<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-4932448786174130096</id><updated>2025-09-24T07:52:49.376+01:00</updated><category term="Paul Drury"/><category term="Richard Bell"/><category term="cyber security"/><category term="physical security"/><category term="insider threat"/><category term="counter terror"/><category term="personnel security"/><category term="terrorism"/><category term="counter terrorism"/><category term="security audit"/><category term="fraud"/><category term="data loss"/><category term="identity fraud"/><category term="CCTV"/><category term="Scam"/><category term="assurance"/><category term="crime"/><category term="electronic security"/><category term="olympics"/><category term="risk management"/><category term="theft"/><category term="CPNI"/><category term="Contest"/><category term="Social Engineering"/><category term="conference"/><category term="counter terror expo"/><category term="cyber security challenge"/><category term="cyber terror"/><category term="the threat within"/><category term="CISO"/><category term="NSWU"/><category term="action fraud"/><category term="airport security"/><category term="crime prevention"/><category term="guest blogger"/><category term="loss prevention"/><category term="met police"/><category term="security institute"/><category term="2012"/><category term="Access Control"/><category term="CSO"/><category term="CSOSummit"/><category term="GCHQ"/><category term="Get Safe Online"/><category term="HMG"/><category term="HOSDB"/><category term="Hostile Vehicle Mitigation (HVM)"/><category term="Information Security"/><category term="Intruder Alarm"/><category term="Jobs"/><category term="National Security"/><category term="fbi"/><category term="infosec"/><category term="mobile phone hacking"/><category term="security risks"/><category term="what is security"/><category term="ACPO"/><category term="British Transport Police"/><category term="CSO Magazine"/><category term="Close Protection"/><category term="Critical National Infrastructure"/><category term="Deloite"/><category term="Evening Standard"/><category term="FWN"/><category term="Graeme Forward"/><category term="Hostage"/><category term="INSTINCT"/><category term="Ifsec"/><category term="London"/><category term="London Bikeathon"/><category term="OSCT"/><category term="Poll Results"/><category term="Richmond Hill Hotel"/><category term="Stephan Freeman"/><category term="Tech:Touchstone"/><category term="UKBA"/><category term="VBIED"/><category term="Worshipful Company of Security Professionals"/><category term="chatham house rule"/><category term="cyber crime"/><category term="e-crime"/><category term="ebay"/><category term="fraud prevention"/><category term="fraud women&#39;s network"/><category term="home office"/><category term="home security"/><category term="intelligence"/><category term="paypal"/><category term="protest"/><category term="ring of steel"/><category term="sia"/><category term="skype"/><category term="technology"/><category term="threat level"/><category term="threats"/><category term="travel security"/><title type='text'>Chatback Security - A Blog About Protective Security</title><subtitle type='html'>We give you the latest security news and industry best practice. We cover all aspects of security including Personnel, Physical and InfoSec.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>121</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-2794607520730901076</id><published>2012-04-24T07:06:00.001+01:00</published><updated>2012-04-24T19:58:43.373+01:00</updated><title type='text'>We Have Moved.....Please check out chatbacksecurity.com</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #3d85c6; font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: x-large;&quot;&gt;&lt;a href=&quot;http://www.chatbacksecurity.com/&quot;&gt;Please hold the line........the caller knows you are waiting and we are trying to connect you........&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/2794607520730901076/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/04/we-have-movedplease-check-out.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/2794607520730901076'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/2794607520730901076'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/04/we-have-movedplease-check-out.html' title='We Have Moved.....Please check out chatbacksecurity.com'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-2289502618424501991</id><published>2012-04-11T22:16:00.000+01:00</published><updated>2012-04-11T22:18:12.067+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Paul Drury"/><title type='text'>Free Virus Removal Tool for download from Sophos</title><content type='html'>&lt;a href=&quot;http://nakedsecurity.sophos.com/2012/04/11/free-virus-removal-tool-for-download-from-sophos/?utm_source=Naked+Security+-+Sophos+List&amp;amp;utm_medium=email&amp;amp;utm_campaign=8d31ffd9cd-naked%252Bsecurity#com-head&quot; style=&quot;clear: left; display: inline !important; margin-bottom: 1em; margin-right: 1em; text-align: justify;&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;68&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFGpXbDH3_UTOSEHphSyKAERIgbGER7IKHQhwWyuZvYuEOiAyyLAFDYa_B3EnIQuGpIuqzGstT5pnJNstpr6SOGaGZyrvJeZOO6ZULHuGeuj_J7NSfYSaUWfB_h9vuKNn8JeSkdCZF5Yc/s320/Capture.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;You know that feeling when you&#39;re pretty sure your Windows machine *might* be infected, but your anti-virus finds nothing?&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Or worse, your anti-virus does detect malware, but the instructions to disinfect and rid your system of the malware are so complicated that you want to pull out your hair.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Well, Sophos has just released its&amp;nbsp;&lt;a href=&quot;http://www.sophos.com/en-us/products/free-tools/virus-removal-tool.aspx&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #2571c2; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot; title=&quot;Sophos&#39;s free Virus Removal Tool download page&quot;&gt;&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Virus Removal Tool&lt;/strong&gt;&lt;/a&gt;. Designed to be child&#39;s play to use, it detects and, more importantly, disinfects all those nasty viruses, spyware, rootkits and even fake anti-virus with its flagship industrial-strength anti-virus.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Best of all it is free, and for Naked Security readers, there are no details to enter before you can download and use it.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Actually, really best of all, there is no need to remove existing anti-virus that is already installed.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://www.sophos.com/en-us/products/free-tools/virus-removal-tool.aspx&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #2571c2; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img align=&quot;center&quot; alt=&quot;virus-removal-tool-screenshot&quot; data-lazy-loaded=&quot;true&quot; height=&quot;345&quot; src=&quot;http://sophosnews.files.wordpress.com/2012/04/virus-removal-tool-screenshot.jpg?w=500&amp;amp;h=345&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: medium; border-color: initial; border-image: initial; border-left-width: medium; border-right-width: medium; border-style: initial; border-top-style: none; border-top-width: medium; display: inline; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 3px; max-width: 500px; padding-bottom: 5px; padding-left: 5px; padding-right: 10px; padding-top: 0px; vertical-align: baseline;&quot; title=&quot;virus-removal-tool-screenshot&quot; vspace=&quot;10&quot; width=&quot;500&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;For the past year or so, the Virus Removal Tool has been used by some of Sophos&#39;s biggest customers to disinfect complicated malware that sneaked onto a poorly protected computer, but this is the first time Sophos has released this tool to the public at large.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Sophos has also provided a free support forum called&amp;nbsp;&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;http://community.sophos.com/t5/sophos-free-tools/bd-p/Freetools&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #2571c2; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot; title=&quot;Sophos&#39;s FreeTalk community&quot;&gt;Sophos FreeTalk&lt;/a&gt;&lt;/strong&gt;where you can ask any questions about this and other&amp;nbsp;&lt;a href=&quot;http://www.sophos.com/en-us/products/free-tools.aspx&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #2571c2; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot; title=&quot;Sophos free product page&quot;&gt;free Sophos products&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The majority of our readers are pretty security conscious, and we know from experience that many of you are probably the IT guy or gal called upon to help family and friends sort out their computers when things go awry. Sophos hopes that this tool will make your lives a little bit easier.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://www.sophos.com/en-us/products/free-tools/virus-removal-tool.aspx&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #2571c2; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img align=&quot;center&quot; alt=&quot;Sophos&#39;s free Virus Removal Tool &quot; data-lazy-loaded=&quot;true&quot; height=&quot;174&quot; src=&quot;http://sophosnews.files.wordpress.com/2012/04/sophosvirusremovaltooljpg1.jpg?w=500&amp;amp;h=174&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: medium; border-color: initial; border-image: initial; border-left-width: medium; border-right-width: medium; border-style: initial; border-top-style: none; border-top-width: medium; display: inline; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 3px; max-width: 500px; padding-bottom: 5px; padding-left: 5px; padding-right: 10px; padding-top: 0px; vertical-align: baseline;&quot; title=&quot;Sophos&#39;s free Virus Removal Tool &quot; vspace=&quot;10&quot; width=&quot;500&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Lastly, Sophos would love to hear your thoughts on its&amp;nbsp;&lt;a href=&quot;http://www.sophos.com/en-us/products/free-tools/virus-removal-tool.aspx&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #2571c2; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot; title=&quot;Sophos&#39;s free Virus Removal Tool download page&quot;&gt;&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Virus Removal Tool&lt;/strong&gt;&lt;/a&gt;. It sees this as a tool worth investing in, but the company wants to make sure it gets your thoughts first so it can prioritise any improvements accordingly.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;text-align: -webkit-auto;&quot;&gt;Originally posted by&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://nakedsecurity.sophos.com/2012/04/11/free-virus-removal-tool-for-download-from-sophos/?utm_source=Naked+Security+-+Sophos+List&amp;amp;utm_medium=email&amp;amp;utm_campaign=8d31ffd9cd-naked%252Bsecurity#com-head&quot; style=&quot;text-align: -webkit-auto;&quot; target=&quot;_blank&quot;&gt;Naked Security&lt;/a&gt;&lt;/span&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/2289502618424501991/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/04/free-virus-removal-tool-for-download.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/2289502618424501991'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/2289502618424501991'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/04/free-virus-removal-tool-for-download.html' title='Free Virus Removal Tool for download from Sophos'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFGpXbDH3_UTOSEHphSyKAERIgbGER7IKHQhwWyuZvYuEOiAyyLAFDYa_B3EnIQuGpIuqzGstT5pnJNstpr6SOGaGZyrvJeZOO6ZULHuGeuj_J7NSfYSaUWfB_h9vuKNn8JeSkdCZF5Yc/s72-c/Capture.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-2043270825533959783</id><published>2012-04-10T11:02:00.001+01:00</published><updated>2012-04-10T11:04:48.379+01:00</updated><title type='text'>The Shard - Dare devils breach security to ascend Europes tallest&#xa;building</title><content type='html'>&lt;script src=&quot;http://player.ooyala.com/player.js?height=315&amp;embedCode=lxZ2ZmNDpFXPI4eiJL4k-IcLQZQYxDlO&amp;deepLinkEmbedCode=lxZ2ZmNDpFXPI4eiJL4k-IcLQZQYxDlO&amp;width=560&quot;&gt;&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/2043270825533959783/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/04/shard-dare-devils-breach-security-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/2043270825533959783'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/2043270825533959783'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/04/shard-dare-devils-breach-security-to.html' title='The Shard - Dare devils breach security to ascend Europes tallest&#xa;building'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-1468333550003246777</id><published>2012-04-04T19:21:00.000+01:00</published><updated>2012-04-04T20:10:21.321+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CPNI"/><category scheme="http://www.blogger.com/atom/ns#" term="Critical National Infrastructure"/><category scheme="http://www.blogger.com/atom/ns#" term="Paul Drury"/><title type='text'>Centre for the Protection of National Infrastructure (CPNI) Goes Viral!</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://www.cpni.gov.uk/&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq2EvwRYm_KB8qBX8Tiy9dhhpk2ZeXL6j4YDD0bShFlDdIWQuq1Z8vfeQFATMVoVn2MSm8SHbCaWX4MTszys7OUghGG6No0WRgae31t2eIWk9gg_eGAId7mXvPtF_XuOSFi_VzjiFKZW8/s1600/cpni_logo.gif&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Wow the CPNI is now very much public! I think this is a very brave move but I&#39;m&amp;nbsp;positive&amp;nbsp;it will be a successful one. CPNI are already the &lt;a href=&quot;http://www.cpni.gov.uk/&quot; target=&quot;_blank&quot;&gt;public face&lt;/a&gt; of &lt;a href=&quot;https://www.mi5.gov.uk/&quot; target=&quot;_blank&quot;&gt;MI5 &lt;/a&gt;and a new series of&amp;nbsp;YouTube&amp;nbsp;videos have taking things a step further.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;What a fantastic idea, opening up their vast &lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;source of&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;knowledge to the&amp;nbsp;masses. Hopefully they will add some other resources for PhySec, PerSec and InfoSec&amp;nbsp;to the channel. My head is spinning with ideas but being able to&amp;nbsp;integrate their&amp;nbsp;PerSec&amp;nbsp;guidance&amp;nbsp;into training modules (e-learning specifically) via a short video would be really useful!&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;There are currently 3 videos listed on the &lt;a href=&quot;http://www.youtube.com/user/UKCPNI&quot; target=&quot;_blank&quot;&gt;CPNI channel&lt;/a&gt;, they are&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=_glagaW7wKo&amp;amp;context=C44d5f1bADvjVQa1PpcFMfY3kylMH9wO7gKGuBen8xafiHmbaoUXE=&quot; target=&quot;_blank&quot;&gt;Security Implications of Internet Protocol version 6 (IPv6)&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://www.youtube.com/watch?v=B5t6GU_TW-w&amp;amp;context=C4b51a52ADvjVQa1PpcFMfY3kylMH9wF8eCdkc3vz59o10Qj2idv8=&quot; target=&quot;_blank&quot;&gt;Secure move to IP-based Networks (SCADA)&lt;/a&gt; and &lt;a href=&quot;http://www.youtube.com/watch?v=2xWYMhy-Zds&amp;amp;context=C463565cADvjVQa1PpcFMfY3kylMH9wMGdGSwW2YMmDrIQZ9XHUco=&quot; target=&quot;_blank&quot;&gt;20 Critical Security Controls for Cyber Defence&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white; color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal;&quot;&gt;ow).&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;http://www.youtube.com/embed/2xWYMhy-Zds&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: x-small;&quot;&gt;One of the CPNI Channel Video&#39;s&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;i&gt;About the &lt;a href=&quot;http://www.cpni.gov.uk/about/&quot; target=&quot;_blank&quot;&gt;Centre for the Protection of National Infrastructure (CPNI)&lt;/a&gt;: they provide integrated security advice (combining &lt;a href=&quot;http://www.chatbacksecurity.com/&quot; target=&quot;_blank&quot;&gt;information security&lt;/a&gt;, &lt;a href=&quot;http://chatbacksecurity.blogspot.co.uk/2010/05/personnel-security-something-we-should.html&quot; target=&quot;_blank&quot;&gt;personnel security &lt;/a&gt;and &lt;a href=&quot;http://www.chatbacksecurity.com/&quot; target=&quot;_blank&quot;&gt;physical security&lt;/a&gt;) to organisations which make up the national infrastructure.&amp;nbsp;Their&amp;nbsp;advice helps to reduce the vulnerability of the national infrastructure (primarily the critical national infrastructure) to terrorism and other threats to national security.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/1468333550003246777/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/04/centre-for-protection-of-national.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/1468333550003246777'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/1468333550003246777'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/04/centre-for-protection-of-national.html' title='Centre for the Protection of National Infrastructure (CPNI) Goes Viral!'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq2EvwRYm_KB8qBX8Tiy9dhhpk2ZeXL6j4YDD0bShFlDdIWQuq1Z8vfeQFATMVoVn2MSm8SHbCaWX4MTszys7OUghGG6No0WRgae31t2eIWk9gg_eGAId7mXvPtF_XuOSFi_VzjiFKZW8/s72-c/cpni_logo.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-7684931840285651705</id><published>2012-04-02T20:11:00.000+01:00</published><updated>2012-04-02T22:57:55.046+01:00</updated><title type='text'>Protective Security: Tackling The Issue of Metal Theft</title><content type='html'>&lt;span style=&quot;color: #0c1e63; font-family: Arial, Helvetica, sans-serif; font-weight: bold; line-height: 18px; text-align: justify;&quot;&gt;A new Crimestoppers campaign has been launched to tackle &lt;/span&gt;&lt;a href=&quot;http://chatbacksecurity.blogspot.co.uk/2011/12/mps-is-launching-its-first-ever.html&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-weight: bold; line-height: 18px; text-align: justify;&quot; target=&quot;_blank&quot;&gt;metal theft&lt;/a&gt;&lt;span style=&quot;color: #0c1e63; font-family: Arial, Helvetica, sans-serif; font-weight: bold; line-height: 18px; text-align: justify;&quot;&gt;. Opportunistic criminals are targeting the community by stealing metal from houses, businesses and public premises. You can help by reporting any crime you see.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 1.2858em; margin-top: 1.2858em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;color: #0e2374; line-height: 18px;&quot;&gt;
