Chesley Brown Corporate Investigations

There comes a time in which every company requires some type of investigation or business intelligence. When that time comes, it requires a valued partner to guide you through the many areas and specialties required to execute such operations.

Corporate Investigative Services

Chesley Brown's Corporate Investigative services group is composed of former FBI, law enforcement, business, and legal experts. Whether you or your representatives require a discreet internal investigation involving employees, intellectual property (IP), thefts, forgery, embezzlement, computer forensics, forensic accounting, or litigation support it is crucial that you have the right experts available. Corporate investigation services can start with a simple inquiry and quickly turn into something much more in-depth and complicated. Chesley Brown has the capabilities and expertise to handle a wide variety of investigations wherever they lead.

Unfortunately, there are so many ways for an adversary or a dishonest employee to steal resources or intellectual property from your company. Gone are the days of calling someone with a general Private Investigator (PI) license to address your concerns. Today's corporate investigations are far more sophisticated and require subject matter expertise. This requires the ability of a firm that has the network and intelligence to provide a client with not only information, but a variety of services to manage and guide the investigation through resolution.

With over 30 years of expertise, Chesley Brown can:

  • Serve as your single source to meet a wide range of corporate investigations services
  • Provide you access to our industry-leading subject matter experts
  • Identify cost-saving opportunities for your organization
  • Our investigators work hand in glove with our consulting division to assure the proper execution and outcome.

Expert Risk Analysis

By working directly with your stakeholders, law enforcement, cybersecurity professionals and industry experts our risk analysis team can determine the likelihood of any particular threat, prioritize action plans, recommend appropriate security measures implement solutions. Data and facts should be your be your source of truth when implementing or improving new security systems or frameworks, that's why we've made it so easy to get started. Here's how:

step-1-meeting
01

Schedule a Strategy Call

Our first job is to gather as much information as possible about your organization's unique challenges and concerns.

step-2-create-plan
02

Create a plan

After studying the problem, our team of experts will get to work crafting a bespoke strategy that protects all aspects of your business, and enables continued growth.

step-3-execute
03

Let’s execute that plan together

We’ll work directly with you and your stakeholders to implement and manage your new strategy, helping you navigate any pitfalls along the way.

What are you waiting for?

Let's Talk!

Why Clients Choose Chesley Brown

Chesley Brown is an industry leader in providing Security Risk Management and security consulting services. Importantly, only Chesley Brown has the capabilities to offer:

  • A Single Point of Contact – we make your job easier via streamlined coordination and reporting
  • Our Global Resources – allowing us to provide consistently reliable security management services at any or all of your locations around the world
  • Agility – our range of service options allows us to act quickly and decisively to address any issues or threats that may present themselves over the lifetime of your business.

In addition to over 100 years of collective experience, all Chesley Brown officers and directors are supported by cutting-edge technology to assist in making their recommendations timely and effective. To learn more about each of our Corporate Investigative Services click the button below and let's make a plan.

Testimonials

Once the decision was made to renovate the entire property's electric security system, Chesley Brown began developing specifications and identifying prospective bidders. After this was accomplished, Chesley Brown was with us to manage the bid process, award the bid and oversee the installation of the new system.

General Manager

Office Complex, Georgia

Our unique property required a firm that tould customize a security management program that addressed our property's individuality. Chesley Brown was the only firm that had the flexibility and experience to make it happen.

General Managed

Regional Shopping City, Missouri

Frequently Asked Questions (FAQ)

Our corporate partners often have lots of questions. We have gathered the most common ones together with responses directly from our team of experts. If you have ever wondered whether your company or organization needs a corporate investigator, this will hopefully help you find the answers you need.

Corporate investigators can uncover facts about any specific problems your company has through interviews, interrogation, and data analysis; identify facts and corroborate complaints within a written report with the facts surrounding the situation, equip you with options to deal with the offending employees, or bad actors and provide guidance on how to improve business operations to avoid recurrence.

Personal problems of employees such as substance abuse or gambling, inner-office relationships, complaints of racism or sexual harassment, intellectual property theft, disruptive divorce proceedings, moonlighting, criminal charges, conflicts of interest, personal use of corporate resources, excessive sick time, workman's comp or fraud are generally the most common issues we see.

Conducting effective witness interviews can be one of the most demanding steps in an internal corporate investigation. At Chesley Brown we rely on the investigative experience of our prosecutors and former federal agents to develop investigative strategies based on the specific facts and circumstances involved in each investigation we handle.

If an internal investigation of the company shows evidence of employee misconduct, generally this means that several actions will be taken immediately. Depending on the specific misconduct in question, this could include any combination of the following:

  • Update company policies and procedures
  • Taking corrective action internally
  • The discipline of the employee (or employees) involved
  • Self-disclosing the issue to the appropriate federal authorities.

How a company deals with federal regulators requires a measured, strategic, and forward-thinking approach. If the wrongdoing triggers an obligated self-disclosure, federal authorities are already investigating your company's business or registration practices, or there's a chance that a federal investigation can happen soon, the risk management team of the company will need to make informed decisions and engage an external adviser to chart a course of action that mitigates the risk of civil or criminal penalties or reduces exposure.

Additional Resources:

Risk Takers Podcast Series Episode 1 - Aldrich Ames Spy Case
https://chesleybrown.com/the-risk-takers-podcast-series-launches-today/

Risk Takers Podcast Series Episode 1 - Surveillance Detection Routes (SDRs)
https://chesleybrown.com/the-risk-takers-podcast-series-launches-today/

Safe Passage / Safe Travel
https://chesleybrown.com/corporate-investigation-services/safe-passagetravel/

