identifies oil refineries as critical infrastructure, which are vulnerable to sabotage, attack or exploitation. More at ICE.gov
CBP, State Police Arrest 29 Aliens in Louisiana
December 4, 2008 (Lake Charles, La.) - The Lake Charles Border Patrol station assisted Louisiana State Police by translating for 31 Spanish-speaking subjects at a worksite during a search for a fugitive. The wanted subject was not among the group, but 29 of the individuals were illegally present in the United States. More at CBP.gov
ICE Arrests 16 Mexicans in Idaho
December 4, 2008 (Boise, Idaho) - ICE agents arrested 16 Mexican nationals on administrative immigration violations at an Idaho wood framing company. The illegal workers, all of whom are male, were employed by Idaho Truss in Nampa, Idaho, and will be placed in deportation proceedings. Some of the workers may have secured employment using false Social Security numbers and other counterfeit identity documents. More at ICE.gov

PartnerForSecurity