&lt;span class=&quot;introText&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0c1e63; display: block; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: white; color: #102370; font-family: Arial, Helvetica, sans-serif; line-height: 1em;&quot;&gt;Dangerous crime&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0e2374; line-height: 18px; margin-bottom: 1.2858em; margin-top: 1.2858em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This crime can also be extremely dangerous to you, your family and your community. Criminals will target children’s playgrounds, church and school roofs, telephone cabling and so on, with no regard for the potential consequences.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0e2374; line-height: 18px; margin-bottom: 1.2858em; margin-top: 1.2858em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Among the things being stolen are:&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0e2374; line-height: 18px; list-style-image: initial; list-style-position: initial; margin-bottom: 1.2858em; margin-left: 1.0715em; margin-right: 0px; margin-top: 1.2858em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 1.286em; margin-bottom: 0.4286em; margin-left: 0px; margin-right: 0px; margin-top: 0.4286em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;manhole covers&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 1.286em; margin-bottom: 0.4286em; margin-left: 0px; margin-right: 0px; margin-top: 0.4286em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;cables used for 999 calls&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 1.286em; margin-bottom: 0.4286em; margin-left: 0px; margin-right: 0px; margin-top: 0.4286em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;live electricity wiring&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9bBhBGceRGLS4jBX8eMy3U_3zCVxLmsZxCT0A-51AOaWyLxfFvI2ATLOwjdqmFZK7XI_DevutsZ-S6Ll5w8-F6Gj_LFuXzELW0zqshxGR7b2oQNX2tz3B56biyEuTNSA7vdAswWPMxII/s1600/52102695_metal.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;112&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9bBhBGceRGLS4jBX8eMy3U_3zCVxLmsZxCT0A-51AOaWyLxfFvI2ATLOwjdqmFZK7XI_DevutsZ-S6Ll5w8-F6Gj_LFuXzELW0zqshxGR7b2oQNX2tz3B56biyEuTNSA7vdAswWPMxII/s200/52102695_metal.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #0e2374; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #0e2374; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;You can provide any information to Crimestoppers, no matter how small, 24 hours a day either by:&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0e2374; line-height: 18px; list-style-image: initial; list-style-position: initial; margin-bottom: 1.2858em; margin-left: 1.0715em; margin-right: 0px; margin-top: 1.2858em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 1.286em; margin-bottom: 0.4286em; margin-left: 0px; margin-right: 0px; margin-top: 0.4286em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;phone: 0800 555 111&lt;span class=&quot;skype_pnh_container&quot; dir=&quot;ltr&quot; style=&quot;background-attachment: scroll !important; background-clip: initial; background-color: transparent !important; background-image: none !important; background-origin: initial; background-position: 0px 0px !important; background-repeat: no-repeat no-repeat !important; border-bottom-color: rgb(0, 0, 0) !important; border-bottom-style: none !important; border-bottom-width: 0px !important; border-collapse: separate !important; border-color: initial !important; border-image: initial !important; border-left-color: rgb(0, 0, 0) !important; border-left-style: none !important; border-left-width: 0px !important; border-right-color: rgb(0, 0, 0) !important; border-right-style: none !important; border-right-width: 0px !important; border-style: initial; border-top-color: rgb(0, 0, 0) !important; border-top-style: none !important; border-top-width: 0px !important; bottom: auto !important; clear: none !important; clip: auto !important; color: #49535a; cursor: pointer !important; direction: ltr !important; display: inline !important; float: none !important; font-weight: bold !important; height: 14px !important; left: auto !important; letter-spacing: 0px !important; line-height: 14px !important; list-style-image: none !important; list-style-position: outside !important; list-style-type: disc !important; margin-bottom: 0px !important; margin-left: 0px !important; margin-right: 0px !important; margin-top: 0px !important; outline-color: initial; outline-style: initial; outline-width: 0px; overflow-x: hidden !important; overflow-y: hidden !important; padding-bottom: 0px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; page-break-after: auto !important; page-break-before: auto !important; page-break-inside: auto !important; position: static !important; right: auto !important; table-layout: auto !important; text-align: left !important; top: auto !important; vertical-align: baseline !important; white-space: nowrap !important; width: auto !important; word-spacing: normal !important; z-index: 0 !important;&quot; tabindex=&quot;-1&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 1.286em; margin-bottom: 0.4286em; margin-left: 0px; margin-right: 0px; margin-top: 0.4286em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;internet:&amp;nbsp;&lt;a href=&quot;http://www.crimestoppers-uk.org/&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0282bf; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Crimestoppers website&lt;/a&gt;&lt;img alt=&quot;external link&quot; class=&quot;elink&quot; src=&quot;http://www.nidirect.gov.uk/external.png&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-style: initial; border-top-width: 0px; float: none; height: 10px; margin-bottom: 0px; margin-left: 3px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline; width: 10px;&quot; /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0e2374; line-height: 18px; margin-bottom: 1.2858em; margin-top: 1.2858em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;You have guaranteed anonymity and it won’t even show on your phone bill.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0e2374; line-height: 18px; margin-bottom: 1.2858em; margin-top: 1.2858em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Crimestoppers is an independent, international charity providing a vital service to the public, enabling them to pass information in relation to crime anonymously in order to make the UK a safer place for all of us.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0e2374; line-height: 18px; margin-bottom: 1.2858em; margin-top: 1.2858em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;You can get more information, including a leaflet, at the following link:&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0e2374; line-height: 18px; list-style-image: initial; list-style-position: initial; margin-bottom: 1.2858em; margin-left: 1.0715em; margin-right: 0px; margin-top: 1.2858em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 1.286em; margin-bottom: 0.4286em; margin-left: 0px; margin-right: 0px; margin-top: 0.4286em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.dojni.gov.uk/crush-metal-theft-in-your-community-leaflet-march-2012.pdf&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0282bf; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;‘Crush metal theft in your community’ (PDF 1.15 MB) – Department of Justice website&lt;/a&gt;&lt;img alt=&quot;external link&quot; class=&quot;elink&quot; src=&quot;http://www.nidirect.gov.uk/external.png&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-style: initial; border-top-width: 0px; float: none; height: 10px; margin-bottom: 0px; margin-left: 3px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline; width: 10px;&quot; /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0e2374; line-height: 18px; margin-bottom: 1.2858em; margin-top: 1.2858em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Figures show that in 2011 there were 669 recorded incidents of metal theft throughout Northern Ireland compared to 219 in 2007.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEickfScmduelAs54epgvZM-cR8hoWZHH8ouTAeqsn3u7NGZ6sq_ESsBZYRywzAvrBIi4pwNhxUn4tiiIH23seb9HvDUzCqtkBrRXF49QBTy2vr7PjFlwyF18bQG6LbZ8F5vaVLga0RCf58/s1600/poster+1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEickfScmduelAs54epgvZM-cR8hoWZHH8ouTAeqsn3u7NGZ6sq_ESsBZYRywzAvrBIi4pwNhxUn4tiiIH23seb9HvDUzCqtkBrRXF49QBTy2vr7PjFlwyF18bQG6LbZ8F5vaVLga0RCf58/s200/poster+1.jpg&quot; width=&quot;141&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8yxaR1HP2bc4xFsl66eV09LXNo_KtWXiqCITskVY0tHYqUSwSH4IfBqG44ER41PGUd3OfeeacsWqlS_LsG4BhmnirmIgKinjbq-SVxlKRXEDWDbK21fkuMpZ1iH7qDaFKiIzQ4RBVXfM/s1600/Capture1.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8yxaR1HP2bc4xFsl66eV09LXNo_KtWXiqCITskVY0tHYqUSwSH4IfBqG44ER41PGUd3OfeeacsWqlS_LsG4BhmnirmIgKinjbq-SVxlKRXEDWDbK21fkuMpZ1iH7qDaFKiIzQ4RBVXfM/s200/Capture1.JPG&quot; width=&quot;145&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8yxaR1HP2bc4xFsl66eV09LXNo_KtWXiqCITskVY0tHYqUSwSH4IfBqG44ER41PGUd3OfeeacsWqlS_LsG4BhmnirmIgKinjbq-SVxlKRXEDWDbK21fkuMpZ1iH7qDaFKiIzQ4RBVXfM/s1600/Capture1.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0e2374; line-height: 18px; margin-bottom: 1.2858em; margin-top: 1.2858em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #102370; font-family: Arial, Helvetica, sans-serif; line-height: 1em;&quot;&gt;&lt;b&gt;More useful links&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0e2374; line-height: 18px; list-style-image: initial; list-style-position: initial; margin-bottom: 1.2858em; margin-left: 1.0715em; margin-right: 0px; margin-top: 1.2858em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 1.286em; margin-bottom: 0.4286em; margin-left: 0px; margin-right: 0px; margin-top: 0.4286em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;http://www.nidirect.gov.uk/index/information-and-services/crime-justice-and-the-law/crime-prevention.htm&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0282bf; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Crime prevention (crime, justice and the law section)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 1.286em; margin-bottom: 0.4286em; margin-left: 0px; margin-right: 0px; margin-top: 0.4286em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;http://www.nidirect.gov.uk/index/information-and-services/crime-justice-and-the-law/victims-and-witnesses-of-crime.htm&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0282bf; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Victims and witnesses of crime (crime, justice and the law section)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 1.286em; margin-bottom: 0.4286em; margin-left: 0px; margin-right: 0px; margin-top: 0.4286em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;http://www.nidirect.gov.uk/index/information-and-services/crime-justice-and-the-law/the-police.htm&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0282bf; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The police (crime, justice and the law section)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 1.286em; margin-bottom: 0.4286em; margin-left: 0px; margin-right: 0px; margin-top: 0.4286em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;http://www.nidirect.gov.uk/index/information-and-services/property-and-housing/your-neighbourhood-roads-and-streets/crime-prevention-and-community-safety.htm&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0282bf; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Crime prevention and community safety (property and housing section)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 1.286em; margin-bottom: 0.4286em; margin-left: 0px; margin-right: 0px; margin-top: 0.4286em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0282bf; font-family: Arial, Helvetica, sans-serif; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;http://www.nidirect.gov.uk/index/information-and-services/property-and-housing/your-neighbourhood-roads-and-streets/derelict-buildings-and-squatters.htm&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0282bf; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Derelict buildings and squatters (property and housing section)&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #0e2374; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;Chatback has&amp;nbsp;previously&amp;nbsp;reported on &lt;/span&gt;&lt;a href=&quot;http://chatbacksecurity.blogspot.co.uk/2011/12/mps-is-launching-its-first-ever.html&quot; style=&quot;line-height: 20px;&quot; target=&quot;_blank&quot;&gt;metal thefts&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/7684931840285651705/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/protective-security-tackling-issue-of.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/7684931840285651705'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/7684931840285651705'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/protective-security-tackling-issue-of.html' title='Protective Security: Tackling The Issue of Metal Theft'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9bBhBGceRGLS4jBX8eMy3U_3zCVxLmsZxCT0A-51AOaWyLxfFvI2ATLOwjdqmFZK7XI_DevutsZ-S6Ll5w8-F6Gj_LFuXzELW0zqshxGR7b2oQNX2tz3B56biyEuTNSA7vdAswWPMxII/s72-c/52102695_metal.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-5481955515249796837</id><published>2012-04-01T09:20:00.000+01:00</published><updated>2012-04-01T18:35:20.140+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="fraud women&#39;s network"/><category scheme="http://www.blogger.com/atom/ns#" term="FWN"/><category scheme="http://www.blogger.com/atom/ns#" term="Richard Bell"/><title type='text'>Fraud Women&#39;s Network - &#39;From Fagin to Phishing&#39;</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Last Thursday I attended the 6th Annual Event and 5 year Celebration of &amp;nbsp;the Fraud Women’s Network (FWN). The event was called “From Fagin to Phishing” 200 Years of Organised Crime with presentations from Colin Woodcock MBE – SOCA and David Chernick - MD at TREACL Ltd, and Chair of PREFIT. Both presentations were very good and took us on a professional and personal journey of how organised crime changed through the ages? Or had it? How have organisations tackled and mitigated these changes? Have they? How has it evolved and shaped the way we tackle crime and look at fraudsters today?&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;But the real reason in coming together was to celebrate the FWN&#39;s 5th year anniversary, present the Stella Walsh Award and have a truly wonderful network evening where the women definitely outnumbered the men and I was one of the lucky few to be&amp;nbsp;invited.&lt;br /&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-Rqm02-z79wY/T3f5U1sllPI/AAAAAAAAAFw/RFjRRVhw3Eo/s1600/fwn_header_section.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;90&quot; src=&quot;http://2.bp.blogspot.com/-Rqm02-z79wY/T3f5U1sllPI/AAAAAAAAAFw/RFjRRVhw3Eo/s400/fwn_header_section.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
Now, some of the older, crustier and less&amp;nbsp;tolerant&amp;nbsp;men out there may just see this organisation as a bunch of raving feminists coming together to right all the wrongs in the world created by men. They couldn&#39;t be more wrong. &amp;nbsp;The FWN&#39;s strap line&amp;nbsp;isn&#39;t we hate men, far from it. Chair, Toni Sless was recorded saying the complete opposite, but it is important to recognise there are notable differences and challenges that women face everyday.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;I spoke to a number of women who attended the event to ask what they get out of it and what are some of the challenges they actually face and it was all too clear that there is a distinct lack of women in senior positions within the fraud prevention and detection arena.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;So what&#39;s this Fraud Women&#39;s Network actually all about then. Well any woman who works in the anti-fraud arena will know that it can sometimes be a rather male environment and lack true support and mentoring. The Fraud Women’s Network has therefore been set up to bring together women involved in all aspects of fraud prevention, detection, investigation and prosecution, to network and to share best practice, information and experience in order to help tackle the threat from fraud and organised crime head on. They aim to provide women in the anti-fraud business with: &lt;/span&gt;&lt;/div&gt;
&lt;ul&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Networking opportunities. Our regular networking events provide an invaluable way of establishing and cementing contacts across the whole anti-fraud arena, sharing information and ideas (they also enjoy the social aspect and are good at it)&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Access to a wide-ranging education programme about the latest trends and developments in fraud and organised crime, and the newest tools to help prevent, detect and investigate fraud;&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Mentoring opportunities. Many of the members of the Fraud Women&#39;s Network are senior within their organisations and have a great deal of knowledge, experience and advice that they can impart, as well as encouraging junior women to progress in their careers;&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Access to the members and activities of the regional Fraud Forums, all part of the National Federation of Fraud Forums.&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; margin-bottom: 0.0001pt;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
For all enquiries about the Network:&amp;nbsp;&lt;a href=&quot;mailto:info@fraudwomensnetwork.com&quot;&gt;info@fraudwomensnetwork.com&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href=&quot;http://www.fraudwomensnetwork.com/index.html&quot; style=&quot;text-align: center;&quot;&gt;Click here: for the Fraud Women&#39;s Network website&amp;nbsp;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The winners of the Stella Walsh Award 2012 were:&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Pat Turner, Manager, Virgin Media – Long Term Commitment to Preventing Fraud.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Jenny Playford DC, City of London Police – Outstanding Fraud Investigation&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