Protestors storming the captiol in an act of civil unrest, insurection
Blog
Preventing Civil Unrest
We’ve all recoiled in disbelief and horror as we watched scenes of violence stream across our TVs. The violent insurrection we saw in the U.S. ...
Read More
Vulnerability assessments and management in the new risk landscape. Threat assessment
Blog
What Achilles can Teach us About Threat Management
By: Dell Spry There are numerous similar, seemingly inconsequential, soft targets scattered across our country unprotected by a single surveillance camera or even a strand ...
Read More
The solarwinds supply chain hack represented by 6 locks, one of which is a different color
Blog
The SolarWinds Supply Chain Attack: What Businesses Need to Know
What is the SolarWinds Supply Chain Attack? SolarWinds, the Austin-based cybersecurity firm, found itself in the middle of a catastrophe due to internal security lapses. ...
Read More
officers overlooking the damaged caused by the christmas morning bombing in Nashville, Tennesseee
Blog
Lessons Businesses Must Learn from the Nashville Bombing
The sound of gunfire punctuated the peaceful hush of Christmas morning. According to one witness, “It sounded like an automatic weapon.” About 10 minutes later ...
Read More
Hallway camera in a school providing a safe and secure learning environment, How to optimize school safety for COVID-19
Blog
3 Simple Practices to Optimize School Safety During Covid-19
Maximizing safety for students and employees If you’re anything like me, keeping your family safe is your number one priority. During the Covid-19 pandemic, this ...
Read More
a puzzle with a misisng piece revealing a dollar as a symbol of business impact analysis
Blog
4 Crucial Things To Know About Business Impact Analysis
Risk is not optional. If you own a business, chances are, you will confront risks at some point. What’s more, as your business grows, potential ...
Read More
sign cautioning people to remain six feet apart at a shopping mall or retail space for COVID-19 precautions
Blog
2 Painless Ways to Transition Your Retail Business to Touchless Technology
Why your business should be transitioning to touchless tech right now As a business owner in the retail industry, adjusting to the Covid-19 pandemic is ...
Read More
Family and friends enjoying a carefree holiday meal because they know to destress during the holidays
Blog
3 Overlooked Tips to Destress During the Holidays
Bring home holiday gifts without the baggage It’s that time of the year. Some would say the most wonderful time. But for others, the lights ...
Read More
Blog
Top 5 Problems Facing the Retail Industry
And the best ways to solve them We’ve all heard the Black Friday stories of fist fights breaking out in aisles of the local big-box ...
Read More
family playing outside while traveling for the holidays
Blog
Holiday Safety Tips
3 practical ways to stay safe in 2020 We’ve all heard humorous holiday tales. They make for great entertainment around the table during a turkey ...
Read More
police prepare for election day civil unrest as a political protest moves through a downtown area during a moment of civil unres
Blog
Election Day: Planning for Civil Unrest
4 Guaranteed Ways to Prepare Your Business The 2020 presidential election is approaching and the possibility of election day civil unrest is very real, according ...
Read More
Lighthouse on a lonely dirt road preventing the threat of shipwrecks
Blog
The Transformational Power of Threat Assessments
Getting Started Threat is real; an opportunistic adversary waiting to strike.  Cyber crime is one of the most insidious threats facing businesses. As reported here, ...
Read More
small business team smiling after sucessfully navigating a crisis using their crisis management plan
Blog
3 Practical Strategies to Protect Your Small Business During Covid-19
October 15, 2020 / Justin Hayes Ensure the Future of Your Company Small to medium-sized enterprises (SMEs) comprise a massive portion of American industry. In ...
Read More
overhead view of business people working on a crisis management plan outside
Blog
The Anatomy of a Crisis Management Plan
4 key strategies to protect your business against risk By Justin Hayes No executive expects a crisis to strike. But every day organizations fall prey ...
Read More
Podcast
Podcast | Risk Takers Series #9. Joe Sheram – The Turnaround Guru
Brent sits down with corporate turnaround expert Joe Sheram to discuss financial risk, corporate theft, the importance of cash, and some of the biggest challenges ...
Read More
Podcast
Podcast | Risk Takers Series #08. The State of Security – SPECIAL EPISODE
2020 has been a year full of change. In this week's special episode Brent sits down with Vice Presidents Bryan Taylor, Josh Noland and Max ...
Read More
Business COntinuity Plan Illustration
Blog
What is Business Continuity?
Before completely rewriting your Business Continuity Plan, it helps to understand the fundamentals of business continuity. I put together the following FAQ to give you ...
Read More
Podcast
Podcast | Risk Takers Series #07 Jack Barsky – Former KGB Spy
As part of our on going conversation around corporate espionage, we decided to sit down with a real KGB spy for some insider knowledge. In ...
Read More
Podcast
Podcast | Risk Takers Series #06. Human Trafficking with Bazzel Baz
Human trafficking touches nearly every city, county, state and locality in America. Yet law enforcement remains critically under prepared to handle this insidious business. Bazzel ...
Read More
Podcast
Podcast | Risk Takers Series #05 Corporate Counterespionage
Its not always the stuff of cold war spy novels but corporate or economic espionage continues to affect businesses all over the world both large ...
Read More
Podcast
Podcast | Risk Takers Series #04 Brad Orsini – Community-based Security
Visiting our places of worship shouldn't be dangerous. Unfortunately, faith-based organizations are facing the difficult challenge of how to protect their congregations from religion-motivated violence, ...
Read More
Podcast
Podcast | Risk Takers Series #3 Surveillance Detection Routes (SDR)
Have you ever had a gut feeling you were being followed? You might not be so crazy after all. It's a frightening thought. You've spent ...
Read More
Blog
How to Prepare for Economic Risk: Best Strategies for Building Resiliency
Preparing for Economic Risk How to position your business for economic risk If there is one aspect of business that is certain, it's uncertainty. It ...
Read More
Podcast
Podcast | Risk Takers Series #2 Terry Fisher — Electronic Countermeasures
Have you ever stopped to ask yourself what it is about your business that is truly valuable? When you really think about it, any business ...
Read More
Blog
The Risk Takers Podcast Series Launches Today!
Chesley Brown Launches the Risk Takers Podcast Series Security Risk Management experts Chesley Brown Companies today announced the launch of "The Risk Takers Podcast Series" ...
Read More
Podcast
Podcast | Risk Takers Series #1 The Aldrich Ames Espionage Case
Dell Spry, a former FBI investigator and counterespionage expert, sits down to discuss the biggest case of insider theft in U.S. History: The Aldrich Ames ...
Read More
hand stopping dominos from falling, represent a crisis being prevents or stopped
Blog
10 Steps for Building a Crisis Management Communication Strategy
Small changes have a big impact. As a public health crisis of worldwide proportions comes into focus, it is imperative for individuals, organizations, and nations ...
Read More
Blog
7 Tips the Pros Won’t Tell You About Budgeting For Risk
Every business must create its own process for identifying, testing, and budgeting for risk. We studied the data and talked to several industry-leading CSOs to ...
Read More
Two people riding a moving sidewalk into a bright white void to represent transformation
Blog
The Future of Work
The Future of Work: Protecting Trade Secrets Written by: Dell Spry Many businesses, both large and small, are desperately seeking ways to keep their companies ...
Read More
Graphic of two people Looking at charts and graphs representing a risk assessment
Blog
Managing Risk During a Pandemic
5 Tips for Conducting Better Risk Assessments for a Pandemic In earlier sections, we discussed the need for a risk-based approach and outlined 6 New ...
Read More
6 new business risks crom Coronavirus
Blog
6 New Risks for Businesses post COVID-19
Coronavirus: 6 New Business Risks Your risk management strategy can and should play an important role in managing your business’s response to the coronavirus outbreak. ...
Read More
Crisis Management Process Framework diagram
Blog
5 Tips for Creating Better Crisis Management Plans
Like a lot of people, you may be wondering what comes next for your business or organization following the Coronavirus outbreak (or any other crisis ...
Read More
Blog
FREE DOWNLOAD Securing a New World: Security, COVID-19, and Boots on the Ground
SECURING A NEW WORLD Thank you for your interest In this free report we have outlined the most effective strategies for protecting your home, school, ...
Read More
Blog
When it Comes to Corporate Espionage, Harvard’s Dr. Lieber is Just the Tip of the Iceberg
When it Comes to Espionage Harvard's Dr. Lieber is Just the Tip of the Iceberg From Chesley Brown International By Dell Spry Renowned Harvard Professor ...
Read More
Blog
Chesley Brown Launches Initiative to Fight Human Trafficking
Chesley Brown Launches New Initiative to Fight Human Trafficking From The Chesley Brown Group Risk Management Chesley Brown, the security management experts, announced today a ...
Read More
Blog
Spotlight: Bryan Taylor Promoted to Vice President
Chesley Brown Spotlight: Bryan Taylor Promoted to Associate Vice President From Chesley Brown International Employee Spotlight Chesley Brown is excited to introduce our newest Associate ...
Read More
Blog
Spotlight: Christian Kalinski Promoted to Senior Director of Security
Chesley Brown Spotlight: Christian Kalinski Promoted to Senior Director of Security From Chesley Brown International Employee Spotlight We’re always looking to spotlight the amazing work ...
Read More
Blog
An Open Letter on 9/11
An Open Letter on Sep 11th from Managing Director Dell Spry Shared by Chesley Brown International By: Dell Spry They died that day. They woke ...
Read More
Blog
Chesley Brown Announces Counterespionage Unit
Chesley Brown Announces New Special Operations Unit to Combat the Global Rise in Corporate Espionage From Chesley Brown International Risk Management PROTECT YOUR COMPETITIVE ADVANTAGE ...
Read More
Blog
Account Protection with Password Manager
Account Protection with a Password Manager What good is a password if anyone can read it? From Chesley Brown International Risk Management Password managers are ...
Read More
Blog
Chesley Brown Announces Addition to Senior Team
Dell Spry Joins Chesley Brown Team To support the ongoing growth and demand Chesley Brown is pleased to announce Marvin O. “Dell” Spry has joined ...
Read More
Happy kids with rucksacks walking leaving school
Blog
Federal Commission on School Safety Releases Comprehensive Report
  Federal Commission on School Safety Comprehensive Report Released From Chesley Brown International Risk Management President’s Federal Commission on School Safety Releases Comprehensive Report After ...
Read More
Blog
Fighting Terrorism with Strong Private Sector Relationships
Fighting Terrorism with Strong Private Sector Relationships From Chesley Brown International Risk Management "Threat mitigation is a team effort; it’s this relationship and collaboration which ...
Read More
face recognition, automatic face recognition biometric identification; biometric authentication; identity verification
Blog
Facial Recognition: the First Catch
Facial Recognition Makes its Grand Entry The new technology, deployed in airports across the country, makes its first catch. From Chesley Brown International Risk Management ...
Read More
hands on a keyboard as if hacking into something
Blog
Are Employees an Unintentional Security Risk for Cyber Attacks?
Are Your Employees an Unintentional Security Risk for Cyber Attacks? In these times when malware is prevalent and easily disguised as email attachments or seemingly ...
Read More
Blog
DHS and Canada Team up for First Responders