Congratulations to both, very well deserved and fascinating accounts of the work they completed.&lt;/div&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Personally, I can see real and genuine value in this network and completely support its board, membership and objectives. Do share the above website with any women who may not be in the Network, I know they&#39;d be welcome. I was delighted to be invited by the Chair and even more surprised and&amp;nbsp;honoured&amp;nbsp;to receive a mention within her&amp;nbsp;introductory&amp;nbsp;speech. A Big well done, congratulations and Happy Birthday to the Fraud Women&#39;s Network, keep up the good work and keep in touch. &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/5481955515249796837/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/04/fraud-womens-network-from-fagin-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/5481955515249796837'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/5481955515249796837'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/04/fraud-womens-network-from-fagin-to.html' title='Fraud Women&#39;s Network - &#39;From Fagin to Phishing&#39;'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-Rqm02-z79wY/T3f5U1sllPI/AAAAAAAAAFw/RFjRRVhw3Eo/s72-c/fwn_header_section.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-4712957293588392253</id><published>2012-03-27T21:36:00.000+01:00</published><updated>2012-03-29T20:49:37.439+01:00</updated><title type='text'>Yet Another Scam Email!</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;It must be that time of year again! My spam folder seems to be full of these scamsters!&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_9kPOM1rKwBGAVMOGPoFsYIUrO7BWbYshFNM3qfoQslpe-TJ6osYrPLzRTlkcjL1aATI8eBS6jfQtzpbGYigb0rbVJfbg2Tif7etRFbRSTy1iwcTgD0_CuQgggzLtZr-PRHFXPpgCgLY/s1600/fraud.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;186&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_9kPOM1rKwBGAVMOGPoFsYIUrO7BWbYshFNM3qfoQslpe-TJ6osYrPLzRTlkcjL1aATI8eBS6jfQtzpbGYigb0rbVJfbg2Tif7etRFbRSTy1iwcTgD0_CuQgggzLtZr-PRHFXPpgCgLY/s400/fraud.JPG&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Email sent via&amp;nbsp;&lt;span class=&quot;go&quot; style=&quot;background-color: rgba(255, 255, 255, 0.917969); text-align: left; vertical-align: top; white-space: nowrap;&quot;&gt;hassanmohamedlaw@yahoo.com&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/4712957293588392253/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/yet-another-scam-email.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/4712957293588392253'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/4712957293588392253'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/yet-another-scam-email.html' title='Yet Another Scam Email!'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_9kPOM1rKwBGAVMOGPoFsYIUrO7BWbYshFNM3qfoQslpe-TJ6osYrPLzRTlkcjL1aATI8eBS6jfQtzpbGYigb0rbVJfbg2Tif7etRFbRSTy1iwcTgD0_CuQgggzLtZr-PRHFXPpgCgLY/s72-c/fraud.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-8146714803814148447</id><published>2012-03-23T19:42:00.001+00:00</published><updated>2012-03-23T19:42:17.758+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="olympics"/><category scheme="http://www.blogger.com/atom/ns#" term="Paul Drury"/><title type='text'>Security: A Visit To The Olympic Park</title><content type='html'>&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The Olympic and Paralympic Games is going to be a fantastic event for the UK and with only 126 days to go the final preparations are taking place!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;I was lucky enough to have a tour of the Olympic Park today and I have to say things are looking great. Security really is top notch (and so it should be for nearly £1bn), well done to the security team on-site they are doing a great job!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4QPz6K3myYBQNdyJACQvR_7HQ5F9PnI7i4KHsRqj1HFWPxjECDqkQ7Ksd6VXQpmVq7jgy4KdER7NmX9iK1ZfFNeMsqjC4PD4s6k8ZKyvikLK1fZ39B5UldYhjArk-RqZ3DQkwBNlnBI8/s1600/March+2012-001.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4QPz6K3myYBQNdyJACQvR_7HQ5F9PnI7i4KHsRqj1HFWPxjECDqkQ7Ksd6VXQpmVq7jgy4KdER7NmX9iK1ZfFNeMsqjC4PD4s6k8ZKyvikLK1fZ39B5UldYhjArk-RqZ3DQkwBNlnBI8/s400/March+2012-001.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/8146714803814148447/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/security-visit-to-olympic-park.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/8146714803814148447'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/8146714803814148447'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/security-visit-to-olympic-park.html' title='Security: A Visit To The Olympic Park'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4QPz6K3myYBQNdyJACQvR_7HQ5F9PnI7i4KHsRqj1HFWPxjECDqkQ7Ksd6VXQpmVq7jgy4KdER7NmX9iK1ZfFNeMsqjC4PD4s6k8ZKyvikLK1fZ39B5UldYhjArk-RqZ3DQkwBNlnBI8/s72-c/March+2012-001.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-1907080693908361242</id><published>2012-03-22T20:47:00.000+00:00</published><updated>2012-03-22T20:53:42.998+00:00</updated><title type='text'>Keeping Terrorism in Perspective via Stratfor</title><content type='html'>&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Original&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 19px;&quot;&gt;&amp;nbsp;Source &lt;a href=&quot;http://www.stratfor.com/&quot; target=&quot;_blank&quot;&gt;Stratfor&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;By Scott Stewart&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;As we conclude our series on the fundamentals of terrorism, it is only fitting that we do so with a discussion of the importance of keeping terrorism in perspective.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://www.stratfor.com/sites/default/files/styles/lead_graphic_390x200/public/main/images/special_security_weekly_ANALYSIS.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;164&quot; src=&quot;http://www.stratfor.com/sites/default/files/styles/lead_graphic_390x200/public/main/images/special_security_weekly_ANALYSIS.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;By design, terrorist attacks are intended to have a psychological impact far outweighing the physical damage the attack causes. As their name suggests, they are meant to cause terror that amplifies the actual attack. A target population responding to a terrorist attack with panic and hysteria allows the perpetrators to obtain a maximum return on their physical effort. Certainly, al Qaeda reaped such a maximum return from the Sept. 11 attacks, which totally altered the foreign policy and domestic security policies of the world&#39;s only superpower and resulted in the invasion of Afghanistan and military operations across the globe. Al Qaeda also maximized its return from the March 11, 2004, Madrid train bombings, which occurred three days before the 2004 Spanish general elections that ousted the ruling party from power.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;One way to mitigate the psychological impact of terrorism is to remove the mystique and hype associated with it. The first step in this demystification is recognizing that terrorism is a tactic used by a variety of actors and that it will not go away, something we discussed at length in our&amp;nbsp;&lt;a href=&quot;http://www.stratfor.com/weekly/myth-end-terrorism&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;first analysis&lt;/a&gt;&amp;nbsp;in this series. Terrorism and, more broadly, violence are and will remain part of the human condition. The Chinese, for example, did not build the Great Wall to attract tourists, but to keep out marauding hordes. Fortunately, today&#39;s terrorists are far less dangerous to society than the Mongols were to Ming China.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Another way to mitigate the impact of terrorism is recognizing that those who conduct terrorist attacks are not some kind of Hollywood superninja commandos who can conjure attacks out of thin air. Terrorist attacks follow a discernable, predictable planning process that&amp;nbsp;&lt;a href=&quot;http://www.stratfor.com/weekly/detection-points-terrorist-attack-cycle&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;can be detected&lt;/a&gt;&amp;nbsp;if it is looked for. Indeed, by&amp;nbsp;&lt;a href=&quot;http://www.stratfor.com/weekly/practical-guide-situational-awareness&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;practicing relaxed, sustainable situational awareness&lt;/a&gt;, people can help protect themselves from terrorist attacks. When people practice situational awareness collectively, they also can help protect their communities from such attacks.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;A third important component in the demystification process is recognizing and resisting the terror magnifiers terrorist planners use in their efforts to maximize the impact of their attacks. Terrorist attacks will cause tragedy and suffering, but the targeted population can separate terror from terrorism, and minimize the impact of such attacks if they maintain the proper perspective.&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 20px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;


&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;Propaganda of the Deed&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;As we begin our examination of perspective and terror magnifiers, let&#39;s first examine the objective of terrorist planners.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Nineteenth-century anarchists promoted what they called the &quot;propaganda of the deed,&quot; or using violence as a symbolic action to make a larger point, such as inspiring the masses to undertake revolutionary action. In the late 1960s and early 1970s, modern terrorist organizations began to conduct operations designed to serve as terrorist theater, an undertaking greatly aided by the advent and spread of broadcast media. Some examples of early attacks specifically intended as made-for-television events include the September 1972 kidnapping and murder of Israeli athletes at the Munich Olympics and the December 1975 raid on OPEC headquarters in Vienna. Aircraft hijackings quickly followed suit, and were transformed from relatively brief endeavors to long, drawn-out and dramatic media events often spanning multiple continents. The image of TWA Flight 847 captain John Testrake in the window of his cockpit with a Hezbollah gunman behind him became an iconic image of the 1980s, embodying this trend.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Today, the proliferation of 24-hour television news networks and Internet news sites magnifies such media exposure. This increased exposure not only allows people to be informed minute-by-minute about unfolding events, it also permits them to become secondary, vicarious victims of the unfolding violence. The increased exposure ensures that the audience impacted by the propaganda of the deed becomes far larger than just those in the immediate vicinity of a terrorist attack. On Sept. 11, 2001, millions of people in the United States and around the world watched live as the second aircraft struck the south tower of the World Trade Center, people leapt to their deaths to escape the raging fires and the towers collapsed. Watching this sequence of events in real time profoundly impacted many people. Its effect was far greater than if people have merely read about the attacks in newspapers.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;In the wake of 9/11, a wave of terror swept the globe as people worldwide became certain that more such spectacular attacks were inevitable. The November 2008 Mumbai attacks had a similar, albeit smaller, impact. People across India were fearful of being attacked by teams of Lashkar-e-Taiba gunmen, and concern spread around the world about Mumbai-style terrorism.&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 20px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;


&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;Terror Magnifiers&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Such theatrical attacks exert a strange hold over the human imagination. The sense of terror they create can dwarf the reaction to natural disasters many times greater in magnitude. For example, more than 227,000 people died in the 2004 Indian Ocean tsunami compared to fewer than 3,000 people on 9/11. Yet the 9/11 attacks spawned a global sense of terror and a geopolitical reaction that had a profound and unparalleled impact upon world events over the past decade.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;As noted, the media magnifies this anxiety and terror. Television news, whether broadcast on the airwaves or over the Internet, allows people to experience a terrorist event remotely and vicariously, and the print media reinforces this. While part of this magnification results merely from the nature of television as a medium and the 24-hour news cycle, bad reporting and misunderstanding can build hype and terror.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;For example, a Mexican drug cartel on March 19 detonated a small explosive device in a vehicle in Ciudad Victoria. In the wake of this minor attack, the Mexican and U.S. media breathlessly reported that cartels had begun using &quot;car bombs.&quot; Journalists on both sides of the border failed to appreciate the significant tactical and operational differences between a small bomb placed in a car and the far larger and more deadly vehicle-borne explosive device, a true car bomb. The Colombian Medellin cartel employed car bombs in Bogota; it is quite significant that the cartels in Mexico have not yet done so despite possessing the necessary capabilities.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The traditional news media are not alone in the role of terror magnifier. The Internet has become an increasingly effective conduit for panic and alarm. From hysterical (and false) claims in 2005 that al Qaeda had pre-positioned nuclear weapons in the United States and was preparing to attack nine U.S. cities and kill 4 million Americans in operation &quot;American Hiroshima&quot; to 2010 claims that Mexican drug cartels were smuggling nuclear weapons into the United States for Osama bin Laden, a great deal of fearmongering can spread rapidly over the Internet.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;Website operators who earn advertising revenue based on the number of unique site visitors have an obvious financial incentive to publish outlandish and startling terrorism stories. The Internet also has produced a wide array of other startling claims, including oft-recycled e-mail chains such as the one stating that an Israeli&amp;nbsp;counter-terrorism&amp;nbsp;expert has predicted al Qaeda will attack six, seven or eight U.S. cities simultaneously &quot;within the next 90 days.&quot; This e-mail first circulated in 2005, and periodically has reappeared since then. Although it is an old, false prediction, it still creates fear every time it circulates.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Live tweets from attack sites, cell phone calls from people trapped by terrorist attacks to news outlets and the proliferation of cellphone videos on outlets like YouTube also have helped increase the vicarious-victim aspect of terror attacks. In some locations, state media will attempt to suppress media coverage, but these alternate media sources still get the news out to the wider world.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Sometimes even governments act as terror magnifiers. Certainly, in the early 2000s the media and the American public became fearful every time the U.S. Department of Homeland Security (DHS) raised its color-coded threat level. Politicians&#39; statements also can scare people. Such was the case in 2007 when DHS secretary Michael Chertoff said his gut screamed that a major terrorist attack was imminent and in 2010 when the head of French internal intelligence noted that the threat of terrorism in France was never higher.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;These warnings produce widespread public concern. A number of reasons exist for providing such warnings, from trying to pre-empt a terrorist attack when there is incomplete intelligence to a genuine concern for the safety of citizens in the face of a known threat to less altruistic motives such as political gain or bureaucratic maneuvering (when an agency wants to protect itself from blame in case there is an attack, for example). As seen by the public reaction to the many warnings in the wake of 9/11, including recommendations that citizens purchase plastic sheeting and duct tape to protect themselves from chemical and biological attack, such warnings can produce immediate panic, although, over time, as threats and warnings prove to be unfounded, this panic can turn into alert fatigue. This fatigue resulted in the DHS scrapping their color-coded alert system in 2011.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Those seeking to terrorize can and do use these magnifiers to produce terror without having to go to the trouble of conducting attacks. The empty threats bin Laden and his inner circle issued about preparing an attack larger than 9/11 -- threats propagated by the Internet, picked up by the media and then reacted to by governments -- are prime historical examples of this.&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 20px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;


&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;Stepping Back from the Spectacle&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Groups such as al Qaeda clearly recognize the difference between terrorist attacks and terror. This is seen not only in the use of empty threats to sow terror but also in the way terrorist groups claim success for failed attacks. For example, al Qaeda in the Arabian Peninsula (AQAP) declared the failed Christmas Day 2009 &quot;underwear&quot; bombing a success due to the effect it had on air travel. In a special edition of Inspire magazine&amp;nbsp;published in November 2010 following the failed attack against cargo aircraft using IEDs hidden in printer cartridges, AQAP trumpeted the operation as a success, citing the fear, disruption and expense that resulted. AQAP claimed the cargo bomb plot and the Christmas Day plot were part of what it called &quot;Operation Hemorrhage,&quot; an effort to cause economic damage and fear, not necessarily to kill large numbers of people.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;As noted above, practitioners of terrorism lose a great deal of their ability to create terror if the people they are trying to terrorize place terrorism in perspective. Terrorist attacks are going to continue to happen because there are a wide variety of militant groups and individuals willing to use violence to influence either their own or another country&#39;s government.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Terrorist attacks are relatively easy to conduct, especially if the assailant is not concerned about escaping after the attack. As AQAP has noted in its Inspire magazine, a determined person can conduct attacks using a variety of simple weapons, such as a knife, axe or gun. And while the authorities in the United States and elsewhere have proved quite successful in foiling attacks over the past few years, any number of vulnerable targets exists in the open societies of the West. Western governments simply do not have the resources to protect everything; not even authoritarian police states can protect everything. This means that some terrorist attacks invariably will succeed. How the media, governments and populations respond to those successful strikes will shape the way the attackers gauge their success. Obviously, the response to 9/11 meant the attackers probably were far more successful than they could have hoped. The London bombings on July 7, 2005, after which the British public went to work as usual the next day, were seen as less successful.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The world is a dangerous place. Everyone is going to die, and some people are certain to die in a manner that is brutal or painful. Recognizing that terrorist attacks, like car crashes and cancer and natural disasters, are part of the human condition permits people to take prudent, measured actions to prepare for such contingencies and avoid becoming victims (vicarious or otherwise). It is the resilience of the population and their perseverance that determine how much a terrorist attack is allowed to terrorize. By separating terror from terrorism, citizens can deny the practitioners of terror the ability to magnify their reach and power.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Read more&amp;nbsp;&lt;span style=&quot;text-align: left;&quot;&gt;of Stratfor&#39;s excellent series on the fundamentals of terrorism below:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 19px; text-align: justify;&quot;&gt;Click here for&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.stratfor.com/weekly/myth-end-terrorism&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Arial, Helvetica, sans-serif; line-height: 19px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;The Myth of the End of Terrorism&lt;/a&gt;&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 19px; text-align: justify;&quot;&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Click here for&amp;nbsp;&lt;a href=&quot;http://www.stratfor.com/weekly/detection-points-terrorist-attack-cycle&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Detection Points in the Terrorist Attack Cycle&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Click here for&amp;nbsp;&lt;a href=&quot;http://www.stratfor.com/weekly/detecting-terrorist-surveillance&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Detecting Terrorist Surveillance&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Click here for&amp;nbsp;&lt;a href=&quot;http://www.stratfor.com/weekly/practical-guide-situational-awareness&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;A Practical Guide to Situational Awareness&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 19px; margin-bottom: 20px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Click here for&amp;nbsp;&lt;a href=&quot;http://www.stratfor.com/analysis/jihadism-2012-persistent-low-level-threat&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Jihadism in 2012: A Persistent, Low-Level Threat&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;Read more:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.stratfor.com/weekly/keeping-terrorism-perspective#ixzz1psar53lv&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #003399; line-height: 19px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Keeping Terrorism in Perspective | Stratfor&lt;/a&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSkJlewGFvlVEgqYET9ukeggQtWe27gFTPP6L2pn6HI-EmVjlAm5mpTxfBXKK1RD4AjGB2d0YrU79A2IeoauJ9MUkzkmAiIH36oV8L9yNfkIlABEiR7mychhREUdgTFuHg0ohR6iA9eKs/s1600/Capture.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSkJlewGFvlVEgqYET9ukeggQtWe27gFTPP6L2pn6HI-EmVjlAm5mpTxfBXKK1RD4AjGB2d0YrU79A2IeoauJ9MUkzkmAiIH36oV8L9yNfkIlABEiR7mychhREUdgTFuHg0ohR6iA9eKs/s1600/Capture.JPG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/1907080693908361242/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/keeping-terrorism-in-perspective-via.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/1907080693908361242'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/1907080693908361242'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/keeping-terrorism-in-perspective-via.html' title='Keeping Terrorism in Perspective via Stratfor'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSkJlewGFvlVEgqYET9ukeggQtWe27gFTPP6L2pn6HI-EmVjlAm5mpTxfBXKK1RD4AjGB2d0YrU79A2IeoauJ9MUkzkmAiIH36oV8L9yNfkIlABEiR7mychhREUdgTFuHg0ohR6iA9eKs/s72-c/Capture.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-6488930738791635657</id><published>2012-03-20T12:20:00.001+00:00</published><updated>2012-03-20T20:54:20.766+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CISO"/><category scheme="http://www.blogger.com/atom/ns#" term="counter terror expo"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="infosec"/><category scheme="http://www.blogger.com/atom/ns#" term="Richard Bell"/><title type='text'>Information Security Breaches 2012 - Questionnarie</title><content type='html'>&lt;span class=&quot;text-block&quot; style=&quot;background-color: white; color: #4e4e4e; display: block; line-height: 21px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Research is currently being undertaken to identify information security breaches for 2012. Below is a link to a questionnaire, this is being conducted by infosecurity - Europe, in association with the department for Business, Innovation and Skills (BIS) and PricewaterhouseCoopers LLP.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;text-block&quot; style=&quot;background-color: white; color: #4e4e4e; display: block; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 11px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/-Sbp02T-z2dw/T2hzN8bFnuI/AAAAAAAAAFY/V8WqYo77CCM/s1600/infosec_pwc_logos_2012.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;102&quot; src=&quot;http://4.bp.blogspot.com/-Sbp02T-z2dw/T2hzN8bFnuI/AAAAAAAAAFY/V8WqYo77CCM/s320/infosec_pwc_logos_2012.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://reedexpo.efmfeedback.com/se.ashx?s=705E3ED671D91721&quot;&gt;Questionnaire Link - Click here&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Last year I went to the infosecurity EUROPE conference and exhibition and I have to say the presentation and format of the exhibition is very good and was probably the best large scale exhibition I visited. It&#39;s on the same time as Counter Terror Expo 2012 and although very different is well worth going along if you like security technologies of a differing sort.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://3.bp.blogspot.com/-BHpWWSwPl9c/T2h1f8_NgKI/AAAAAAAAAFg/FM9nKSa2qws/s1600/header.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;63&quot; src=&quot;http://3.bp.blogspot.com/-BHpWWSwPl9c/T2h1f8_NgKI/AAAAAAAAAFg/FM9nKSa2qws/s320/header.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/-mYNKxsluf9A/T2h14r_8W8I/AAAAAAAAAFo/rSfey9Ez4WA/s1600/header.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;40&quot; src=&quot;http://1.bp.blogspot.com/-mYNKxsluf9A/T2h14r_8W8I/AAAAAAAAAFo/rSfey9Ez4WA/s320/header.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/6488930738791635657/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/information-security-breaches-2012.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/6488930738791635657'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/6488930738791635657'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/information-security-breaches-2012.html' title='Information Security Breaches 2012 - Questionnarie'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-Sbp02T-z2dw/T2hzN8bFnuI/AAAAAAAAAFY/V8WqYo77CCM/s72-c/infosec_pwc_logos_2012.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-5107374822273492414</id><published>2012-03-13T21:23:00.000+00:00</published><updated>2012-03-13T21:23:05.042+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="olympics"/><category scheme="http://www.blogger.com/atom/ns#" term="Paul Drury"/><title type='text'>Olympics 2012 Security: Welcome To Lockdown London</title><content type='html'>&lt;div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: arial, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 19px;&quot;&gt;This is a long&amp;nbsp;article&amp;nbsp;but well worth a read....&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;background-color: white; font-family: arial, sans-serif; font-size: 16px; line-height: 19px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;background-color: white; font-family: arial, sans-serif; font-size: 16px; line-height: 19px;&quot;&gt;London 2012 will see the UK&#39;s biggest mobilisation of military and security forces since the second world war and the effects will linger long after the athletes have left.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;background-color: white; font-family: arial, sans-serif; font-size: 16px; line-height: 19px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: black; line-height: normal; text-align: -webkit-auto;&quot;&gt;By Stephen Graham&lt;/span&gt;&lt;br style=&quot;color: black; line-height: normal; text-align: -webkit-auto;&quot; /&gt;&lt;a href=&quot;http://www.guardian.co.uk/sport/2012/mar/12/london-olympics-security-lockdown-london?newsfeed=true&quot; style=&quot;line-height: normal; text-align: -webkit-auto;&quot; target=&quot;_blank&quot;&gt;guardian.co.uk&lt;/a&gt;&lt;span style=&quot;color: black; line-height: normal; text-align: -webkit-auto;&quot;&gt;, Monday 12 March 2012 20.26 GMT&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;As a metaphor for the&amp;nbsp;London&amp;nbsp;Olympics, it could hardly be more stark. The much-derided &quot;Wenlock&quot; Olympic mascot is now available in London Olympic stores dressed as a Metropolitan&amp;nbsp;police&amp;nbsp;officer. For £10.25 you, too, can own the ultimate symbol of the Games: a member of by far the biggest and most expensive security operation in recent British history packaged as tourist commodity. Eerily, his single panoptic-style eye, peering out from beneath the police helmet, is reminiscent of the all-seeing eye of God so commonly depicted at the top of Enlightenment paintings. In these, God&#39;s eye maintained a custodial and omniscient surveillance on His unruly subjects far below on terra firma.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The imminent Olympics will take place in a city still recovering from riots that the Guardian-LSE&amp;nbsp;Reading the Riots&amp;nbsp;project showed were partly fuelled by resentment at their lavish cost. Last week,&amp;nbsp;the UK spending watchdog warned that the overall costs of the Games were set to be at least £11bn&amp;nbsp;– £2 bn over even recently inflated budgets. When major infrastructure projects such as Crossrail, speeded up for the Games, are factored in, the figure may be as high as £24bn, according to Sky News. The estimated cost put forward only seven years ago when the Games were won was £2.37 bn.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;With the required numbers of security staff more than doubling in the last year, estimates of the Games&#39; immediate &lt;a href=&quot;http://www.chatbacksecurity.com/&quot; target=&quot;_blank&quot;&gt;security costs&lt;/a&gt; have doubled from £282m to £553m. Even these figures are likely to end up as dramatic underestimates: the final security budget of the 2004 Athens Olympics were around £1bn.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcPbkQKLtpdnr0KGVUtqnHOnwMTd-qVIP7KdINoEhOMIpTjIOUSfAhP5o12dRLjFo_hWidowse4nyt6mGA2a8Z3UtpESZJ5MQsr4LG5XvLmQsOes_CKB826fduWrqKeY5EMDOkB96zzGY/s1600/Giant+Olympic+rings+pass+the+O2+arena.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;211&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcPbkQKLtpdnr0KGVUtqnHOnwMTd-qVIP7KdINoEhOMIpTjIOUSfAhP5o12dRLjFo_hWidowse4nyt6mGA2a8Z3UtpESZJ5MQsr4LG5XvLmQsOes_CKB826fduWrqKeY5EMDOkB96zzGY/s320/Giant+Olympic+rings+pass+the+O2+arena.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;All this in a city convulsed by massive welfare, housing benefit and legal aid cuts, spiralling unemployment and rising social protests. It is darkly ironic, indeed, that large swaths of London and the UK are being thrown into ever deeper insecurity while being asked to pay for a massive security operation, of unprecedented scale, largely to protect wealthy and powerful people and corporations.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Critics of the Olympics have not been slow to point out the dark ironies surrounding the police Wenlock figure. &quot;Water cannon and steel cordon sold separately,&quot; mocks Dan Hancox on the influential&amp;nbsp;Games Monitor&amp;nbsp;website. &quot;Baton rounds may be unsuitable for small children.&quot;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;In addition to the concentration of sporting talent and global media, the London Olympics will host the biggest mobilisation of&amp;nbsp;military&amp;nbsp;and security forces seen in the UK since the second world war.&amp;nbsp;More troops – around 13,500 – will be deployed than are currently at war in Afghanistan. The growing security force is being estimated at anything between 24,000 and 49,000 in total. Such is the secrecy that no one seems to know for sure.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;During the Games an aircraft carrier will dock on the Thames. Surface-to-air missile systems will scan the skies. Unmanned drones, thankfully without lethal missiles, will loiter above the gleaming stadiums and opening and closing ceremonies. RAF Typhoon Eurofighters will fly from RAF Northolt. A thousand armed US diplomatic and FBI agents and 55 dog teams will patrol an Olympic zone partitioned off from the wider city by an 11-mile, £80m, 5,000-volt electric fence.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Beyond these security spectaculars, more stealthy changes are underway. New, punitive and potentially invasive laws such as the London Olympic Games Act 2006 are in force. These legitimise the use of force, potentially by private security companies, to proscribe Occupy-style protests. They also allow Olympic security personnel to deal forcibly with the display of any commercial material that is deemed to challenge the complete management of London as a &quot;clean city&quot; to be branded for the global TV audience wholly by prime corporate sponsors (including McDonald&#39;s, Visa and Dow Chemical).&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;London is also being wired up with a new range of scanners, &lt;a href=&quot;http://www.chatbacksecurity.com/&quot; target=&quot;_blank&quot;&gt;biometric ID cards&lt;/a&gt;, number-plate and &lt;a href=&quot;http://www.chatbacksecurity.com/&quot; target=&quot;_blank&quot;&gt;facial-recognition CCTV systems&lt;/a&gt;, disease tracking systems, new police control centres and checkpoints. These will intensify the sense of lockdown in a city which is&amp;nbsp;&lt;sup style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; bottom: 0.8ex; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: 0px;&quot;&gt;&lt;/sup&gt;already a byword across the world for remarkably intensive surveillance.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Many such systems, deliberately installed to exploit unparalleled security budgets and relatively little scrutiny or protest, have been designed to linger long after the athletes and VIPs have left. Already, the Dorset police are proudly boasting that their new number-plate recognition cameras, built for sailing events, are allowing them to catch criminals more effectively.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;In Athens, the $300m &quot;super-panopticon&quot; CCTV and information system built for the Games following intense US pressure remained after the event, along with the disused sports facilities. In fact, the system has been used by Greek police trying in vain to control the mass uprisings responding to the crash and savage austerity measures in the country.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkIW3pWJZqEhsusrYBN2J364Mipf3sX4WPPC1tx-QjE4h8c91TJ6cT-3H_8UF4C5hyYdjdKtgj0w_Vn8mDLTHfFGy3dYl_21gy0cSxrJfGVshSzStiogL2hz0B6NLfqQyAQg38_y8v6fA/s1600/article-2063744-0ECCFED300000578-335_224x311.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkIW3pWJZqEhsusrYBN2J364Mipf3sX4WPPC1tx-QjE4h8c91TJ6cT-3H_8UF4C5hyYdjdKtgj0w_Vn8mDLTHfFGy3dYl_21gy0cSxrJfGVshSzStiogL2hz0B6NLfqQyAQg38_y8v6fA/s1600/article-2063744-0ECCFED300000578-335_224x311.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;It is important to remember that all this is ostensibly designed to secure the spectacle of 17,000 athletes competing for 17 days. Even if London&#39;s overall security budget remains similar to that of Athens, that works out at the startling figure of £59,000 of public money to secure each competitor or £3,500 per competitor per day. In 2004, the cost in now-bankrupt Athens was £90,000 per competitor (for a smaller number of athletes than are likely to attend London). This was a major contributor, as part of the overall £10bn costs, to Greece&#39;s subsequent debt crisis.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;In the context of post-austerity Britain, these figures are eye-watering. Even more remarkably, given that Olympics budgets have drawn down from many other public and lottery funds, and are no doubt adding hugely to UK national debt,&amp;nbsp;the Daily Telegraph recently argued that the security operation for the Olympics were &quot;key to aiding the recovery of UK plc&quot;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;How can we make sense of this situation? Four connected points need emphasis here. The first is that, amid a global economic crash, so-called &quot;homeland security&quot; industries – a loose confederation of defence, IT and biotechnology industries – are in bonanza mode. As this post 9/11 paradigm is being diffused around the world, the industry – worth $142bn in 2009 – is expected to be worth a staggering $2.7tn globally between 2010 and 2020. Growth rates are between 5% and 12% a year.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The UK, long an exemplar &quot;surveillance society&quot;, is especially attractive to these industries, especially when hosting the Olympics. Recent &lt;a href=&quot;http://www.chatbacksecurity.com/&quot; target=&quot;_blank&quot;&gt;security industry magazines&lt;/a&gt; have been full of articles excitedly extolling the Olympics as a &quot;key driver of the industry&quot; or as &quot;keeping the market buoyant&quot;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Nation states, and the EU, are struggling to ensure that their corporations get a piece of the action in markets long dominated by US and Israeli firms. Ramping up surveillance is thus now as much a part of economic policy as a response to purported threats.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The security boom is unaffected, or perhaps even fuelled, by the global crash, as wealthy and powerful elites across the world seek ever-more fortified lifestyles. Essentially, it is about defence and security corporations building huge new income streams by systematically exploiting three linked trends: the lucrative possibilities created by post 9/11 fears; widening privatisation and out-sourcing in the context of deep austerity programmes; and the desire of big city and national governments to brand themselves as secure destinations for major global events.