DHS and Canada Team Up to Develop Resources for First Responders From Chesley Brown International Risk Management Artificial Intelligence Meets Boots on the Ground to ...
Read More
Protecting Digital Data
Blog
Supreme Court Decision Regarding the Privacy of Digital Data
Supreme Court Decision Personal Rights and the Expectation of Privacy in the Digital Age From Chesley Brown International Risk Management In Major Privacy Case, Court ...
Read More
Blog
The Evolution of School Security
Special E-Brief June 2018 In the current climate of school shootings, we have anguished over the potentials that may follow the ongoing rise in active ...
Read More
Blog
Threats Our Kids Face Online
Protecting Our Children Against Online Threats Teaching our kids to be wary onlineChesley Brown E-Brief May 2018 From Chesley Brown International Risk Management Cyber bullying ...
Read More
risk management
Blog
The Property Manager’s Guide to Risk Management
10 Steps for Developing An Emergency Response Plan Bomb Threats and Suspicious Packages From Chesley Brown International Risk Management The recent bombing incidents in and ...
Read More
first responder on the scene of a disaster
News
10 Steps for Developing An Emergency Response Plan
Bomb Threats and Suspicious Packages By: Chesley Brown International The recent bombing incidents in and around Austin, Texas serve as an unfortunate reminder that those ...
Read More
Uncategorized
Locals to Obama: Heed military leaders
by Jon Gillooly [email protected] MARIETTA — While President Obama addressed the nation Wednesday evening on his plan for the future of U.S. troops in Afghanistan, ...
Read More
airport security
Uncategorized
Blending Security With IT to Strengthen Airport Security
Since 9/11, travel through the world’s busiest airports has changed dramatically. Now more than ever, extensive security investments protect these dynamic environments from threats of ...
Read More
Uncategorized
The Emerging Threat of Drones to Nuclear Sites
Throughout the agricultural fields that dominate North Dakota,150 Minuteman III nuclear intercontinental ballistic missiles are encased in silos in the ground.  Each silo contains one ...
Read More
Uncategorized
Addressing The Threat of Workplace Violence
As the national conversation regarding violence in the workplace suggests a heightened awareness stemming from increased media coverage, recent studies show there may be statistical ...
Read More
Uncategorized
Chesley Brown E Brief Early October 2016
Attackers used an army of hijacked security cameras and video recorders to launch several massive internet attacks last week, prompting fresh concern about the vulnerability ...
Read More
Uncategorized
FBI Warning Comes After Florida Voting System Hack Attempt
Officials with the Federal Bureau of Investigation held a secret conference call with all 67 county supervisors of elections in Florida on Friday afternoon to ...
Read More
Uncategorized
School Security Back in Focus
The recent school shooting at Townville Elementary School in South Carolina that left two students and a teacher wounded hearkened back memories of that fateful ...
Read More
Uncategorized
Hackers Report Apple Weakened Backup Security With iOS 10
Professional iPhone hackers say that Apple has dropped the ball on password security with its latest iPhone operating system, making the task of cracking the ...
Read More
Uncategorized
Hackers Infect CCTV Systems in Massive Internet Attack
Attackers used an army of hijacked security cameras and video recorders to launch several massive internet attacks last week, prompting fresh concern about the vulnerability ...
Read More
Uncategorized
Private Security’s Roll in Combating Terrorism Emphasized by DHS Chief
On the day after the 15th anniversary of the 9/11 terror attacks, U.S. Department of Homeland Security Secretary Jeh Johnson addressed attendees at the annual ...
Read More
Uncategorized
Social Media, The New Cyber Weapon Of Choice
Cyber criminals run rampant across every social network today. We often see headlines about social marketing fails and celebrity account hacks, but they’re just the ...
Read More
Uncategorized
The Shift to Home Grown Terror
Fifteen years after the September 11 attacks, US anti-terror officials say the country is hardened against such well-developed plots but remains as vulnerable as ever ...
Read More
Uncategorized
Protecting the Lone Worker
Isolated or lone workers have always been particularly vulnerable to the criminal element as well as a varying degree of hazards depending on the nature ...
Read More
Uncategorized
Hackers Targeting Phones for Mobile Bank Heists
Cyberthieves have a new way to hack into consumer bank accounts, through their mobile phones. Malicious software programs with names like Acecard and GM Bot ...
Read More
Uncategorized
Video Surveillance a Rapidly Growing Aspect of Urban Landscape
The deployment of urban video surveillance is the fastest growing segment of the video world. The expansion in large metropolises to smaller burgs is unrelenting. ...
Read More
Uncategorized
Making the Case for Gunshot Detection in Schools
As schools remain a primary target for attacks, it is no surprise that protecting students, teachers, and safe learning spaces has become a high priority ...
Read More
Uncategorized
Laptop Used to Steal Over 100 Vehicles
Two men were arrested and accused of using a laptop computer and pirated software to steal more than 100 vehicles. It is believed the pair ...
Read More
Uncategorized
Glaring Hole Found in EMV Card Chip Security
Computer researchers have found yet another flaw in the upgrade to the chip-based credit cards in the United States. The chip on these credit cards ...
Read More
Uncategorized
Hospital Active Shooter – The “Cease to Exist” Plan
When Michael D’Angelo, CPP, was tasked with creating an active shooter response plan for six Miami-area hospitals, he turned to the U.S. Department of Homeland ...
Read More
Uncategorized
The Dangers of “Free” Wi-Fi
Avast Software, maker of mobile and PC security programs, revealed results of a Wi-Fi hack experiment conducted at various locations around the Republican National Convention ...
Read More
Uncategorized
Auto Makers Join Forces to Fight Hackers
In an unusual announcement, 15 carmakers, comprising 98 percent of the vehicles now on the road, said they've joined forces in the Automotive Information Sharing ...
Read More
Uncategorized
Arrests Made As Police Crackdown on On-Line Threats
State and Federal authorities are ramping up scrutiny of on-line threats.  A number of people have been arrested in recent weeks for online threats against ...
Read More
Uncategorized
PIN’s and Passcodes Able to be Stolen from Wearable Tech
Researchers from Binghamton University and the Stevens Institute of Technology have developed an algorithm that is able guess PINs and passwords with stunning accuracy based ...
Read More
Uncategorized
Reasoning Behind Using Explosives to End Standoff
It was a little after 1 a.m. on July 10th when Dallas Police Chief David Brown told Mayor Mike Rawlings that he planned to kill ...
Read More
Uncategorized
Report Shows FDIC Hid Computer Hack from Investigators
The House of Representative's Science, Space and Technology Committee recently released an investigative report on the FDIC. The report presents the FDIC's bank regulators as ...
Read More
Uncategorized
Pokémon Go Can be a Threat to Users
In a very short amount of time, a popular new game has created a list of new problems and even some opportunities. Pokémon GO uses ...
Read More
Uncategorized
The Costly Defense Against Drones
Past three heavy, locked doors, in a cavernous, sterile room in a nondescript manufacturing plant in Dublin, workers are assembling a secret weapon for the ...
Read More
Uncategorized
Defending the Grid from Active Shooters
The facts are simple, straightforward, well-known and unsettling. Gunfire and power utility substations are not friends. There are people in America with the means and ...
Read More
Uncategorized
Commercial Drone Use Gets Green Light
After years of hype and speculation about unmanned aerial vehicles doing everything from delivering packages to gathering video for news outlets, federal aviation regulators recently ...
Read More
Uncategorized
New Threat Bulletin Released by DHS
Following the tragic terrorist attack on the Pulse gay nightclub in Orlando, Florida on 12 June, the US Department of Homeland Security (DHS) has issued ...
Read More
Uncategorized
TSA Expecting Covert Security Tests This Summer
The Government Accountability Office (GAO) has mixed feelings about the current performance of the Transportation Security Administration (TSA) and its screening practices at airports nationwide. ...
Read More
Uncategorized
Judge Intervenes as City Attempts to Reveal FBI’s Hidden Surveillance Cameras
A federal judge has issued a temporary restraining order preventing Seattle City Light from disclosing the location of FBI cameras and other surveillance equipment hidden ...
Read More
Uncategorized
Security Tightens in Wake of Shooting
In the wake of the recent terror attack at Pulse Nightclub, security measures have been amplified at theme parks and tourism experts are expecting a ...
Read More
Uncategorized
Ransomware Moves to Mobile
Imagine opening your phone only to find a message from the FBI accusing you of illegal activity. After frantically swiping and clicking back every button ...
Read More
Uncategorized
Driver’s License to Include Facial Recognition Feature in Illinois
Illinois Secretary of State Jesse White announced recently that his office will begin upgrading security features to driver's licenses and identification cards, a step toward ...
Read More
Uncategorized
New Technology Shows 65% Reduction in Police Response Time
Battelle has announced that it has successfully demonstrated first responders can reduce the time required to end an active shooting by as much as 65 ...
Read More
Uncategorized
Is Outdated Software Putting Your Business At Risk?
When people used office workstations managed by the IT department it was relatively easy to manage security because there was a defined perimeter. In the ...
Read More
Uncategorized
Federal Background Checks Expanding to Social Media
The Federal Government is joining the already long list of private companies whom have begun to include social media checks as part of their background ...
Read More
Uncategorized
Drone Detection System Debuts
According to a report published in January by ABI Research, consumer shipments of consumer unmanned aerial vehicles, more commonly referred to as drones, are expected ...
Read More
Uncategorized
Passenger Removal From Planes Overstated
Examples of passengers being removed from flights have gained increasing attention since the Sept. 11, 2001, terrorist attacks, which began with the hijacking of four ...
Read More
Uncategorized
Protecting Computers in Schools
Nearly every school district across the United States is requiring laptop computers, tablets, and other mobile devices to become an integral part of the learning ...
Read More
Uncategorized
E-Mail Privacy Loophole Closing
For the first time, your email may soon get a layer of protection from government scrutiny. The House of Representatives recently passed the Email Privacy ...
Read More
Uncategorized
Temporary Employees: Not a Temporary Threat
The job market is looking up with unemployment rates lower than they have been since the Great Recession of 2008. 77 percent of human resources ...
Read More
Uncategorized
The New Added Benefits of Remote Monitoring
Let’s face it: Security is necessary and is no longer an option. Remote managed video not only provides this necessity, it also provides a platform ...
Read More
Uncategorized
Hardening Soft Targets
A post 9/11 world saw the further reinforcement of already hard targets, such as government buildings and military installations. Soft targets, such as schools, churches, ...
Read More
Uncategorized
Landmark Ruling in Cybersecurity Enforcement
Late last year, for the first time, a federal appeals court endorsed the FTC’s ownership or cybersecurity enforcement in the private sector. The ruling said ...
Read More
Uncategorized
The Safety Act and Stadium Safety
An astute security officer, performing a patdown on a ticketed fan at a sports complex, discovered that the fan was wearing a suicide vest. The ...