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Booming security markets are so lucrative that accusations of corruption are often made. Siemens, a major security contractor at Athens,&amp;nbsp;allegedly paid huge bribes&amp;nbsp;to get the job from its internal slush fund.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Crucially, though, as Naomi Klein points out in her book The Shock Doctrine, the security boom also involves attempts to diffuse the technologies honed in counterinsurgency and colonial war in places such as Gaza, Kabul and Baghdad – drones, helicopters, data mining, biometrics, security zones, so-called &quot;non-lethal weapons&quot; (devices used to disperse crowds) – to the domestic &quot;global&quot; cities of Asia and the west.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Particular glee that Israeli-style security arrangements are now being widely implemented is evident among the CEOs of large Israeli security and defence contractors, which are doing especially well in the security boom. Leo Gleser is president of ISDS, a company that proudly proclaims that it was established by ex-Mossad agents and which was involved in £200m worth of security contracts for the Athens Games. He talks of &quot;growing tsunamis of violence, criminal acts, and global insecurity triggered by the 9/11 events&quot; which made the &quot;the western world finally understand that measures had to be taken&quot;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Olympics are especially important opportunities to cement the security boom still further. They are the ultimate global security shop windows through which states and corporations can advertise their latest high-tech wares to burgeoning global markets while making massive profits.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&quot;The Olympics is a tremendous opportunity to showcase what the private sector can do in the security space,&quot; a&amp;nbsp;Whitehall official was quoted recently as saying&amp;nbsp;in a Financial Times defence supplement. &quot;Not only do you have a UK security kitemark on the product but you&#39;ve got an Olympic kitemark to boot.&quot;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The main security contractor for the London Olympics – G4S, more familiar under its old Group 4 moniker – is the world&#39;s largest security company. Beyond its £130m Olympic security contracts, it operates the world&#39;s largest private security force – 630,000 people – taking up a myriad of outsourced contracts. It secures prisons, asylum detention centres, oil and gas installations, VIPs, embassies, airports (including those in Doncaster and Baghdad) and infrastructure, and operates in 125 countries.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;According to its website, G4S specialises in particular in what it terms &quot;executive style life-support in hazardous environments&quot;. (Presumably this refers to Baghdad and not east London.) After buying up the ArmorGroup security company in 2008, it also now runs a large number of operations in Iraq. This month it was announced that G4S will also be the first private security corporation to run UK police stations with over half of Lincolnshire&#39;s police force actually moving over to the company.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The second point is that the homeland and Olympic security boom is being fuelled by the widening adoption of the idea of &quot;asymmetric&quot; war as the key security idea among nation states, militaries and corporations. Here, rather than war with other states, the main challenge for states is deemed to be mobilising more or less permanently against vague non-state or civilian threats that lurk within their own cities and the infrastructures that connect them.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;In practice, such a shift has massive and troubling implications. As we have seen with the so-called war on terror, it works to dramatically blur longstanding legal, political and ethical lines demarcating war and war-like acts from peace and criminal acts. It also fuses policing, military operations and the intelligence services much more closely as all three seek to build bigger and bigger surveillance operations to try to predict threats, especially those within the vulnerable labyrinths of big cities.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Such an approach translates easily into a deep suspicion of cosmopolitan cities, multi-ethnic populations and the rights of migrant citizens, a process accelerated by the 7/7 atrocities in London the day after the Olympics were announced in 2005.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;In May 2011 the&amp;nbsp;Metropolitan Police&amp;nbsp;announced that they were redeploying 290 cameras that had been installed as counter-terror systems in two predominantly Muslim areas of Birmingham to London for the Games. Recently, the&amp;nbsp;Home Office warned Waltham Forest Council&amp;nbsp;– home of part of the Olympic Park – that it is home to a large group of radicalised second- and third-generation Asian Britons who potentially pose&amp;nbsp;&lt;a href=&quot;http://www.guardian.co.uk/uk/2012/mar/09/lone-wolves-olympic-security-threat&quot; style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #005689; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot; title=&quot;&quot;&gt;a terrorist threat to the Games&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;More visibly, this shift means that the familiar security architecture of airports and international borders – checkpoints, scanners, ID cars, cordons, security zones – start to materialise in the hearts of cities. What this amounts to, in practice, is an effort to roll out the well-established architecture and surveillance of the airport to parts of the wider, open city. The &quot;rings of steel&quot; around the City and Docklands in London were early examples of this.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The third explanation for the Olympic security boom is to be found by looking in more detail at how risks are considered in planning the events since the 9/11 attacks. Olympics security operations have grown beyond all recognition since 2000 because they have been shaped by new types of risk assessment.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The symbolic importance and prestige of the Games for cities, nations and corporations has meant that historical ideas of proportionality have basically been abandoned. Instead, as&amp;nbsp;Canadian sociologists Phil Boyle and Kevin Haggerty have shown, security planning has tried to create the impossible illusion of total security by countering all threats, no matter how outlandish, unlikely or nightmarish.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4DWrH_xqqRtVYyrDCIinHFLs1jesucXdb63FzC3ITjeYdRjeAjkUTjgosJNZiSKaz9vyMeNZaubD4Ixk7ogyEC0u5uhyphenhyphen2Ydhyphenhyphene4V6bOBJ8o93bZxa5BcYpCvuI1nsS6gv3OS9w1vr798/s1600/National-Security-Strategy_14-09-11.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;224&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4DWrH_xqqRtVYyrDCIinHFLs1jesucXdb63FzC3ITjeYdRjeAjkUTjgosJNZiSKaz9vyMeNZaubD4Ixk7ogyEC0u5uhyphenhyphen2Ydhyphenhyphene4V6bOBJ8o93bZxa5BcYpCvuI1nsS6gv3OS9w1vr798/s320/National-Security-Strategy_14-09-11.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Crucially, all such threats are now deemed equally valid. A&amp;nbsp;model developed by the Rand corporation&amp;nbsp;to help with planning for the London Games outlines in detail 27 possible threat scenarios and the means to counter them. Meeting them helps also to demonstrate the awesome power, and elite status, of the host city or state in the wider world.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This helps account for the ever-more baroque security and surveillance operations surrounding Olympic events. It also helps explain how, under enormous pressure from the US – whose security corporations benefited hugely in the process – the security budget for Sydney ($180m, or $16,000 an athlete) was multiplied eight times for Athens only four years later ($1.5bn and $142,000, respectively). The Beijing operations, in an authoritarian country, not surprisingly eclipsed both Athens and London and came in at a staggering $6.5bn.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The final point is how the security operations of Olympics have major long-term legacies for their host cities and nations. The security preoccupations of Olympics present unprecedented opportunities to push through highly elitist, authoritarian and speculative urban planning efforts that otherwise would be much more heavily contested – especially in democracies. These often work to &quot;purify&quot; or &quot;cleanse&quot; diverse and messy realities of city life and portray existing places as &quot;waste&quot; or &quot;derelict&quot; spaces to be transformed by mysterious &quot;trickle-down effects&quot;. The scale and nature of evictions and the clearance of streets of those deemed not to befit such events can seem like systematic ethnic or social cleansing. To make way for the Beijing Games, 1.5 million were evicted; clearances of local businesses and residents in London, though more stealthy, have been marked.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Such efforts often amount in effect to expensive, privatised, elitist and gentrifying projects such as the Westfield shopping centre in Stratford (the first UK shopping centre, incidentally, to have explosives scanners at all entrances).&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;During the Games themselves, so-called &quot;Olympic Divides&quot; are especially stark. In London, a citywide system of dedicated VIP &quot;Games lanes&quot; are being installed. Using normally public road space, these will allow 4,000 luxury, chauffeur-driven BMWs to shuttle 40,000 Olympic officials, national bureaucrats, politicians and corporate sponsors speedily between their five-star hotels, super-yachts and cordoned-off VIP lounges within the arenas. It has recently been shown that&amp;nbsp;wealthy tourists will be able to enter the VIP lanes by purchasing £20,000 package trips.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Ordinary Londoners, meanwhile – who are paying heavily for the Games through council tax hikes – will experience much worse congestion. Even their ambulances will be proscribed from the lanes if they are not running blue lights.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;More broadly, a huge increase in land values tends to benefit only the wealthy property speculators and financiers that are best placed to ride the wave. Already, the Qatar royal family have bought the 1,400 homes of the Olympic village in a deal worth £557m.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Looking at these various points together shows one thing: contemporary Olympics are society on steroids. They exaggerate wider trends. Far removed from their notional or founding ideals, these events dramatically embody changes in the wider world: fast-increasing inequality, growing corporate power, the rise of the homeland security complex, and the shift toward much more authoritarian styles of governance utterly obsessed by the global gaze and prestige of media spectacles.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;• Stephen Graham is professor of cities and society at Newcastle University. His latest book, Cities Under Siege, is published by Verso, priced £14.99. To order a copy for £14.99 with free UK p&amp;amp;p, go to&amp;nbsp;&lt;a href=&quot;http://www.guardianbookshop.co.uk/BerteShopWeb/viewProduct.do?ISBN=9781844677627&quot; style=&quot;border-collapse: collapse; color: #005689; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot;&gt;guardian.co.uk/bookshop&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/5107374822273492414/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/olympics-2012-security-welcome-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/5107374822273492414'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/5107374822273492414'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/olympics-2012-security-welcome-to.html' title='Olympics 2012 Security: Welcome To Lockdown London'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcPbkQKLtpdnr0KGVUtqnHOnwMTd-qVIP7KdINoEhOMIpTjIOUSfAhP5o12dRLjFo_hWidowse4nyt6mGA2a8Z3UtpESZJ5MQsr4LG5XvLmQsOes_CKB826fduWrqKeY5EMDOkB96zzGY/s72-c/Giant+Olympic+rings+pass+the+O2+arena.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-6857177018898167088</id><published>2012-03-13T09:56:00.001+00:00</published><updated>2012-03-13T18:04:58.374+00:00</updated><title type='text'>Police Oracle Latest Cartoon</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeGGJJHnSaaur21SVtEKysOwl1IVresnQgzRD95hqYRrcqPPlwb-NBQ4Hfwuet9ejqbGHIWCi-jIu8ba8pe7Vm72V4dig5Nk_Z3_mWmKhIFPVY0MyIOTlTO5R3Reu-4gM69XnkMrASAwE/s640/blogger-image-89744756.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;283&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeGGJJHnSaaur21SVtEKysOwl1IVresnQgzRD95hqYRrcqPPlwb-NBQ4Hfwuet9ejqbGHIWCi-jIu8ba8pe7Vm72V4dig5Nk_Z3_mWmKhIFPVY0MyIOTlTO5R3Reu-4gM69XnkMrASAwE/s400/blogger-image-89744756.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/6857177018898167088/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/police-oracle-latest-cartoon.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/6857177018898167088'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/6857177018898167088'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/police-oracle-latest-cartoon.html' title='Police Oracle Latest Cartoon'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeGGJJHnSaaur21SVtEKysOwl1IVresnQgzRD95hqYRrcqPPlwb-NBQ4Hfwuet9ejqbGHIWCi-jIu8ba8pe7Vm72V4dig5Nk_Z3_mWmKhIFPVY0MyIOTlTO5R3Reu-4gM69XnkMrASAwE/s72-c/blogger-image-89744756.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-6390652500985125801</id><published>2012-03-09T19:55:00.000+00:00</published><updated>2012-03-09T20:13:34.691+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="olympics"/><category scheme="http://www.blogger.com/atom/ns#" term="Paul Drury"/><title type='text'>Olympic Security: Be Aware and Prepare</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: right;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtpqd9vcvYmlHdW5eiAbbN7U4mqj9P0CQYPVc0xw43zCbTnUff8vN0f37mzk0xTtSgIUJpB9SqMw7iRPv5Pytwxoyc12y795nK3EgiYE_c-7gsix7IhHzVYvzl20xjjBv3xH9oeBZu6Pk/s1600/sia-logo.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtpqd9vcvYmlHdW5eiAbbN7U4mqj9P0CQYPVc0xw43zCbTnUff8vN0f37mzk0xTtSgIUJpB9SqMw7iRPv5Pytwxoyc12y795nK3EgiYE_c-7gsix7IhHzVYvzl20xjjBv3xH9oeBZu6Pk/s1600/sia-logo.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #333333; font-family: Arial, Helvetica, sans-serif; line-height: 16px;&quot;&gt;The 2012 Olympic and Paralympic Games will have an impact on security across the whole of the UK. The Games themselves are being held at locations across Britain and at the same time there will be the usual UK Summer events: festivals, Wimbledon, the FI British Grand Prix, etc.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #333333; font-family: Arial, Helvetica, sans-serif; line-height: 16px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; line-height: 16px; margin-bottom: 1.2em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;If you work in the private security industry you need to be mindful of what is happening in your area before and during Games time - will you need to provide additional security? Will your business be affected? You need to plan for this now.&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; line-height: 16px; margin-bottom: 1.2em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Similarly, if you are a security buyer then you need to be aware that there will be an unprecedented call on private security across the UK this summer. You need to make sure that your security provider(s) will be able to supply the cover you need.&lt;/span&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgT54V0ozUKo3w4GOliyB6Ku9kzq4a9DkwBhkfJ4TnFmFiO0ZsaNlcsXtoyae8Ng8BC_2GgOEMEo5d7byTLqOalpnlmYMSndb3OyPexB45-7NXAusvlR0YcUBy6YCBK0hbxEin1SWVov9E/s1600/Capture1.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgT54V0ozUKo3w4GOliyB6Ku9kzq4a9DkwBhkfJ4TnFmFiO0ZsaNlcsXtoyae8Ng8BC_2GgOEMEo5d7byTLqOalpnlmYMSndb3OyPexB45-7NXAusvlR0YcUBy6YCBK0hbxEin1SWVov9E/s200/Capture1.JPG&quot; width=&quot;143&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;SIA Fact Sheet&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 1.2em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #333333; font-family: Arial, Helvetica, sans-serif; line-height: 16px;&quot;&gt;The full fact can be downloaded &lt;/span&gt;&lt;a href=&quot;http://www.sia.homeoffice.gov.uk/Documents/olympics/olympics-factsheet.pdf&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 16px;&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The SIA has dedicated a section of&amp;nbsp;their&amp;nbsp;&lt;a href=&quot;http://www.sia.homeoffice.gov.uk/Pages/olympics.aspx&quot; target=&quot;_blank&quot;&gt;website &lt;/a&gt;to the 2012 Games. Here you will find some useful information including:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.sia.homeoffice.gov.uk/Documents/olympics/olympics-enforcement.pdf&quot; target=&quot;_blank&quot;&gt;Compliance and Enforcement: Olympic Preparation&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.sia.homeoffice.gov.uk/Documents/olympics/olympics-guidance.pdf&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: -webkit-auto;&quot; target=&quot;_blank&quot;&gt;Guidance for Security Personnel&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 1.2em; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #333333; font-family: Arial, Helvetica, sans-serif;&quot;&gt;Further details for visitors on safety and security for the games can be found at the &lt;/span&gt;&lt;a href=&quot;http://www.london2012.com/safety-and-security&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot; target=&quot;_blank&quot;&gt;London 2012 website&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/6390652500985125801/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/olympic-security-be-aware-and-prepare.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/6390652500985125801'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/6390652500985125801'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/olympic-security-be-aware-and-prepare.html' title='Olympic Security: Be Aware and Prepare'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtpqd9vcvYmlHdW5eiAbbN7U4mqj9P0CQYPVc0xw43zCbTnUff8vN0f37mzk0xTtSgIUJpB9SqMw7iRPv5Pytwxoyc12y795nK3EgiYE_c-7gsix7IhHzVYvzl20xjjBv3xH9oeBZu6Pk/s72-c/sia-logo.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-1104153346230737675</id><published>2012-03-06T17:25:00.000+00:00</published><updated>2012-03-14T21:16:37.514+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Paul Drury"/><category scheme="http://www.blogger.com/atom/ns#" term="physical security"/><title type='text'>Physical Security - A Visit to Hadrian&#39;s Wall</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Richard and I were in area, it would be rude not to visit Hadrian&#39;s Wall. Physical Security doesn&#39;t get much better then this, 73 miles long, survived for over 2,000 years and only took 6 years to complete!&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkZPbbAZseS_ii6Yt1bHDD72Upra5joFlSVJRh74cDcgBCMMiC_TWtNX_TzJ8f2LzlgktqFF6f5xIEOQbYmfeC5iJav654KH4VwkzIg6XtVE5o1iaVLceb0ru4h5AFEYdxH3_5Gl5Jchc/s1600/March+2012.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkZPbbAZseS_ii6Yt1bHDD72Upra5joFlSVJRh74cDcgBCMMiC_TWtNX_TzJ8f2LzlgktqFF6f5xIEOQbYmfeC5iJav654KH4VwkzIg6XtVE5o1iaVLceb0ru4h5AFEYdxH3_5Gl5Jchc/s400/March+2012.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/1104153346230737675/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/physical-security-hadrians-wall.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/1104153346230737675'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/1104153346230737675'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/physical-security-hadrians-wall.html' title='Physical Security - A Visit to Hadrian&#39;s Wall'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkZPbbAZseS_ii6Yt1bHDD72Upra5joFlSVJRh74cDcgBCMMiC_TWtNX_TzJ8f2LzlgktqFF6f5xIEOQbYmfeC5iJav654KH4VwkzIg6XtVE5o1iaVLceb0ru4h5AFEYdxH3_5Gl5Jchc/s72-c/March+2012.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-7902669399522796967</id><published>2012-03-04T14:58:00.004+00:00</published><updated>2012-03-04T19:14:16.353+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="counter terrorism"/><category scheme="http://www.blogger.com/atom/ns#" term="fbi"/><category scheme="http://www.blogger.com/atom/ns#" term="met police"/><category scheme="http://www.blogger.com/atom/ns#" term="Paul Drury"/><title type='text'>Counter Terrorism: Potential Indicators of Terrorist Activities or It&#39;s Probably Nothing, But....</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://content.met.police.uk/Campaign/counterterrorismfeb2012&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgA3akw2tnjZbwpR3V96SKV2AS-B1eTJSAuKzpmawyPkmqmhTr_N0Ii07BmYO3NNcmtzi47_jebat8ZylmXbi7YeTze2Y_SZF0Pl8YAewwrqT97BicdoSc_2Jem05erFDf4S-5x6pW0YE/s320/Capture.JPG&quot; /&gt;&lt;/a&gt; &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&#39;It&#39;s probably nothing&#39; but your call could save lives - that&#39;s the &lt;/span&gt;&lt;a href=&quot;http://content.met.police.uk/Campaign/counterterrorismfeb2012&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;message &lt;/a&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;of a Metropolitan Police Service (MPS)&amp;nbsp;&lt;a href=&quot;http://www.chatbacksecurity.com/&quot; target=&quot;_blank&quot;&gt;counter-terrorism &lt;/a&gt;publicity campaign which seems to get reincarnated each year. It&#39;s supported by radio, poster and 1.4m leaflet drop to households in London.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Overall its actually a good campaign and asks the public to question the norm - just in case it&#39;s something much more.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This however compares to the recently publicised FBI campaign which includes these actions as deemed &#39;suspicious&#39;:&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTg6i2GC6-EsqxOifVb0Wu_kkNBWb8vnGssDqU-7kq-j208YhNwp7L7msdGQKnWHJOnBvQjM3kpsYY9Vx34XvROFpBUe-C-mt5qnc2RaufFF3CRc68ugsAzDlFrbS9Ow740AAe2UmsVks/s1600/fbi.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTg6i2GC6-EsqxOifVb0Wu_kkNBWb8vnGssDqU-7kq-j208YhNwp7L7msdGQKnWHJOnBvQjM3kpsYY9Vx34XvROFpBUe-C-mt5qnc2RaufFF3CRc68ugsAzDlFrbS9Ow740AAe2UmsVks/s200/fbi.JPG&quot; width=&quot;161&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Using multiple mobile sim cards&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Pays with cash&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Communicates using VOIP&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Uses encryption&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Trying to shield your computer screen from others&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Sound familiar? Some of these are basic security measures which I and people I know do, but are we terrorists - I think not! The full details of the 25 FBI campaigns can be viewed &lt;a href=&quot;http://publicintelligence.net/fbi-suspicious-activity-reporting-flyers/&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;So its MPS 1 - FBI 0&lt;/span&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy5bWq7Utsvk6YugTE-vXzzrIO4s-3OyV18-O5Yf8fIYCLi2N7-1zpnIMGzfCMavUd6MwnVA7BlDeKEPVI2pzgLTHhEp5GckdpQ2FqMN0jeZbugjwWnr4E11T5JgLjv0b02fu6Jul3Y54/s1600/Capture1.JPG&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy5bWq7Utsvk6YugTE-vXzzrIO4s-3OyV18-O5Yf8fIYCLi2N7-1zpnIMGzfCMavUd6MwnVA7BlDeKEPVI2pzgLTHhEp5GckdpQ2FqMN0jeZbugjwWnr4E11T5JgLjv0b02fu6Jul3Y54/s200/Capture1.JPG&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: x-small;&quot;&gt;In the UK call the confidential&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: x-small;&quot;&gt;Anti-Terrorist Hotline&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/7902669399522796967/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/counter-terrorism-potential-indicators.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/7902669399522796967'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/7902669399522796967'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/03/counter-terrorism-potential-indicators.html' title='Counter Terrorism: Potential Indicators of Terrorist Activities or It&#39;s Probably Nothing, But....'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgA3akw2tnjZbwpR3V96SKV2AS-B1eTJSAuKzpmawyPkmqmhTr_N0Ii07BmYO3NNcmtzi47_jebat8ZylmXbi7YeTze2Y_SZF0Pl8YAewwrqT97BicdoSc_2Jem05erFDf4S-5x6pW0YE/s72-c/Capture.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-257195411239879013</id><published>2012-02-28T15:44:00.001+00:00</published><updated>2012-03-02T19:57:02.814+00:00</updated><title type='text'>At a glance, the story so far at TECH:TOUCHSTONE Information Security Summit</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Today I attended day one of the Information Security Executive Summit delivered by Tech:Touchstone at the Richmond Hill Hotel. This is a summit where practitioners and end users meet in a speed presentation dating environment. An environment I think works quite well if you are considering purchases in the InfoSec application arena. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The day started with the usual introductions and housekeeping by the event Director Russ Morrow @russmorrow then straight into an Opening Keynote on Data Leakage by the Global Head of Information Security at UBS, who may have been lost in translation a little by basically he was saying that although good any Data Leakage tool on their own are useless. It&#39;s more about policy, processes, procedures, people, culture, very refreshing. Then we moved onto the PCeU and DI responsible for Industry Liaison who shared with us the background of enforcement input combatting cybercrime.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;When attending an event similar to this you have to undertake a number of networking and 1-2-1 sessions with sponsors, which is certainly a fair trade for attending and participating. There is always a constant supply of coffee and it&#39;s never the hard sell, so I think most people are happy to trade.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;After a break it was the turn of the Information Commissioners Office (ICO) and their principle policy advisor, who and you probably won&#39;t be surprised certainly got the attention of those attending supported by a lively discussion.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;You can always measure a summit or conference by the facilities, presenters and food provided and so far Tech: Touchstone haven&#39;t disappointed. Mini Fish and Chips on offer, I might be easily pleased but that gets my vote straight away.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Coming up in the afternoon session are speakers from The BIG Lottery Fund talking mobile working and closing with the Head of Information Security from Oxfam. More to follow, but so far very impressed on day one, day two can go either way but that&#39;s down to me as I&#39;m presenting in the afternoon on security risk, assurance and what type of things affect me from a very noon technological int of view.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Of course before any of that is drinks, more networking And a gala dinner as organised and prepared by the renowned chef Brian Turner who retweeted one of my earlier tweets saying I was looking forward to dinner tonight and that was about 10am in the morning.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;More to follow but for now if you want to follow proceedings at the summit search and follow #techtouch on twitter.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Catch up soon. Richard &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Posted using BlogPress from my iPad&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://www.signcraftgroup.co.uk/&quot; style=&quot;margin-left: auto; margin-right: auto;&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfeVH8A1U2mCv0brILR3DRvoH0qZttZdKE5NUN0XJzIgF6fU9o-Cz8km_cBI59KL_nDOQIAujFp3dVTRTSk85jSdUbfe6gY_QpeAEfcWxHlyqnNqvM1RIFWGFN_TfGaBCxKEYuLI2PoQU/s1600/signcraft.JPG&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white; text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: arial, helvetica, sans;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;Signcraft are Gloucestershire&#39;s&amp;nbsp;oldest&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial, helvetica, sans;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;&amp;nbsp;and most respected sign makers&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/257195411239879013/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/02/at-glance-story-so-far-at.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/257195411239879013'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/257195411239879013'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/02/at-glance-story-so-far-at.html' title='At a glance, the story so far at TECH:TOUCHSTONE Information Security Summit'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfeVH8A1U2mCv0brILR3DRvoH0qZttZdKE5NUN0XJzIgF6fU9o-Cz8km_cBI59KL_nDOQIAujFp3dVTRTSk85jSdUbfe6gY_QpeAEfcWxHlyqnNqvM1RIFWGFN_TfGaBCxKEYuLI2PoQU/s72-c/signcraft.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-1147014647267349609</id><published>2012-02-20T20:12:00.000+00:00</published><updated>2012-02-20T20:34:51.422+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CISO"/><category scheme="http://www.blogger.com/atom/ns#" term="CSO"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Richard Bell"/><category scheme="http://www.blogger.com/atom/ns#" term="Richmond Hill Hotel"/><category scheme="http://www.blogger.com/atom/ns#" term="Tech:Touchstone"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>Press Release - Tech:Touchstone: Information Security Executive Summit 2012</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.informationsecuritysummit.com/&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;111&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9uz4h0OUifKEUTtbz-yvFGsKW9A9edhMzZR9Uee_FFCmmZdOH3tkynxOSQR6HCG1jkxuBFEkzfhEOkeIJqcWtts2Wd_iesahECjLDRY-J_khgn2U-Z0SevwvvMjrIzJftYhyiVFFHBjo/s320/logo.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;I am attending and presenting at the following Information &lt;a href=&quot;http://www.informationsecuritysummit.com/overview.html&quot;&gt;Security Summit&lt;/a&gt;. The organisers contacted me today and asked if I could share today&#39;s Press Release. Please see below the composed release for the Information Security Summit that I will no doubt talk more about before, during and after.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Tech:Touchstone announces its &lt;a href=&quot;http://www.informationsecuritysummit.com/overview.html&quot;&gt;3rd Annual Information Security Executive Summit&lt;/a&gt; from the 28th - 29th February at the Richmond Hill Hotel.  The 3rd Annual Information Security Executive Summit will cover the critical issues and considerations that &lt;a href=&quot;http://www.chatbacksecurity.com/&quot;&gt;Information Technology&lt;/a&gt; and Information Security leaders need to be mindful of when planning their IT strategy for 2012 and beyond.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Speakers at the event include: Tony Hird, Chief Technologist at British Airways Plc, Christophe Gabioud, Global Head of IS at UBS Investment Bank, and Michael Paisley, Head of IS, DP &amp;amp; Business Resilience at Santander UK Group. Each speaker will bring their unique take on how their business implements Information Security Strategy and Technology on a daily basis, as well as the major trends to look out for in 2012.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The summit brings together the most decision ready Senior IT Executives, the foremost Analysts and Vendors in the Information Security Technology Community to network, discuss and learn about the latest developments in Information Security. It has proved crucial for many businesses to assess their current technological standing and build new relationships and alliances in markets which rely more and more heavily on technology for day to day business process.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;“We are excited to host such a high level group of thought leaders in the Information Security space representing some the UK’s largest organisations” said Simeon Turner Managing Director of Tech:Touchstone, “The new threats created by increased workforce mobility and the move to cloud infrastructures is forcing constant reassessment of key strategies. We look forward to facilitating an engaging debate!”&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The &lt;a href=&quot;http://www.chatbacksecurity.com/&quot;&gt;Information Security Executive Summit 2012&lt;/a&gt; will look to build upon previous year’s success of bringing the best in business together to formulate and build new partnerships. Sponsors of the event include: Symantec, TrendMicro,&amp;nbsp;Imperva, Caretower, Netwrix, FoxT and Loghythm &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;About Tech:TouchStone&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Tech:Touchstone creates business-to-business events, with its latest event being the Information Security Executive Summit on the 28th-29th February, for the IT sector where face-to-face communication is paramount to fully understand complex issues, solutions and value propositions. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The company&#39;s portfolio of events focuses on areas of strategic industry debate and growth market sectors, with the aim of creating a collaborative learning environment for time-poor IT executives and to facilitate high value, quality interactions between all participants.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;If you’re interested in attending this event or any other please contact the Tech:Touchstone team on 0208 166 4390 and follow them on Twitter &lt;a href=&quot;https://twitter.com/#!/TechTouchstone&quot;&gt;@TechTouchstone&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/1147014647267349609/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/02/techtouchstone-information-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/1147014647267349609'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/1147014647267349609'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/02/techtouchstone-information-security.html' title='Press Release - Tech:Touchstone: Information Security Executive Summit 2012'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9uz4h0OUifKEUTtbz-yvFGsKW9A9edhMzZR9Uee_FFCmmZdOH3tkynxOSQR6HCG1jkxuBFEkzfhEOkeIJqcWtts2Wd_iesahECjLDRY-J_khgn2U-Z0SevwvvMjrIzJftYhyiVFFHBjo/s72-c/logo.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-8773754037576215426</id><published>2012-02-01T21:10:00.000+00:00</published><updated>2012-02-01T21:11:15.202+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Jobs"/><category scheme="http://www.blogger.com/atom/ns#" term="Paul Drury"/><title type='text'>Job Opportunity: Head of Security - Olympic Park Legacy Company</title><content type='html'>&lt;br /&gt;
&lt;h3 style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #009344; font-size: 20px; font-weight: inherit; line-height: 20px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;