Read More
Uncategorized
Encryption Can Leave Law Enforcement Blind
The idea of requiring companies to provide decryption keys for data to authorized Law Enforcement agencies is not new; it first came about in the ...
Read More
Uncategorized
Police Departments Face Increasing Threat From Ransomware
Ransomware is becoming a more popular form of cybercrime, particularly at police departments. Ransomware is a malicious type of malware that encrypts a computer's files ...
Read More
Uncategorized
Strategies to Help Mitigate Workplace Violence
More than 1.7 million employees are victims of workplace assaults every year, but the vast majority of such incidents remain significantly underreported. As an indication ...
Read More
Uncategorized
GM Looks to Hackers to Uncover Cybersecurity Flaws
General Motors is looking for hackers to help strengthen car firewalls, launching a "coordinated disclosure" program to identify gaps in vehicles computer systems. Similar to ...
Read More
Uncategorized
Twitter Trust & Safety Council Raises User Trust
The micro-blogging company Twitter serves around 320 million users, ranging from content creators to activists, and from end-users looking to stay informed to professionals sharing ...
Read More
Uncategorized
Man’s Best Friend Could Help Cut Wait Time at Airports
Long lines at the Atlanta airport have become a more urgent issue over the last year, with wait times at the world's busiest airport reaching ...
Read More
Uncategorized
New Body Scanner Cuts Down Contraband
In 2010, the Merced County Sheriff's Department investigated how inmates were smuggling contraband into the jail and found their answer literally inside the inmates.  X-ray ...
Read More
Uncategorized
The Dangerous Lack of Security Among Internet of Things
As the Internet of things (IoT) has grown, so has the debate about security around it. Much of the focus has been around the fact ...
Read More
Uncategorized
Netflix Users Targeted by Hackers
Netflix has emerged in recent years as one of the most popular sources for online entertainment, and it is now also a popular target for ...
Read More
Uncategorized
Concerns Over The Release of Convicted Terrorists
Since 2014, more than 75 people have been arrested in the US on charges related to Islamic State, a terrorist group also known as ISIS ...
Read More
Uncategorized
Will the Future of Digital Security be Password Free?
Passwords are a notorious bane of digital life. Users forget them, make them easy to guess, or rely on the same one to gain access ...
Read More
Uncategorized
Customs and Border Protection Deploys New Technology
U.S. Customs and Border Protection recently began using facial recognition technology at John F. Kennedy International Airport to verify that travelers match their passport photos. ...
Read More
Uncategorized
Theft by Bank Tellers a Growing Concern
Security experts are growing concerned over the increase in internal theft from bank tellers. While sophisticated hackers still pose a crucial threat, bank tellers with ...
Read More
Uncategorized
Glaring Security Hole Found in Conference Tablets
Many companies and government agencies, including the White House, use a conference calling system that could possibly be tapped by hackers. Cybersecurity experts recently revealed ...
Read More
Uncategorized
Mass Shooting Thwarted by FBI
FBI agents were able to derail plans for a mass shooting at a Masonic Temple. A 23-year-old man is being charged with possession of machine ...
Read More
Uncategorized
New Scoring System Helps Police Estimate Threats
While officers raced to a recent 911 call in Fresno, California about a man threatening his ex-girlfriend, a police operator in headquarters consulted software that ...
Read More
Uncategorized
BART Slaying Exposes Decoy Security Cameras
Bay Area Rapid Transit police investigating the recent killing of a passenger on a train in Oakland have no onboard video of the crime, even ...
Read More
Uncategorized
Security at the Forefront in Smart Home Tech
This year’s International Consumer Electronics Show (CES) in Las Vegas is abuzz with a variety of new smart home gadgets.  From appliances and entertainment devices ...
Read More
Uncategorized
Panasonic to Partner with Sun Trust Park
The Atlanta Braves have chosen a partner for SunTrust Park, their new 41,000 seat ballpark and The Battery Atlanta, their adjacent mixed-use community. Panasonic Enterprise ...
Read More
Uncategorized
The Balance of Biometrics and Privacy
Human beings are complex. Each person has a story and innumerable aspects and layers that come together to form a personality. The same can be ...
Read More
Uncategorized
Future Trends in Video Surveillance
It has been said that video surveillance is responsible for driving growth in the security industry as a whole and it is easy to see ...
Read More
Uncategorized
The ‘Internet of Things’ Changing Physical Security
There are serious security concerns about the information exchanged when connecting mobile devices, networks, web based applications and ‘smart networks’ together and creating new access ...
Read More
Uncategorized
Majority of Law Enforcement Approve of Body Cameras
Researchers from Florida Atlantic University and collaborators, recently measured law enforcement leadership attitudes toward police wearing body cameras. The first-of-its-kind study is published in the ...
Read More
Uncategorized
The Challenges of Securing Houses of Worship
Recent events have again turned the focus on “soft targets,” and houses of worship certainly fall into that category. Buildings that are home to religious ...
Read More
Uncategorized
Off-Site Video Storage Demand Soars
With the proliferation of body-worn video surveillance equipment within law enforcement agencies in recent years, a new report from market research firm IHS forecasts that ...
Read More
Uncategorized
Home Surveillance Cameras Help Catch Thieves Stealing Packages
As on-line shopping soars this time of year, so does the number of packages left unattended on porches. Unfortunately, there is not much standing in ...
Read More
Uncategorized
Is Support for ISIS Growing in the U.S.?
According to a report by George Washington University's Program on Extremism, support for ISIS in America has reached an unprecedented level with several thousand U.S.-based ...
Read More
Uncategorized
Vigilance Urged During Holiday Shopping Season
Following the attacks in Paris, France, on November 13, many Americans can’t help but wonder if the U.S. is next. ISIS has waged war on ...
Read More
Uncategorized
How Imaging Technology is Enhancing Security
The prominence of new and emerging imaging technologies affects many areas of an organization's operation, including physical security through video surveillance. Physical security is an ...
Read More
Uncategorized
Attacks Bring Reassessment of Travel Policies
Companies are boosting security for staff traveling in and around Europe after the terror attacks in Paris. The Department of Defense has banned U.S. troops ...
Read More
Uncategorized
The Effectiveness of Airport Security Questioned
The effectiveness of security at foreign airports and in the U.S. has come into serious question in the wake of the deadly bombing of a ...
Read More
Uncategorized
Defending Against a Terrorist Attack
Terrorist attacks across the globe have changed the world and life as we know it. It refines views on national security both at home and ...
Read More
Uncategorized
More Security Demanded After Attacks
People in the Oak Lawn area of Dallas are demanding that the city and local business owners help increase security in the area. A rally ...
Read More
Uncategorized
Preparing for an Unconventional Data Breach
The fact that hackers are no longer motivated solely by financial gain should not come as a surprise to anyone. Today, all data shared online ...
Read More
Uncategorized
Going Green not as Important as Going Safe
A recent survey of nearly 500 buildings across seven major cities found that building operators prioritize the safety and security of their facilities over sustainability ...
Read More
Uncategorized
Cyber Security at Home, Are You Doing Enough
A new study conducted by the National Cyber Security Alliance found mixed results from the 1,400 American adults surveyed. The study found 75% of parents ...
Read More
Uncategorized
What Could be Hidden on Your Boarding Pass
According to a recent report, the barcode on your boarding pass can contain a great deal of personal information. The standards for the boarding pass ...
Read More
Uncategorized
Utah Exploring Use of Drones to Help Emergency First Responders
Much has been made about drones being used illegally and dangerously. But in Salt Lake City Utah, the hope is drones can help save lives ...
Read More
Uncategorized
Benefits of a Security Camera Registration Program
The New Jersey Township police department has recently launched a program asking area residents and business owners to join a voluntary security camera registration program ...
Read More
Uncategorized
ISIS Attempting to Hack U.S. Power Grid
It has been reported The Islamic State is trying to hack American electrical power companies.  U.S. law enforcement officials revealed the hack attempts last week ...
Read More
Uncategorized
University of South Florida Uses CCTV to Enhance Campus Safety
According to a recent report, hundreds of cameras have been installed outside of dorms to increase student safety at the University of South Florida.  Tailgating ...
Read More
Uncategorized
Balancing the Expectation of Privacy and Public Information
Law enforcement and public safety agencies have been tapping into social media platforms for several years to help them manage critical communications, data analytics and ...
Read More
Uncategorized
Mass Murder Plot Thwarted in California High School
Just days after a mass shooting on a community college campus in Oregon, law enforcement officials said four Northern California high school students planned to ...
Read More
Uncategorized
FAA Officials Fear Surge in Drone Sales for the Holiday
The Federal Aviation Administration is preparing for a surge of drone sales this holiday season. Rich Swayze, FAA assistant administrator-policy, international affairs and environment recently ...
Read More
Uncategorized
Additional Employee Screening at Atlanta's Hartsfield-Jackson Airport
Hartsfield-Jackson International Airport opened its new employee screening checkpoint to boost security checks of workers, in response to a gun-running scheme involving a baggage handler ...
Read More
Uncategorized
Lifesaving Potential of Indoor Gunshot Detection
For years, security practitioners and equipment providers alike have sought to develop technology that can provide building occupants and first responders with accurate and timely ...
Read More
Uncategorized
“Hack Back” App Presents Legal Dilemma
A password manager called LogMeOnce now gives you the option to take a picture of whoever is trying to access the accounts that you've registered ...
Read More
Uncategorized
New Technique May Help to Identify Potential School Shooters
Researchers from Ben-Gurion University have developed a personality profiling technique which automates the identification of potential school shooters by analyzing personality traits that appear in ...
Read More
Uncategorized
Home Surveillance and Social Media Helps Arrest Suspects
A home video surveillance system helped Dade County, GA police arrest two home intruders who stole several items from a local home. Surveillance footage shows ...
Read More
Uncategorized
FTC Taking Action Against Hacked Companies
Recently, the third U.S. Federal circuit court ruled that the Federal Trade Commission (FTC) has the power to take action against organizations that employ poor ...
Read More
Uncategorized
Police Urge Businesses to Upgrade to HD CCTV
Fort Worth Texas police departments are urging business owners to invest in high-definition surveillance cameras, saying the technology could greatly help curb crime.  Police said ...
Read More
Uncategorized
Alarm Ordinance Under Fire After Delayed Police Response
The Spokane, Washington false alarm ordinance has come under scrutiny following recent crime events that were met with delayed police response because the alarm owner ...
Read More
Uncategorized
License Plate Reading CCTV Comes of Age
With the evolution of video surveillance technology in recent years and the vast amount of data that organizations are collecting and storing, there has also ...
Read More
Uncategorized
Automaker Successfully Hid Serious Security Flaw
Volkswagen has spent two years suppressing expert research in the courts that reveals that thousands of cars from a host of manufacturers have spent years ...
Read More
Uncategorized
Does Facebook Own the Rights to Your Face?
Facebook's handling of your headshot is now the subject of class action lawsuits that pose the question: When someone turns your face into data, are ...
Read More
Uncategorized
Spotting the Signs of Emerging Aggression
Less than two weeks after 59-year-old John Russel Houser shot and killed two people and wounded nine others before turning the gun on himself at ...
Read More
Uncategorized
Emerging Trends in Access Control
Recent advancements in technology mean that access control systems and their associated devices will be used for purposes beyond traditional security applications. As new and ...
Read More
Uncategorized
Resistance Met as Social-Media Firms Asked to Report Terror Talk
Last month, the Senate Intelligence Committee added language to an annual intelligence-funding reauthorization bill. This change would require online companies such as Google, Facebook, and ...
Read More
Uncategorized
New “Software Only” Biometrics Solution Proves Reliable
Biometric Signature ID has introduced BioSig-ID a new form of online security software that can authentic a user logging into a network with 99.97% accuracy. ...
Read More
Uncategorized
E-Mail Fraud Leads to Billion Dollar Loss
The FBI reported in schemes known as “corporate account takeover” or “business email fraud,” companies have lost more than $1 billion from October 2013 through ...
Read More
Uncategorized
Soaring Cost of Malware Cut by Layered Approach
According to a new report from The Ponemon Institute, some organizations are dealing with nearly 10,000 malware alerts per week. The report stated only a ...
Read More
Uncategorized
Cyberattacks Likely to Continue According to NSA Chief and GAO
Navy Adm. Mike Rogers, director of the National Security Agency (NSA) and head of the U.S. military's Cyber Command, warned that the United States could ...
Read More
Uncategorized
“Panic Button” to be Issued to USPS Carriers
Last year, two armed men attacked a U.S. letter carrier in Washington, D.C. He was beaten, bound and robbed. It was one of more than ...
Read More
Uncategorized
OPM Hack Leads Questions on Bio-Metrics Security
The hackers who stole millions of federal personnel files also took 1.1 million fingerprints, a theft that poses an unprecedented danger. This is extremely sensitive ...
Read More
Uncategorized
Video Analytics Continues to Evolve
While first generation video analytics focused on real-time alerts and minimizing false alarms, second generation technology focused on providing forensic tools to search the video ...
Read More
Uncategorized
Report Shows 94% Vulnerability in Android Devices
Security researchers found a security flaw in Debuggerd, the debugging component integrated in Android operating system. The vulnerability is present in all Android versions starting ...
Read More
Uncategorized
Church Shooting Raises Concerns Over Safety
Houses of worship throughout the nation are seeking to upgrade security following an incident in South Carolina when a man opened fire and killed nine ...
Read More
Uncategorized
Air Force Cuts Flights Due to Drone Operator Stress
Although U.S. military and intelligence officials are demanding more drone flights over combat zones, the Air Force is cutting back as operators are experiencing burnout. ...
Read More
Uncategorized
Vigilance Urged During 4th of July Weekend
Federal authorities have warned local law enforcement officials across the country about a heightened concern involving possible terror attacks targeting the 4th of July holiday. ...
Read More
Uncategorized
Campus Safety and Security Continues to Grow
Public safety and security on college campuses around the United States has grown in response to the increase in security threats. From 2005 to 2012, ...
Read More
Uncategorized
Ransomware Gives Hackers an Almost 1,500% ROI
A new report by Trustwave shows some stunning numbers. They looked at how much of an investment a cybercriminal spends and what their profits are.  ...
Read More
Uncategorized
Can This Child’s Toy Open Your Garage?
A security researcher has revealed that a hacked Mattel children’s toy can become a universal garage door opener.  Samy Kamkar, a serial hacker who works ...
Read More
Uncategorized
Beware of Resume Ransomware
A recent report from SANS InfoSec Forums has noted that since May 25th, new CryptoWall 3.0 ransomware attacks have started, using both malicious spam and ...
Read More
Uncategorized
New Security Drone Debuts
Japanese security firm Secom has unveiled a new drone that will automatically launch when it detects an intruder, and follow the individual while sending HD ...
Read More
Uncategorized
CCTV Video Helps With Serial Burglar Arrests in 3 States
Video surveillance is being credited for helping several police departments make arrests of serial burglars. In Bountiful, Utah, authorities arrested three men who have been ...
Read More
Uncategorized
Thieves Pinpoint Home Security Weaknesses With Drones
Burglars in the United Kingdom are reportedly using drones over private homes to take surveillance images to identify home security weaknesses.  Authorities believe larger homes ...
Read More
Uncategorized
The Benefits of Community/Law Enforcement Partnerships
In the aftermath of the recent biker brawl and shooting outside a Twin Peaks restaurant in Waco, Texas, much of the attention has focused on ...
Read More
Uncategorized
Concern Raised over Chinese Led Cyber Attack on U.S. Firms
The United States voiced concern over a report that China manipulated international Internet traffic intended for a major Chinese Web service company and used it ...
Read More
Uncategorized
Using Smart Thermal Technology to Protect Power Grid
Electrical substations face many unique security challenges, ranging from theft, vandalism and safety concerns to complying with increasingly enforced regulations from the National Electrical Reliability ...
Read More
Uncategorized
Bank Accounts Drained as Hackers Target Starbucks App
Thieves are stealing money from people's credit cards, bank and PayPal accounts by first tapping into their Starbucks mobile app.  Starbucks recently acknowledged that criminals ...
Read More
Uncategorized
Video Analytics – From Descriptive to Predictive
Video analytics has had a long progression from conception to the implementation of a reliable product. One company leading the way in making video analytics ...
Read More
Uncategorized
Police Body Camera Hype May be Premature
While high-profile incidents have put the use of body-worn cameras by police in the spotlight, the technology may not be quite ready for full deployment. ...
Read More
Uncategorized
Nepal Earthquake Scams
Frequently after a large scale disaster or attack, many relief organizations reach out asking for help. And just as frequently, criminals are exploiting the disaster ...
Read More
Uncategorized
Is Video Evidence Being Ignored in St. Louis?
St. Louis residents are making claims that the St. Louis Metropolitan Police are deliberately ignoring video taken by their home security cameras that show crimes ...
Read More
Uncategorized
The Importance of Social Media Privacy Settings
We all enjoy keeping up with friends and family on social media, but we have to be mindful of our privacy and security when we ...
Read More
Uncategorized
Some Reserve Officers Short on Training
The widely varying standards for reserve or auxiliary police officers around the country are under scrutiny after a 73-year-old volunteer sheriff's deputy in Oklahoma shot ...
Read More
Uncategorized
Small Businesses Increasingly Impacted by Ransomware
A growing number of small businesses are being affected by ransomware, in which cybercriminals use a malicious code to lock up computer files and demand ...
Read More
Uncategorized
Document Shows Failed Plans For Increased White House Security
Federal planners got together to come up with some creative ways to bolster security at the White House, but all ideas were spurned in favor ...
Read More
Uncategorized
Naturalized U.S. Citizen Accused of Terrorism Plot
Federal officials have indicted 23-year-old Abdirahman Sheik Mohamud of Columbus, Ohio, and accused him of traveling to Syria and returning to the United States with ...
Read More
Uncategorized
New One-Click Ransomware Attack Uses Dropbox
A new ransomware attack that was first spotted in Europe uses a highly-targeted spear phishing attack using Dropbox as a delivery mechanism. It only takes ...
Read More
Uncategorized
User Awareness and the Importance of Cybersecurity
Cyberattacks are increasing in complexity and frequency. There is no question that every person using modern technology is a potential target, as such widely used ...
Read More
Uncategorized
Facial Recognition Technology Tested at Dulles Airport
Facial recognition technology is being tested at Dulles Airport.  The Customs and Border Protection Agency have been testing a new security systems using facial recognition ...
Read More
Uncategorized
Domestic Terrorism Bomb Plot Thwarted
Two women living in Queens have been charged with attempting to build a bomb after a month long undercover investigation. According to a complaint unsealed ...
Read More
Uncategorized
Bomb Investigation at White House Disrupted by Secret Service
On March 4 around 10:30pm, a women approached the southeast entrance of the White House, placed an object she claimed was bomb on the ground, ...
Read More
Uncategorized
Companies Turning to Employee Tracking In Emergencies
Different businesses are purchasing services that use technologies such as GPS and geotracking to track their employees. The demand for employee-tracking services is on the ...
Read More
Uncategorized
Is Hacking Group NSA in Disguise?
A recent report released by Kaspersky Lab says the Equation Group, a set of hackers responsible for at least 500 malware infections in 42 countries, ...
Read More
Uncategorized
Hackers Impersonate IT Staff to Target Employees
Recent research by FireEye finds that today's cyber attackers are increasingly impersonating legitimate IT personnel to target employees. Cyber Attackers are also using such means ...
Read More
Uncategorized
ATM ‘Skimming” Crime on the Rise in Charlotte
According to the U.S. Secret Service, skimming incidents are on the rise in the Charlotte, N.C., metro area. The agency has investigated 11 skimming incidents ...
Read More
Uncategorized
Bank Phishing Attack From Hacked Hotels
A new sophisticated scam targeting peoples debit cards is on the rise. Hackers first break into the phone system of a well-known hotel in their ...
Read More
Uncategorized
Ransomware Hidden in Malicious Ads on Popular Web Sites
Security researchers at venture-backed Invincea have discovered a new Russian ransomware strain they called "Fessleak".  This virus is being transmitted through malicious ads on popular ...
Read More
Uncategorized
Extremists and Social Media: A New Challenge for Law Enforcement
While social media is making recruitment easier for Islamic State (ISIS) and its supporters, U.S. law-enforcement officials say it is also a good way to ...
Read More
Uncategorized
Using Social Media to Enhance Security
More property owners and security teams are turning to social media to get in front of trouble before it starts.  Their reasoning is, if Twitter ...
Read More
Uncategorized
TSA Recovers Record Number of Firearms
According to a recent report from the U.S. Department of Homeland Security, the U.S. Transportation Security Administration (TSA) seized a record 2,212 firearms from carry-on ...
Read More
Uncategorized
Wearable Technology: The New Weak Link in the Cybersecurity Chain
Smart devices are increasingly the new weak link in the cyber kill chain, at least at the reconnaissance level, if not further into the enterprise. ...
Read More
Uncategorized
The New Danger From Drones
The recent incident where a recreational drone mistakenly crashed onto the White House lawn has caught the attention of lawmakers and counterterrorism officials. It also ...