&lt;a href=&quot;http://www.legacycompany.co.uk/wp-content/themes/legacy/images/header-logo.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Home&quot; border=&quot;0&quot; src=&quot;http://www.legacycompany.co.uk/wp-content/themes/legacy/images/header-logo.gif&quot; style=&quot;cursor: move;&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Head of Security&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 1.5em;&quot;&gt;Comprehensive Benefits Package + Local Government Pension Scheme&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; line-height: 1.5em;&quot;&gt;Salary: £68,058 per annum&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; line-height: 1.5em;&quot;&gt;2 Year Fixed Term Contract&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; line-height: 1.5em;&quot;&gt;Role based in East London&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Harnessing the energy and investment from the London 2012 Olympic and Paralympics Games, the Olympic Park Legacy Company will oversee the transformation of the Olympic Park into a thriving new community over the next three decades.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;In order to achieve our vision, we are now looking to recruit an exceptional and dynamic Head of Security within our Park Operations and Venues directorate.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The Head of Security will be responsible for the development and implementation of robust security strategies, programmes and arrangements across the Queen Elizabeth Olympic Park, including interaction with venues and events. This is a key role in creating and maintaining a new destination for London, with a quality park, incorporating world-class venues and events at its heart.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;You will develop and maintain strong relationships with the Metropolitan Police on a London-wide basis and at a local borough level.&amp;nbsp;You will work closely with key stakeholders and be aware at all times of any security threats or matters that may affect the Park, its infrastructure and venues.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;You will have an appropriate security background and understanding, and possess first class communication skills to engage with all security personnel working across the Park with various operators and working within the agreed Company strategy in an appropriate and collaborative manner.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;To apply for this position please download an application pack below&amp;nbsp;and email your completed application to:&lt;a href=&quot;mailto:humanresources@legacycompany.co.uk&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #01b1dd; font-style: inherit; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot; target=&quot;_blank&quot; title=&quot;Send an email to Human Resources at the Legacy Company&quot;&gt;humanresources@legacycompany.co.uk&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Aternatively, you can post it to us at our address as detailed on&amp;nbsp;&lt;a href=&quot;http://www.legacycompany.co.uk/info/contact-us/&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #01b1dd; font-style: inherit; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot; title=&quot;Visit our Contact Us section on this website&quot;&gt;our Contact Us page&lt;/a&gt;. Please state ‘FAO: Human Resources’ on the envelope. Please note CVs will not be accepted.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Interviews are anticipated on&amp;nbsp;&lt;strong style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: inherit; font-weight: bold; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;23&lt;sup style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; font-style: inherit; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;rd&lt;/sup&gt;&amp;nbsp;February 2012&lt;/strong&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The closing date for this position is&amp;nbsp;&lt;strong style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: inherit; font-weight: bold; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;5pm&amp;nbsp;&lt;/strong&gt;on&lt;strong style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: inherit; font-weight: bold; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&amp;nbsp;15&lt;sup style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; font-style: inherit; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;th&lt;/sup&gt;&amp;nbsp;February 2012&lt;/strong&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;More details can be found on the&lt;a href=&quot;http://www.legacycompany.co.uk/about-us/work-with-us/&quot; target=&quot;_blank&quot;&gt; Olympic Park Legacy Companies website&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #4f4f4f; font-size: 13px; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;h3 style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #009344; font-family: &#39;Trebuchet MS&#39;, Trebuchet, Tahoma, sans-serif; font-size: 20px; font-weight: inherit; line-height: 20px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;

Resources&lt;/h3&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: &#39;Trebuchet MS&#39;, Trebuchet, Tahoma, sans-serif; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: &#39;Trebuchet MS&#39;, Trebuchet, Tahoma, sans-serif; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a class=&quot;btn btn-icon btn-icon-download&quot; href=&quot;http://www.legacycompany.co.uk/media/Head-of-Security-job-description-Jan-2012.pdf&quot; style=&quot;background-color: transparent; background-image: url(http://www.legacycompany.co.uk/wp-content/themes/legacy/images/btn-icon-download.gif); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-style: none; border-color: initial; border-color: initial; border-image: initial; border-left-style: none; border-right-style: none; border-style: initial; border-top-style: none; border-width: initial; color: #01b1dd; display: inline-block; font-style: inherit; font-weight: bold; height: 17px; line-height: 17px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 24px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot; target=&quot;_blank&quot; title=&quot;Download our Head of Security job description&quot;&gt;Job Description&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: &#39;Trebuchet MS&#39;, Trebuchet, Tahoma, sans-serif; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a class=&quot;btn btn-icon btn-icon-download&quot; href=&quot;http://www.legacycompany.co.uk/media/Application-form-Feb-2011.doc&quot; style=&quot;background-color: transparent; background-image: url(http://www.legacycompany.co.uk/wp-content/themes/legacy/images/btn-icon-download.gif); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-style: none; border-color: initial; border-color: initial; border-image: initial; border-left-style: none; border-right-style: none; border-style: initial; border-top-style: none; border-width: initial; color: #01b1dd; display: inline-block; font-style: inherit; font-weight: bold; height: 17px; line-height: 17px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 24px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot; target=&quot;_blank&quot; title=&quot;Download our Application form&quot;&gt;Application form&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: &#39;Trebuchet MS&#39;, Trebuchet, Tahoma, sans-serif; line-height: 1.5em; list-style-image: initial; list-style-position: initial; list-style-type: none; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a class=&quot;btn btn-icon btn-icon-download&quot; href=&quot;http://www.legacycompany.co.uk/media/Equality-Opportunities-Monitoring-form-Feb-2011.doc&quot; style=&quot;background-color: transparent; background-image: url(http://www.legacycompany.co.uk/wp-content/themes/legacy/images/btn-icon-download.gif); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-style: none; border-color: initial; border-color: initial; border-image: initial; border-left-style: none; border-right-style: none; border-style: initial; border-top-style: none; border-width: initial; color: #01b1dd; display: inline-block; font-style: inherit; font-weight: bold; height: 17px; line-height: 17px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 24px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot; target=&quot;_blank&quot; title=&quot;Download our Equal Opportunities form&quot;&gt;Equal Opportunities form&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/8773754037576215426/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/02/job-opportunity-head-of-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/8773754037576215426'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/8773754037576215426'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/02/job-opportunity-head-of-security.html' title='Job Opportunity: Head of Security - Olympic Park Legacy Company'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-2935051747803728615</id><published>2012-01-30T22:21:00.001+00:00</published><updated>2012-01-30T22:25:47.192+00:00</updated><title type='text'>Chatback Security&#39;s Word Cloud - Physical Security, Personnel Security and Information Security</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVh7PAEywiDMpy6Byh9AhmL-9WjwChEJIUIHPGkfwnlZSh7rlR6TGBPo0xG4HKnoukJwmMgdrrOjm4L9TT1Rs-XPXhVDjYwHuEDRSJtvzupnnMY2Z0bbCBYFbsOG8aThpF8L9JVZ7OXTY/s1600/wordle260112.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;205&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVh7PAEywiDMpy6Byh9AhmL-9WjwChEJIUIHPGkfwnlZSh7rlR6TGBPo0xG4HKnoukJwmMgdrrOjm4L9TT1Rs-XPXhVDjYwHuEDRSJtvzupnnMY2Z0bbCBYFbsOG8aThpF8L9JVZ7OXTY/s400/wordle260112.JPG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/2935051747803728615/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/01/chatback-security-word-cloud.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/2935051747803728615'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/2935051747803728615'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/01/chatback-security-word-cloud.html' title='Chatback Security&#39;s Word Cloud - Physical Security, Personnel Security and Information Security'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVh7PAEywiDMpy6Byh9AhmL-9WjwChEJIUIHPGkfwnlZSh7rlR6TGBPo0xG4HKnoukJwmMgdrrOjm4L9TT1Rs-XPXhVDjYwHuEDRSJtvzupnnMY2Z0bbCBYFbsOG8aThpF8L9JVZ7OXTY/s72-c/wordle260112.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-6873111790219317176</id><published>2012-01-30T18:07:00.000+00:00</published><updated>2012-01-30T18:39:28.859+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber crime"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="Paul Drury"/><title type='text'>Security Threat Report 2012 - Hacktivism, Cybercriminals and Malware</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiUYVeqI-oLEdh2N6vk6Oxa6e0NyLLr0fLs4CU5Pbh-GlHbtA8E3s0rmBEioLGJTeTqeWjmijTrElOVv0CF8Ih8KU9ttibLbTLumKiR7iTzEF3klaGjAWQToLPXERUAMdaHgt1D2R7Omg/s1600/Capture.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; display: inline !important; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiUYVeqI-oLEdh2N6vk6Oxa6e0NyLLr0fLs4CU5Pbh-GlHbtA8E3s0rmBEioLGJTeTqeWjmijTrElOVv0CF8Ih8KU9ttibLbTLumKiR7iTzEF3klaGjAWQToLPXERUAMdaHgt1D2R7Omg/s1600/Capture.JPG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: FlamaLight, Arial, sans-serif; font-size: small; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: FlamaLight, Arial, sans-serif; font-size: small; text-align: justify;&quot;&gt;Foreword by&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: small; text-align: left;&quot;&gt;Gerhard Eschelbeck,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: small; text-align: left;&quot;&gt;CTO, Sophos&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: small; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; margin-bottom: 14px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
Over the past year we in the IT security industry have seen a growing awareness of the work we do.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; margin-bottom: 14px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
In 2011, a number of highly visible cyberattacks made news headlines around the world, but the underlying problem affects us all. It seems that the &lt;a href=&quot;http://www.chatbacksecurity.com/&quot; target=&quot;_blank&quot;&gt;cybercriminals &lt;/a&gt;are getting bolder in their attacks as the availability of commercial tools makes mass generation of new malicious code campaigns and exploits easier. The net result has been significant growth in volume of malware and infections.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; margin-bottom: 14px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
And for 2012, I anticipate growing sophistication in web-borne attacks, even broader use of mobile and smart devices, and rapid adoption of cloud computing bringing new security challenges.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; margin-bottom: 14px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
The web will undoubtedly continue to be the most prominent vector of attack. Cybercriminals tend to focus where the weak spots are and use a technique until it becomes far less effective. We saw this with spam email, which is still present but less popular with cybercriminals as people deploy highly effective gateways. The web remains the dominant source of distribution for &lt;a href=&quot;http://www.chatbacksecurity.com/&quot; target=&quot;_blank&quot;&gt;malware &lt;/a&gt;—in particular malware using social engineering, or targeting the browser and associated applications with exploits. Social media platforms and similar web applications have become hugely popular with the bad guys, a trend that is only set to continue.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; margin-bottom: 14px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://docs.google.com/open?id=0ByIG02xSvBqdMDk5MDZiMjMtZjY5Mi00MTNmLTk0ODQtZWUzMTkxMDcyZDI1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQYYp4r8dnJvl3Nzs6PKvfD3FK-6TMUPQqUsKUeV8PojEgXmNtTVojjp5vvWBVVtBMHJ2e6xWmmEe0GZq1ilDwTYQrzBOx4byRIdBJtN5yUnUiqLlGFGNMjHOomi_47s4MqgdlFH-JM5o/s200/Capture.JPG&quot; width=&quot;150&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Click above image to read &lt;br /&gt;full the report&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
The rapid inflow of consumer-owned smartphones and tablets is causing significant security challenges for many organizations. IT departments are being asked to connect devices to corporate networks and secure data on these devices, which they have very little control over. Due to the high degree of mobility, security requirements are plentiful, including enforcement of use policies, corporate data encryption, access to corporate networks, productivity/content filtering, and of course malware protection. The unique nature of modern form factors (in terms of processing power, memory, battery life) requires rethinking of security and defense mechanisms.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; margin-bottom: 14px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
Cloud computing is one of the most significant revolutions in delivering software applications to users, and can significantly improve the effectiveness and manageability of security solutions—web security, data protection, or even endpoint and mobile security managed via the cloud are great examples. The service model takes the burden of managing applications away from the user, but introduces new issues of security and privacy for data at rest and in transit.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; margin-bottom: 14px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
Protecting data in a world where systems are changing rapidly and information flows freely introduces a whole new set of people, process and technology challenges, reinforced by enhanced scrutiny by compliance and regulatory bodies. As we all radically reform the way we communicate and share data, we can expect cybercriminals to hook themselves into these systems to tout their nasty malicious code.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; margin-bottom: 14px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
With this edition of the &lt;a href=&quot;http://www.chatbacksecurity.com/&quot; target=&quot;_blank&quot;&gt;Sophos Security Threat Report&lt;/a&gt;, we want to share our latest research on hacktivism, online threats, mobile malware, cloud computing, and social network security. And we offer a look ahead to the coming year.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; margin-bottom: 14px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Best wishes,&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Gerhard Eschelbeck&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;CTO, Sophos&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/6873111790219317176/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/01/security-threat-report-2012-hacktivism.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/6873111790219317176'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/6873111790219317176'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/01/security-threat-report-2012-hacktivism.html' title='Security Threat Report 2012 - Hacktivism, Cybercriminals and Malware'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiUYVeqI-oLEdh2N6vk6Oxa6e0NyLLr0fLs4CU5Pbh-GlHbtA8E3s0rmBEioLGJTeTqeWjmijTrElOVv0CF8Ih8KU9ttibLbTLumKiR7iTzEF3klaGjAWQToLPXERUAMdaHgt1D2R7Omg/s72-c/Capture.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-4250355665289900243</id><published>2012-01-28T21:12:00.001+00:00</published><updated>2012-01-28T21:34:15.318+00:00</updated><title type='text'>What do you do when your twitter account has been compromised.</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Like most out there I have received lots of DM&#39;s from twitter followers recently that would either not usually contact me or that are not following me. Now, I don&#39;t believe my account has been compromised and up until yesterday I didn&#39;t do anything about others that had contacted me. On Friday though I received a couple of DM&#39;s from a family relation telling me I should see what others have been writing about me on twitter, this caused me alarm as I know they would not be bothered what was said about me, but I spoke to them and advised them they should change their password and check to see if their twitter account had been used to authorise other applications as a bit of a starter for 10. But, today I received a mail-shot from and saw the &lt;a href=&quot;http://nakedsecurity.sophos.com/2012/01/28/what-do-i-do-if-my-twitter-account-is-hacked/?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29&quot; target=&quot;_blank&quot;&gt;Naked Security&lt;/a&gt; twitter feed giving the best information I have seen so far. So I thought i&#39;d share it, thanks to all at Naked Security as always very helpful and relevant information. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Best Regards Richard &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;@securityspeak&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://www.chatbacksecurity.com/&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEja7bBnxhWeki50Rk-MhuTPp85LqVTT539U90NjadewGi8SNjCgf3bi6pTBbiw-F6DIyKTvtKz1we4by4Y3gjXndmSzrvCU26qzf_8YhT8Zvjob1FmDaBw6GZhxA4FhG5dXNzXfYYb8u4M/s200/twitterdead250.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://nakedsecurity.sophos.com/2012/01/28/what-do-i-do-if-my-twitter-account-is-hacked/?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29&quot; target=&quot;_blank&quot;&gt;Orginal Source: Naked Security&lt;/a&gt; : Many Naked Security readers email our tips email account every day asking for help when their online accounts are compromised.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;I thought it might be a good idea to provide a step-by-step guide to recover from some common attacks people fall victim to, beginning with Twitter.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;There are two primary methods for your Twitter account to become compromised. Either you authorized a malicious application to connect to your account, or your password was guessed/stolen.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The first thing to do as soon as you notice a problem is to scan your system with an up to date anti-virus product to be sure your machine isn’t infected and doesn’t have a keylogger installed. Next you need to set a new password. As always we recommend selecting a strong password that is unique for each website.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;If mixing numbers, letters, punctuation and case is too complicated (because you aren’t using a password manager) then the most important thing to remember is that size *does* matter. Going long is better than something short with a number on the end.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Then you should review the applications you have granted access to your Twitter account. To view the list log in to Twitter, select your account in the upper-right corner and choose settings, then click on the Applications tab.