Read More
Uncategorized
Newspapers and Publishers Increasing Security in Wake of Attack
News Corp. is one of many news organizations across the world that have stepped up their security since the terrorist attack at the Paris headquarters ...
Read More
Uncategorized
Europe Facing Homegrown Terror Threats
The military-style attack in Paris has made it obvious that Europe faces a more complex terror threat, one that is an Internet-driven rage against Western ...
Read More
Uncategorized
Park ‘N Fly Joins List of Hacked Businesses
The Atlanta-based offsite airport parking company, Park 'N Fly Inc., announced last week they suffered a security breach involving payment card data processed through its ...
Read More
Uncategorized
Hackers Target Popular Web Sites with Ransomware
Several popular web sites including Huffington Post and Gamezone have recently been the unwilling hosts to “malvertising” that ultimately led to a ransomware infection on ...
Read More
Uncategorized
Holiday Return Fraud Estimated in the Billions
According to the National Retail Federation's (NRF) 2014 Return Fraud Survey, the retail industry will lose an estimated $10.9 billion as the result of return ...
Read More
Uncategorized
Attacks And Threats to Police Prompt Arrests and Heightened Security
Police are increasing security at police stations following the murders of two officers in New York City. Police are also conducting investigations and have made ...
Read More
Uncategorized
Upcoming Trends in Access Control
Jason Ouellette, Tyco Security Products' product line director for access control, was recently interviewed about future trends in access control. Some of the major changes ...
Read More
Uncategorized
2015 Holds Positive Predictions for Security
While the current state of cybersecurity is not good, as evidenced by the recent attacks of retail giants and the Sony Pictures breach, cybersecurity expert ...
Read More
Uncategorized
Major U.S. Companies Targeted by Iranian Hackers
The FBI has recently released a confidential memo cautioning American businesses to watch out for a coordinated Iranian cyberattack targeting critical infrastructure companies. The memo ...
Read More
Uncategorized
Holiday Safety Tips
With the holiday fast approaching, please take a moment to review a few simple safety tips to help keep everyone safe this holiday season. Decorate ...
Read More
Uncategorized
U.S. Sees North Korea in Sony Hack
U.S. investigators examining the recent cyberattack on Sony Pictures Entertainment are closer to concluding that the North Korean government was responsible for the incident. Experts ...
Read More
Uncategorized
CIA Torture Report May Bolster ISIS Propaganda Efforts
House Intelligence Committee Chairman Mike Rogers warns that terrorist organizations, such as the Islamic State, could use the controversial Senate report on the CIA's "enhanced" ...
Read More
Uncategorized
Keeping Home Package Deliveries Safe This Christmas
More and more, Americans are avoiding the hustle-and-bustle of shopping malls and taking their purchases on-line for the holiday season. On-line sales are projected to ...
Read More
Uncategorized
Increasing Number of Lone-Wolf Terrorist Attacks Target Police
Recent research by Indiana State University terrorism expert Mark Hamm indicates that the number of lone wolf terrorist attacks in the U.S. is not increasing, ...
Read More
Uncategorized
Apple Pay Expected to be Attacked in 2015
In the coming year, Apple Pay will be a target of cyber criminals according to predictions from Kaspersky Labs. Researcher Patrick Nielsen says Apple's increasing ...
Read More
Uncategorized
Retailers Increasing Data Security
According to new data from the Identity Theft Resource Center, there have been just under 700 major data breaches reported; a 25 percent increase from ...
Read More
Uncategorized
Ferguson Grand Jury Update
Chesley Brown has been closely monitoring the situation in the pending grand jury decision in Ferguson, MO in the Michael Brown case.  Some sources report ...
Read More
Uncategorized
State of Emergency Declared Ahead of Grand Jury Decision
Missouri Governor Jay Nixon has declared a State of Emergency ahead of the expected grand jury decision in the Michael Brown case. Nixon cited the ...
Read More
Uncategorized
The Need for Data Security Highlighted Amid Recent Breach
The Postal Service has recently announced a cyber-security intrusion into some of their information systems.  In a statement, they said they began investigating the incident ...
Read More
Uncategorized
Cost of Retail Crime in U.S. Spikes
Recently released results of the Global Retail Theft Barometer shows retailers worldwide lost $128 billion last year due to theft, which includes shoplifting, fraud by ...
Read More
Uncategorized
Anxiously Awaiting a Decision in Ferguson
With the grand jury decision pending in the Michael Brown case in Ferguson, MO., many police departments across the country have been put on notice ...
Read More
Uncategorized
The Future of Security Includes Biometrics
While not without controversy, biometrics is the way of the future. Attempts to establish nationwide standards are ongoing, and public outcry always ensues when Facebook ...
Read More
Uncategorized
Halloween Safety Tips
Halloween can be a fun time for children of all ages, who can dress up in costumes, enjoy parties, and eat tasty treats. But Halloween ...
Read More
Uncategorized
KeyMe App Allows Keys by Mail From Only a Photograph
A new app poses a serious security concern for all physical keys, including some automotive keys.  KeyMe was designed to let anyone photograph their keys ...
Read More
Uncategorized
ACTIVE SHOOTER MOVIE ALERT – "MALL"
On October 17th, a film titled "Mall" is slated to open in theaters across the country.  It is a limited release and some reports indicate ...
Read More
Uncategorized
Threat of “Homegrown” Jihadist Attacks on the Decline
Federal officials are still concerned about the threat from homegrown jihadists, but a new report from the Bipartisan Policy Center suggests that the United States ...
Read More
Uncategorized
Security at PG&E Lacking a Year and a Half After Attack
Eighteen months after a major electricity substation in San Jose, Calif., was attacked by a gunman in what some worry was a dry run for ...
Read More
Uncategorized
Vulnerabilities of Air-Traffic Control Scrutinized After Fire
A telecommunications contractor started a fire at the Chicago En Route Center in Aurora, Ill., on Sept. 26 and attempted suicide, resulting in major disruptions ...
Read More
Uncategorized
Incidents of Active Shooters on the Rise
The number of active shooter incidents has more than doubled over the past seven years compared to the previous seven-year period, according to a new ...
Read More
Uncategorized
ISIS Collecting $3 Million Per Day Through Theft, Extortion and Smuggling
One major reason the U.S. is seeking to degrade and destroy the Islamic State (IS) is the unprecedented financial resources the group has at its ...
Read More
Uncategorized
Don’t Fall For These New Facebook Scams
Two new scams are making the rounds on Facebook, one claiming you can get a free iPhone6, the other promising to show a graphic video. ...
Read More
Uncategorized
New Technology May Help Stop ATM Skimming Fraud
The ActivEdge card reader requires customers to insert their ATM card into the machine via the long edge instead of the short edge, thwarting potential ...
Read More
Uncategorized
Home Depot Breach Accelerates Card Security
Banks and credit unions are starting to proactively reissue credit cards and debit cards to customers whose accounts may have been exposed to a data ...
Read More
News
Nunc tempor luctus placerat
Maecenas dui mauris, pretium eget cursus ut, gravida elementum eros. Morbi tincidunt accumsan urna, eget blandit lectus aliquet a. Mauris vel nisi ac ligula pretium ...
Read More
Uncategorized
Half of All U.S. Adults Have Been Hacked
Home Depot just announced it is investigating a hack that possibly exposed its customer payment information. The company confirmed it has partnered with banks and ...
Read More
Uncategorized
OSHA is Cracking Down on Workplace Violence; Are You at Risk?
OSHA does not have a specific standard addressing workplace violence, but that hasn’t stopped the agency from citing two employers recently for failing to protect ...
Read More
Uncategorized
Shoplifting Flash Mobs Target Convenience Stores
Police are looking for a group of 30-40 teens who were allegedly part of a shoplifting flash mob at a Shell service station in Federal ...
Read More
Uncategorized
Black Hat 2014 Experts Able to Hack Homes, Cars and More
This year’s hottest topic at Black Hat, the cybersecurity conference in Las Vegas, seemed to be challenging the security of the Internet.  According to a ...
Read More
Uncategorized
SPECIAL ALERT
Several websites, and message boards have posted information indicating that hacker group Anonymous has issued a call for nationwide protests in what is described as ...
Read More
Uncategorized
Could Hackers Take Over Your Car?
Modern cars are increasingly controlled by computers. And where there are computers, there are hackers. A recent report shows that the 2014 Jeep Cherokee, 2015 ...
Read More
Uncategorized
Organized Baby-Formula Theft Ring Netted Millions
Cooperation between local and state law enforcement and large retail chains in Florida led to the recent bust of a statewide baby-formula theft ring. Shoplifters ...
Read More
Uncategorized
Lone-Wolf Scenario Overstated According to Terrorism Analyst
Spanish terrorism analyst Fernando Reinares said in a recent speech at the Brookings Institution that intelligence agencies and analysts have overestimated the threat posed by ...
Read More
Uncategorized
CDC Issues Health Advisory for Ebola Virus Disease
Nigerian health authorities have confirmed a diagnosis of Ebola Virus Disease (EVD) in a patient who died on Friday in a hospital in Lagos, Nigeria, ...
Read More
Uncategorized
A Decade Later, 'Terrorism is Not Going Away' Says 9/11 Commission
The United States must do more to protect itself from terrorism according to a recent report by the 9/11 Commission. The report concluded that "strenuous ...
Read More
Uncategorized
Internet Explorer Vulnerabilities Exploited by Hackers on Massive Scale
Cybersecurity researchers say Internet Explorer (IE) contains vulnerabilities that malicious hackers can exploit to facilitate additional attacks against their victims. According to Jamie Blasco of ...
Read More
Uncategorized
Utilities in U.S. Still Unprepared for EMP Threats
Dr. Peter Pry, executive director of the Task Force on National and Homeland Security warns an electromagnetic pulse (EMP) event could potentially wipe out 90 ...
Read More
Uncategorized
Special Malware Warning: Snap.do
SNAPDO is a malicious web browser hijacking software that can unknowingly infect a workstation. It can affect most any web broswer. Most common are Chrome, ...
Read More
Uncategorized
Survey Reveals Security Issues in Employee Screening Process
The 2014 HireRight Employment Screening Benchmark Report has found that 72 percent of security and HR professionals had found concerns related to applicants or employees ...
Read More
Uncategorized
Drones Could be the Latest Force Multiplier in Security
Chesley Brown has the latest aerial/mobile surveillance technology, called the Phantom Drone, which can be quickly deployed for area checks, special events, crowd control or ...
Read More
Uncategorized
Tighter Security for Flights on the Horizon
As security is tightened at international airports around the world with direct flights to the U.S., the Transportation Security Administration (TSA) has said that it ...
Read More
Uncategorized
Crime Prevention Tips: What Cops and Crooks Say You Are Doing Wrong. Part 4- Six Ways to Stay Safer
Watch out for impostors - The fastest-growing scam in the past year has been impostor fraud, according to the latest annual report on consumer complaints ...
Read More
Uncategorized
P.F. Chang's Investigates Possible Card Breach
An investigation is ongoing at P.F. Chang's China Bistro regarding a possible credit card breach.  This investigation follows reports of a large batch of stolen ...
Read More
Uncategorized
Crime Prevention Tips: What Cops and Crooks Say You Are Doing Wrong. Part 3- Your Personal Finances
Banking from a public computer Keylogging malware that can capture account numbers, passwords, and other vital data is a risk that has been linked to ...
Read More
Uncategorized
Expanding Your CCTV Power With Solar
Cables have historically been the lifeline of surveillance cameras, supplying connectivity and power. But this has also limited the range of cameras as they had ...
Read More
Uncategorized
Shoplifting Getting More Brazen and Violent
Shoplifting appears to be on the rise, security experts say, and some also believe that shoplifters are becoming more violent. The increase in both thefts ...
Read More
Uncategorized
Crime Prevention Tips: What Cops and Crooks Say You Are Doing Wrong, Part 2
You're an easy target. That's what we heard when we talked to police, experts, and especially people who have spent time on the other side ...
Read More
Uncategorized
E-Bay Users Should Reset their Passwords After Major Hack
E-Bay recently revealed that hackers broke into the company's systems two months ago and stole user information, including account passwords, customer names, birth dates, e-mail ...
Read More
Uncategorized
Retailers Report an Average Loss $2.8 Million to ORC Last Year
A staggering $2.8 million on average was lost last year, per retailer, to Organized Retail Crime (ORC). This is according to The National Retail Federation ...
Read More
Uncategorized
How to Protect Your Empty Properties
Vacant buildings are at risk of being targets of arson, theft, and vandalism. The construction industry in the UK alone has lost more than £1 ...
Read More
Uncategorized
Positively Engaging Employees Can Help Prevent Workplace Violence
Recent research from University of Texas Arlington professors James Campbell Quick and M. Ann McFadyen indicates that positive engagement and close supervision of potentially dangerous ...
Read More
Uncategorized
Positively Engaging Employees Can Help Prevent Workplace
Recent research from University of Texas Arlington professors James Campbell Quick and M. Ann McFadyen indicates that positive engagement and close supervision of potentially dangerous ...
Read More
Uncategorized
Notification May Be Only Requirement After a Data Breach
Only a limited bipartisan consensus has been reached in the wake of the Target and Neiman Marcus data breaches regarding a federal standard requiring companies ...
Read More
Uncategorized
IRS Warns Million Dollar Phone Scam is “Largest Ever”
If the phone rings and the caller says he represents the IRS, be suspicious. That's the warning from federal authorities, who last week said a ...
Read More
Uncategorized
Minimal Attack Could Cause 18 Month Blackout
The dystopian, post-electricity world of NBC’s sci-fi show Revolution may be a less fictional possibility than you thought, according to the results of a major ...
Read More
Uncategorized
Terror Threat Highest in 5 U.S. Metros, Including San Francisco
A report by the catastrophe modeling specialist Risk Management Solutions (RMS) has found that the threat of a large-scale terror attack occurring in the U.S. ...
Read More
Uncategorized
Retailers Playing a Dangerous Game of “Chicken”
Big American retail stores have become a top target of cybercriminals, but the retail industry has very little incentive to beef up its security. Retailers' ...
Read More
Uncategorized
5 Online Tax Scams to Avoid in 2014
With tax season right around the corner, it's time to prepare for another season of IRS scams designed to lure you into fake websites, steal ...
Read More
Uncategorized
Benefits of Video Verification, Part 4
Alarm response starts at the 911 center or PSAP (Public Safety Answering Point). The 911 call-taker assigns a priority code to the incoming calls, which ...
Read More
Uncategorized
Welcome Our Newest Team Member
Meet the newest member of the Chesley Brown team: Petey. He's a 6 week old Chocolate Lab puppy. While he is young, he's already started ...
Read More
Uncategorized
Benefits of Video Verification, Part 3
The alarm business is built upon a partnership with the insurance industry and law enforcement.  The insurers encourage their policy holders to install alarm systems ...
Read More
Uncategorized
Don't Fall for Fake Valentine's Day Messages
Exchanging Valentine's Day cards and gifts is a fun tradition...unless the message is really an attempt to trick you into buying a non-existent product or ...
Read More
Uncategorized
Mall Shooting Underscores Importance of Training
Within two minutes of the first 911 call Saturday, Howard County police had arrived at The Mall in Columbia. Though an event such as the ...
Read More
Uncategorized
“One Ring” Scam Will Cost you $30
While most people probably wouldn’t mind a trip to the Caribbean to avoid the cold winter months, most of us probably are not expecting phone ...
Read More
Uncategorized
Center for Medical Innovation
This is a Blog post. This is the easiest way to keep your readers, and followers engaged on your website. It also helps you with ...
Read More
Uncategorized
Nutritional Personal Consultation
It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The ...
Read More
Uncategorized
Microsoft First Cuts, Then Extends Windows XP Support
After first announcing all support for Windows XP would end this April, Microsoft has announced it will continue to provide updates for Microsoft Security Essentials ...
Read More
Uncategorized
After a Cyber Breach, Who Pays?
Target's recent customer data breach has many cybersecurity experts asking how it could have been prevented, and many banks and retailers wondering "Who is going ...
Read More
Uncategorized
Personal Devices Pose Biggest Threat to Corporate Security
Security software provider, Check Point, has found that 93 percent of US and UK companies use mobile devices to connect to corporate networks, while 67 ...
Read More
Uncategorized
Benefits of Video Verification, Part 2
A well-publicized court case recently sent shockwaves through the alarm business when an industry icon was forced to pay a multi-million dollar judgment to a ...
Read More
Uncategorized
Emergency AED Failure Warning
In a recent press release, the U.S. Food and Drug Administration (FDA) posted a warning regarding Automated External Defibrillators (AED) that may fail to deliver ...
Read More
Uncategorized
Security Stepping up for the Holiday Season
As the holiday shopping season fast approaches, recent mall shootings are prompting shopping center owners and managers nationwide to step-up security. Across the country, mall ...
Read More
Uncategorized
Video Becoming a Bigger Part of Perimeter Security Deployments
According to new research published by the market research firm IHS, perimeter security applications are increasingly including video surveillance cameras and analytics. The report found ...
Read More
Uncategorized
Benefits of Video Verification, Part 1
Seeing is believing and Video Verification, where CCTV surveillance is delivered to a central station during an alarm, is certainly no exception.  Contrary to common ...
Read More
Uncategorized
Run, Hide, Fight – Surviving an Active Shooter
An active shooter is an individual actively engaged in killing or attempting to kill people in a confined and populated area, typically through the use ...
Read More
Uncategorized
South Korea Reports North Korea Developing EMP Weapons
The National Intelligence Service (NIS) said in a report to parliament that the North had purchased Russian electromagnetic pulse (EMP) weaponry to develop its own ...
Read More
Uncategorized
Survey Says: One in Five Phishing Messages Work
According to a new ThreatSim poll, employees click on malicious links in an average of 18 percent of phishing emails. The survey found that phishing ...
Read More
Uncategorized
Nearly 2 Million Adobe Accounts Hacked Due to Simple Passwords
Cybercriminals have managed to steal over 130 million encrypted passwords after hacking Adobe’s systems. Stricture Consulting Group has published a list of the 100 most ...
Read More
Uncategorized
Cutting Down Retail Theft
The hunting, fishing, and outdoor gear retailer Cabela's has taken a number of steps over the last several years to better tailor its security measures ...
Read More
Uncategorized
Open Source Software Capable of Shutting Down Electrical Grid
The Department of Homeland Security (DHS) has issued a number of advisories over the last several months warning electric and water utilities about vulnerabilities in ...
Read More
Uncategorized
Making Air Travel Just a Little Better
In a long-anticipated announcement, the Federal Aviation Administration said airplane travelers will soon be able to watch videos and play games with their electronic devices ...
Read More
Uncategorized
Are Terrorists Developing Bioweapons?
A former Navy Research Advisory Committee member, Dr. Lee Hieb, discussed potential bioterrorist threats at a recent Doctors for Disaster Preparedness talk.  In particular, he ...
Read More
Uncategorized
Feds Bust $16 Million Theft Ring
Steve Hale, the owner of Double D Distributing in North Carolina, was arrested on Oct. 23 on 30 federal charges related to accusations that he ...
Read More
Uncategorized
Workplace Violence Can Help Be Prevented By Concerned Employees
According to the U.S. Naval Criminal Investigative Service (NCIS), one of the best ways to prevent workplace violence is to encourage employees to speak up ...
Read More
Uncategorized
Government Shutdown Could Delay Critical Software Patching
Desktop and server systems used in many federal agencies could be left vulnerable to new threats recently disclosed by Microsoft in its latest round of ...
Read More
Uncategorized
Power Grid Attacked in Arkansas
The FBI has reported that more than 10,000 people in Arkansas were plunged into a blackout last Sunday following an attack on that state’s electric ...
Read More
Uncategorized
Garrard Tactical, LLC donates Tactical Patrol Bike to Cobb Police
Cobb Police Deputy Chief Tim Cox along with members of the Ranger Division went to the offices of Chesley Brown Companies, Inc., parent of Garrard ...
Read More
Uncategorized
Edible Bar Codes Intend To Take A Bite Out Of the Counterfeit Drug Market
Counterfeit pharmaceutical products are believed to contribute to more than 100,000 patient deaths annually.  Drugmakers and regulators alike have been attempting to crackdown on the ...
Read More
Uncategorized
PPL Launches Reward Program to Stop Copper Theft
Pennsylvania's PPL Electric Utilities recently announced that it was introducing a rewards program that would pay $1,000 to those who provide it with information leading ...
Read More
Uncategorized
TSA to Randomly Select Passengers for Faster Security Checks
Passengers won't know they have been selected until they receive their boarding pass, but by year’s end more than a quarter of U.S. fliers can ...
Read More
Uncategorized
New Law Makes Shoplifting a Felony
A newly passed law in Michigan, called the Organized Retail Crime Act and sponsored by Genesee County State Rep. Joseph Graves, has moved shoplifting from ...
Read More
Uncategorized
Recovered Cell Phone Helps Identify Theft Ring
A dropped cell phone found by an employee of Safford Hardware in Alabama following a theft of a trailer and flatbed truck helped investigators identify ...
Read More
Uncategorized
Upcoming Drill to Simulate Attack on Power Grid
Government and industry experts all agree that the U.S. power grid is a major weakness that could be exploited by an enemy.  From cyber-attacks to ...
Read More
Uncategorized
Beware of “Sliders” While at Gas Stations
In a new wave of crime, thieves are secretively sliding into victim's cars and grabbing valuables from open windows and unlocked doors, in what police ...
Read More
Uncategorized
New Details of al Qaeda’s ‘Next Generation’ Bomb
John Pistole, head of the Transportation Security Administration (TSA), has revealed that the CIA and other Western intelligence agencies have been able to get a ...
Read More
Uncategorized
How Do the Elite Choose and Secure Their Passwords?
If you felt a twinge of anxiety after reading a recent story which showed how password crackers break even long passwords such as "qeadzcwrsfxv1331", you ...
Read More
Uncategorized
Nations Buying as Hackers Sell Flaws in Computer Code
All over the world, hackers are finding and selling "zero days," software coding flaws that can give a buyer unfettered access to a computer and ...
Read More
Uncategorized
Most Frequently Stolen Vehicles
If you drive a pickup truck or a large SUV, you'd better watch out. Ford F-250 crew cab is a big pickup truck and an ...
Read More
Uncategorized
Idaho and Washington Crack Down on Metal Theft
Idaho has enacted a new law that aims to crack down on the theft of metal from electric utilities, a problem that industry officials say ...
Read More
Uncategorized
Organized Retail Theft Rings Exploiting Gift Cards
Organized theft rings have devised a new way to get cash for stolen merchandise, by returning the items to retail stores for store credit in ...
Read More
Uncategorized
Retail Theft Growing More Complex
Mark R. Doyle, the president of the loss prevention/shrinkage-control consulting company Jack L. Hayes International, says that shoplifters are smart and work hard at their ...
Read More
Uncategorized
PC Viruses Work Together to Ensure Survival
Microsoft researcher Hyun Choi announced the discovery that a pair of malware, Vobfus and Beebone, have been acting together in a novel way to defeat ...
Read More
Uncategorized
Could You be Discriminating Without Intending To?
Congress and the U.S. Supreme Court say you can be held liable for discrimination if your employment policies lead to disparate impacts on groups of ...
Read More
Uncategorized
Law Enforcement Calling on Manufactures to install “Killswitch” for Smartphones
As violent crime tied to smartphone theft continues to rise nationwide, law enforcers are publicly calling on manufacturers to install "killswitch" technology that would render ...
Read More
Uncategorized
Facebook Scam Alert: Woman Losing Control of Axe
Videos of odd behaviors with sensational titles have long been used as bait by scammers in an attempt to lure unsuspecting Facebook users to their ...
Read More
Uncategorized
Retail Theft More Organized and More Costly
Roughly 300 law-enforcement officers and retail leaders met at the Ohio Regional Organized Crime Coalition's second-annual symposium on June 14 to discuss how to better ...
Read More
Uncategorized
Microsoft and FBI Partner to Take Down Major Cybercrime Ring
Microsoft and the FBI, aided by authorities in more than 80 countries, have launched a major assault on one of the world's biggest cybercrime rings, ...
Read More
Uncategorized
TSA Reverses Plan to Let Small Knives on Planes
The Transportation Security Administration (TSA) announced Wednesday that it has reversed course on a proposal that would have allowed passengers to carry small knives and ...
Read More
Uncategorized
Support Grows for 'Hack Back' Law
Private companies have been targeted by a growing number of cyber-attacks in recent months, but current laws prevent them from openly retaliating. However, a commission ...
Read More
Uncategorized
Android Malware Moving Beyond Apps
According to a first quarter analysis for this year, Android malware authors have officially turned the complexity corner. The size and scope of the Android ...
Read More
Uncategorized
Burglars Share Their Tips to Keep Your Home Safe
According to FBI statistics, nearly 2.2 million burglaries are committed each year.  In nearly a third of these crimes, the suspects were able to gain ...
Read More
Uncategorized
Some Power Companies Say They Face Constant Cyber-Attacks
Amid government warnings that foreign hackers are seeking to hack the electric grid, several U.S. power utilities report they face constant cyber-attacks on critical systems.  ...
Read More
Uncategorized
The Formula for Successful Theft Prevention
Retailers across the nation are taking more initiative to curb baby formula theft, which has become a popular shoplifting item for organized retail crime (ORC) ...
Read More
Uncategorized
Avoiding the Dangers of Buying and Selling on Craig’s List
A 40-year-old Cromwell, CT man is dead after being shot in the head while trying to sell a Samsung Tablet in Hartford according to police ...
Read More
Uncategorized
Bicycle Theft and Recovery – The Importance of Registration
Whether a bicycle is used for commuting, leisure play or exercise, it's a common denominator among most American families.  As spring (very) slowly arrives, many ...
Read More
Uncategorized
Security Cameras: The Good and the Bad
Even after the identification of the Boston bombing suspects through security camera images, officials say that blanketing a city in surveillance cameras can create as ...
Read More
Uncategorized
Theft Epidemic
Statistics from the National Association of Shoplifting Prevention show the extent of damage caused by shoplifters and organized retail crime (ORC) rings in the United ...
Read More
Uncategorized
Water Treatment Plant Break In Causes Scare in Atlanta
A break-in at a small north Georgia water treatment plant is raising alarms among security experts.  A local news reporter visited Murray County last week ...
Read More
Uncategorized
If You See Something, Say Something
The Boston attacks have jolted Americans into a state of high alert. In the days and weeks after the marathon bombings, travelers and residents of ...
Read More
Uncategorized
Researcher Uses Smart Phone to Hack Aircraft Control System
Hugo Teso, a European security researcher, presented findings at the Hack In The Box Conference in Amsterdam saying he was able to hack into the ...
Read More
Uncategorized
‘Tripwire’ System Helps FBI Find Bomb Makers
For years the FBI has been refining its so-called "tripwire" system for detecting individuals who purchase materials for bomb construction before they are able to ...
Read More
Uncategorized
Scammers Loom in Wake of Tragedy
As Americans rush to donate to the victims of last week’s Boston Marathon bombing, watchdog groups are warning of potential online scammers already looking to ...
Read More
Uncategorized
Identity Theft Scams Target Children’s Social Security Numbers
Experts warn that when it comes to identity theft, children’s Social Security numbers are prime targets for thieves; along with people’s medical histories and tax ...
Read More
Uncategorized
Several Newark TSA Agents Retain Jobs Despite Violations
44 Transportation Security Administration (TSA) employees working in the checked-baggage screening room of New Jersey's Newark Liberty International Airport were caught on video not following ...
Read More
Uncategorized
Texas Killings Bring Increased Security for Prosecutors
The murder of Kaufman County, Texas, District Attorney Mark McLelland and his wife over Easter weekend has spurred an increase in the security of county ...
Read More
Uncategorized
Campaign Launched to Prevent Child Sexual Abuse in Youth Sports Groups
Retired professional athletes, Cal Ripken Jr. of the MLB, Joe Ehrmann of the NFL, and Sheldon Kennedy of the NHL have launched a campaign in ...
Read More
Uncategorized
Identifying the Internet's 'Bad Neighborhoods'
University of Twente researchers recently conducted a study of more than 42,000 Internet service providers (ISPs) in an attempt to map the Internet's "bad neighborhoods" ...
Read More
Uncategorized
Most Computer Programs Safe, But Updates Still Pose a Problem
According to a new Secunia report, although the number of global vulnerabilities increased in 2012, the Top 50 applications on people's desktops had fewer overall ...
Read More
Uncategorized
New Campaign Aims to Curb Auto Break Ins
Having your car broken into is a traumatic experience and is a widespread problem across the country.  Too many people believe it cannot happen to ...
Read More
Uncategorized
Inside Organized Retail Crime Raids
Organized retail crime rings are notorious for stealing goods from big box and department stores likes Wal-Mart, J.C. Penny, and Walgreens and then selling those ...
Read More
Uncategorized
Remote Camera Monitor Halts Burglary
San Diego Luxury Transportation, located in its namesake city in California, averted what could have been a costly theft on March 3 when an offsite ...
Read More
Uncategorized
Flight Attendants and U.S. Marshals Want TSA to Reconsider Knife Policy
A recent decision made by Transportation Security Administration chief John Pistole to allow airline passengers to carry several previously-banned items onto airplanes is being questioned ...
Read More
Uncategorized
Deloitte Survey Reports Cyber-attacks Threaten Most Businesses
Although 88 percent of companies believe they are not vulnerable to a cyber-attack, all businesses are at risk and should be prepared to rebound rapidly ...
Read More
Uncategorized
Chinese Army Unit Reportedly Tied to Hacking Against U.S. Companies
A report from the computer security firm Mandiant links a number of recent cyber-attacks on American companies to the Chinese military. Mandiant's report discusses the ...
Read More
Uncategorized
Bill to Target Organized Retail Theft
Nevada assemblyman Richard Carrillo on Feb. 18 introduced bill AB102, otherwise known as the retail crimes bill, which would change the definition of organized retail ...
Read More
Uncategorized
Tips for Staying Safe at Work
Most of us spend about one-third of our time on the job, not counting the time it takes us to get there and back; so, ...
Read More
Uncategorized
Cyber-attacks Causing Banks to Request Federal Help
The U.S. banking industry, including PNC Financial Services Group, SunTrust Banks, and BB&T, is calling on the federal government to take steps to address the ...
Read More
Uncategorized
Botnet Taken Down by Microsoft and Symantec
The Bamital botnet, which had infected hundreds of thousands of PC’s has been reportedly taken down by Microsoft and Symantec.  The companies say they have ...
Read More
Uncategorized
The New Form of Bank Robbery
Bank robberies in the United States have been changing form recently.  According to statistics from the FBI, traditional bank robberies have been in decline as ...
Read More
Uncategorized
Using Technology to Protect Newborns
In an effort to reduce the risk of abduction for the 2,500 babies born there annually, a Danbury (Conn.) Hospital recently added a radio frequency ...
Read More
Uncategorized
TSA to Remove Controversial Body Imaging Scanners
The Transportation Security Administration is planning to remove certain body scanning machines that produce graphic images of travelers' bodies from airports by this June.  Critics ...
Read More
Uncategorized
After Homeland Security Warning, Oracle Fixes Java Flaw
Oracle issued a patch for Java on Sunday after a new exploit of the notoriously insecure programming software was discovered by European security researcher Kafeine ...
Read More
Uncategorized
Airline Confirmation E-Mail Scam
Webroot is warning of a new email spam campaign impersonating U.S. Airways that is hitting inboxes.  Airline customers would do well to be on the ...
Read More
Uncategorized
High Risk Android Apps and How to Stay Safe
According to a TrustGo study, nearly 25 percent of Android apps feature code that can access application permissions and cause security breaches,. Of the 2.3 ...
Read More
Uncategorized
Al-Qaida Offering Bounties on U.S. Ambassadors and U.S. Soldiers
Bounties on U.S. Ambassador to Yemen Gerald Feierstein and any U.S. soldier in Yemen, worth $160,000 and $23,000 in gold respectively, were recently announced by ...
Read More
Uncategorized
Coping With Workplace Disaster
Companies need to be prepared to respond to the emotional and structural damage that comes from a crisis. Large-scale disasters are uncommon, but that does ...
Read More
Uncategorized
Organized Retail Crime Facing Stiffer Laws
Michigan Gov. Rick Snyder recently signed into law legislation making participation in organized retail crime (ORC) a felony. The Organized Retail Crime Act defines ORC ...
Read More
Uncategorized
Massive Bank Cyber-Attack Planned
In a recent report, McAfee warns about a possible cyber-attack against more than two dozen U.S. banks next spring. The attack, which was also mentioned ...
Read More
Uncategorized
Cybersecurity Warning from Former US Spy Chief
Former Director of National Intelligence Mike McConnell said urgent action is needed to prevent a cyber attack against the U.S.'s banking system, power grid, and ...
Read More
Uncategorized
Holiday Scamming and Skimming
With the Holiday season here, it’s time to be extra vigilant and protect ourselves against the scam known as skimming.  Skimming" is a method by ...
Read More