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;You’ll notice this account has a rogue application installed, Your Profile Views, that has already been suspended by Twitter.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;You could just revoke access to any applications you don’t trust, but I recommend starting over and revoking all of them. You can simply reauthorize any applications you are actually using as you need them.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The last step is to tweet out an apology to your friends and be sure to alert the Twitter team by sending a message to @safety.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.chatbacksecurity.com/&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;75&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKkxPfaqlT6M5AjyMtS0YrtTCeoKzF3hOfYy3dep8flyFM6wMjAQBCwtiOQr-yh2Hh6opNfWuzHu60HUaHzZtUbeqlChpaWGwd2gmqaNiPHGOPmZVUrPg0ETvUEgGulKvk1kEwXMZfLAU/s320/twittersafety.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;To stay aware of the latest scams and warnings, it is a good idea to follow @safety as well as @NakedSecurity, and even @spam if you wish to stay abreast of the latest spammer activity.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Often corporate accounts can fall victim to hackers, most often from insecure choice of passwords and the need for multiple people to be able to tweet from the accounts to maintain 24/7 coverage.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;There are some great solutions that can help you ensure the shared account has a good password without needing to share it.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Services like GroupTweet and HootSuite allow you to delegate tweeting to other user accounts and even moderate tweets before they are posted (in the paid versions).&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This won’t prevent your employees from choosing a poor password for their own account, but with the moderation feature you can prevent any damage to your brand by accepting a bit of management overhead.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;I hope this is helpful to those of you who need to recover your Twitter accounts and for those of us who have to help bail out our friends when they are in trouble.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;I will continue to update this article with any additional insights posted in the comments and keep it as a living post.&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/4250355665289900243/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/01/what-do-you-do-when-your-twitter.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/4250355665289900243'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/4250355665289900243'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/01/what-do-you-do-when-your-twitter.html' title='What do you do when your twitter account has been compromised.'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEja7bBnxhWeki50Rk-MhuTPp85LqVTT539U90NjadewGi8SNjCgf3bi6pTBbiw-F6DIyKTvtKz1we4by4Y3gjXndmSzrvCU26qzf_8YhT8Zvjob1FmDaBw6GZhxA4FhG5dXNzXfYYb8u4M/s72-c/twitterdead250.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-1366842084735788171</id><published>2012-01-24T09:53:00.000+00:00</published><updated>2012-01-24T20:30:02.061+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="mobile phone hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Paul Drury"/><title type='text'>Mobile Phone Hacking and How To Prevent It</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Mobile phone hacking isn&#39;t a new phenomenon it has been taking place for years, it normally occurs via two methods:&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_ZoTdlmvzBYnWA3sbUkvaQLJR-Qp6yDhyx0DViTnsVj3bVGkwhIzkUoYoJITIUhXBXTRk-dMGLbHgFlAzTA9ZcF-7T73ETwBoiaZ9-M5xuq7v8Btyf6S5q8oiLEH5WF0bGwW0LMPFUQ8/s1600/206981-ifw_hacking_180.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; m$=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_ZoTdlmvzBYnWA3sbUkvaQLJR-Qp6yDhyx0DViTnsVj3bVGkwhIzkUoYoJITIUhXBXTRk-dMGLbHgFlAzTA9ZcF-7T73ETwBoiaZ9-M5xuq7v8Btyf6S5q8oiLEH5WF0bGwW0LMPFUQ8/s1600/206981-ifw_hacking_180.jpg&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Voicemail hacking&lt;/strong&gt; – somebody remotely listening to your phone’s voicemail messages&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Data hacking&lt;/strong&gt; – somebody viewing or stealing information stored on your phone (or a PC based backup), such as phone numbers, bank account details and emails.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Celebrities have been the main targets for&amp;nbsp;the mobile phone hacks because that apparently sells newspapers&amp;nbsp;but fraudsters&amp;nbsp;will also target us &#39;normal&#39; people to obtain our sensitive data so as they can commit fraud or to sell the data on. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Voicemail hacking&amp;nbsp;is an invasion of privacy but what information can really be obtained&amp;nbsp; from a left message (?), well really that depends on the person leaving it I suppose....&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Hackers can get away with such simple access thanks to a massive flaw, namely that public voicemail systems don&#39;t record the numbers from which the service is being accessed, only the time of access. This alone would make simple voicemail hacks harder to execute by leaving a trail of evidence of access.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Some simple preventive measures are:&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;em&gt;Voicemail hacking&lt;/em&gt; normally takes place via the system that allows you to listen to your messages when you don&#39;t have your mobile with you or your away from&amp;nbsp;home. This is normally via a land line number (or your own land line number if its a home based answer phone system) and then you enter a &lt;a href=&quot;http://en.wikipedia.org/wiki/Personal_identification_number&quot;&gt;security pin&lt;/a&gt; to listen to your messages however most people never change their pin from the default which is normally 1234 or 0000. If you don’t change this pin code then a phone hacker could potentially listen to your voicemails by entering one of the default pins.&amp;nbsp;Assuming your new pin is&amp;nbsp;four digits, that allows up to 10,000 possible combinations for a hacker to guess, not completely secure but a reasonable start. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://www.google.co.uk/search?hl=en&amp;amp;client=safari&amp;amp;biw=1260&amp;amp;bih=868&amp;amp;q=mobile%20phone%20hacking%20stories&amp;amp;gs_sm=e&amp;amp;gs_upl=2266l8142l0l28l25l0l10l10l0l282l2874l1.4.9l14&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;tbo=u&amp;amp;tbm=nws&amp;amp;source=og&amp;amp;sa=N&amp;amp;tab=wn&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;112px&quot; m$=&quot;true&quot; src=&quot;http://news.bbcimg.co.uk/media/images/48964000/jpg/_48964468__48528268__48379535_newspapers_redesign-1-1.jpg&quot; width=&quot;200px&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;Click the image to read some of &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;the recent news stories&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;﻿﻿﻿&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;em&gt;Data hacking&lt;/em&gt; is a significant risk as most of us now walk around with the same amount of data storage in our mobiles as our PCs are capable of holding at home. To minimise the risk of your mobile data falling into the wrong hands you could try the following:&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Be careful where you store sensitive information - for example don&#39;t use a non secure &#39;notes&#39; type app to store your credit card, bank account or pin codes in. Use a secure (password/pin protected) app or better still don&#39;t store this type of information anywhere!&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Avoid public wi-fi – Avoid checking emails, logging into mobile banking sites and accessing private information when your phone is connected to public wi-fi such as those in coffee shops – as these are often insecure.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Set a phone password – If your phone’s lost or stolen then a password could stop a data hacker in their tracks.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Turn off &lt;a href=&quot;http://en.wikipedia.org/wiki/Bluetooth&quot;&gt;Bluetooth&lt;/a&gt; – When you’re not using Bluetooth always turn it off as hackers could use the wireless connection to gain remote access to your phone.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Turn off auto-complete – Some phones save user names and passwords automatically to help you log-in faster next time, but this could also help a hacker access your personal data. Check your phone’s “Settings” menu to see if it is automatically storing information.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Delete your browsing history – Not seeing a list of which websites you’ve recently visited and the information you’ve accessed might be a little inconvenient, but clearing your mobile phone’s Internet browser history, cookies and cache will make it harder for a hacker to get your data.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Remote locate, lock or wipe - sign up to a &lt;a href=&quot;http://itunes.apple.com/app/find-my-iphone/id376101648&quot;&gt;&#39;mobileme - find my iphone&#39;&lt;/a&gt;&amp;nbsp;type service that allows you via another authorised device or web page to locate, lock, wipe or send an alert to your lost (or stolen) device. There has been a few good &lt;a href=&quot;http://news.google.co.uk/news/more?hl=en&amp;amp;client=safari&amp;amp;biw=1260&amp;amp;bih=868&amp;amp;q=Woman+Tracks+Down+Stolen+iPhone&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;ncl=dMjpC5rMWI9XgHMkshegpq-tafjUM&amp;amp;ei=CCEUToaCM8anhAfq9JTuDQ&amp;amp;sa=X&amp;amp;oi=news_result&amp;amp;ct=more-results&amp;amp;resnum=2&amp;amp;ved=0CCsQqgIwAQ&quot;&gt;media stories&lt;/a&gt; on these services.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The recent stories in the media are not good news for the people who have experienced the hacks but this is only the tip of the iceberg&amp;nbsp;for sure. Accessing people&#39;s voicemails has for a longtime been a &#39;tool&#39; that law enforcement and investigators have utilised to gain intel but thanks to this recent media coverage fraudsters will now jump on the band wagon. You have been warned!&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Posted using BlogPress from my iPhone&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp; - which is password protected ;-)&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/1366842084735788171/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2011/07/mobile-phone-hacking-and-how-to-prevent.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/1366842084735788171'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/1366842084735788171'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2011/07/mobile-phone-hacking-and-how-to-prevent.html' title='Mobile Phone Hacking and How To Prevent It'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_ZoTdlmvzBYnWA3sbUkvaQLJR-Qp6yDhyx0DViTnsVj3bVGkwhIzkUoYoJITIUhXBXTRk-dMGLbHgFlAzTA9ZcF-7T73ETwBoiaZ9-M5xuq7v8Btyf6S5q8oiLEH5WF0bGwW0LMPFUQ8/s72-c/206981-ifw_hacking_180.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-5099381163477890989</id><published>2012-01-23T21:53:00.000+00:00</published><updated>2012-01-23T22:19:46.248+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="crime"/><category scheme="http://www.blogger.com/atom/ns#" term="Paul Drury"/><title type='text'>Survey: Crime has risen by 4%, public more satisfied with police and councils</title><content type='html'>&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;Original news source:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.securitynewsdesk.com/2012/01/19/breaking-news-crime-has-risen-by-4-public-more-satisfied-with-police/&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot; target=&quot;_blank&quot;&gt;Security News Desk&lt;/a&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: #111111; font-size: 14px; line-height: 22px; margin-bottom: 1.571em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Crime in the UK rose by 4%, with violent crime up 9%, according to the latest British Crime Survey data.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #111111; font-size: 14px; line-height: 22px; margin-bottom: 1.571em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;In the 12 months to September 2011, the period covered by today’s report, crime reported by the survey rose by 4%. This&amp;nbsp;was broken down by:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Vandalism – down 7%&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Burglary – up 5%&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Vehicle-related theft – up 7%&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Bicycle theft – down 8%&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Other household theft – up 4%&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Theft from the person – up 12%&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;other theft of personal property – up 14%&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;All violence – up 9%&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;All BCS crime – up 4%&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;color: #111111; font-size: 14px; line-height: 22px; margin-bottom: 1.571em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://www.homeoffice.gov.uk/publications/science-research-statistics/research-statistics/crime-research/hosb0112/hosb0112?view=Binary&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW9Gm8K_ydV2Ghl5kQhr9OfTP7_tVJn1C00pC_gAOZyWfsKVuMyO9AeoBl-Bib-j4_YOYBp3adFis5hXPvKXN_I9MPoghhERjeWJBeMmCFg5OKLeFom9jT-x4offbRibNbqABZiw_vP2o/s200/Capture.JPG&quot; width=&quot;140&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;British Crime Survey&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The survey covers August 2011 when there were significant disturbances in cities across England.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: #111111; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 22px; text-align: justify;&quot;&gt;Editor’s view:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.securitynewsdesk.com/2012/01/19/editor%E2%80%99s-view-crime-survey-indicates-need-for-more-and-better-cctv/&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 22px; text-align: justify;&quot; target=&quot;_blank&quot;&gt;Let’s help business tackle street crime with CCTV&lt;/a&gt;&lt;br /&gt;
&lt;ul style=&quot;color: #111111; font-size: 14px; line-height: 22px; list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 1.571em; margin-left: 1.571em; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;/ul&gt;
&lt;div style=&quot;color: #111111; font-size: 14px; line-height: 22px; margin-bottom: 1.571em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;During the same period of time, the police reported a 4% decrease across all categories of crime. The BCS survey complements data collected from the police and often contradicts police figures. This is because BCS data is based on interviews with individuals and includes incidents which are not reported to the police.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #111111; font-size: 14px; line-height: 22px; margin-bottom: 1.571em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The survey notes an 11% increase in personal crime in the period, but discounts this as a blip and points to data since 2004/05 to claim that crime levels have remained relatively unchanged.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #111111; font-size: 14px; line-height: 22px; margin-bottom: 1.571em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The 9% increase in violent crime was said to be not statistically significant and there is no upward trend in violence, especially in light of an 8% fall in violent crime recorded by police last year and a five-year downward trend.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #111111; font-size: 14px; line-height: 22px; margin-bottom: 1.571em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Meanwhile, robberies of businesses has fallen while personal robbery (street robbery for phones, bags and cash) has risen by 4% according to police figures, supporting the 12% rise noted in the BCS survey. 50% of all street robbery takes place in London where there has been a 13% increase.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #111111; font-size: 14px; line-height: 22px; margin-bottom: 1.571em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;And police and councils are getting the credit for beating crime, with 57% of those questioned saying they were doing a good job compared to just over half last year.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;wp-caption alignright&quot; id=&quot;attachment_8176&quot; style=&quot;background-color: #eeeeee; border-bottom-color: rgb(221, 221, 221); border-bottom-style: solid; border-bottom-width: 0.071em; border-left-color: rgb(221, 221, 221); border-left-style: solid; border-left-width: 0.071em; border-right-color: rgb(221, 221, 221); border-right-style: solid; border-right-width: 0.071em; border-top-color: rgb(221, 221, 221); border-top-style: solid; border-top-width: 0.071em; color: #111111; float: right; font-size: 14px; font-style: italic; line-height: 22px; margin-bottom: 1.571em; margin-left: 1.571em; margin-right: 0px; margin-top: 0px; padding-bottom: 0.714em; padding-left: 0.714em; padding-right: 0.714em; padding-top: 0.714em; text-align: center; width: 168px;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://www.securitynewsdesk.com/wp-content/uploads/2012/01/BSIA-Trevor-Elliott.jpg&quot; rel=&quot;shadowbox[sbpost-8141];player=img;&quot; style=&quot;color: #2361a1; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;BSIA-Trevor-Elliott&quot; class=&quot;size-medium wp-image-8176 &quot; height=&quot;210&quot; src=&quot;http://www.securitynewsdesk.com/wp-content/uploads/2012/01/BSIA-Trevor-Elliott-240x300.jpg&quot; style=&quot;border-bottom-style: none; border-color: initial; border-image: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; title=&quot;BSIA-Trevor-Elliott&quot; width=&quot;168&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;wp-caption-text&quot; style=&quot;font-size: 0.857em; line-height: 1.5em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Trevor Elliott, director of manpower and membership services, BSIA&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;color: #111111; font-size: 14px; line-height: 22px; margin-bottom: 1.571em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Trevor Elliott, director of manpower and membership services of the &lt;a href=&quot;http://www.chatbacksecurity.com/&quot; target=&quot;_blank&quot;&gt;British Security Industry Association (BSIA)&lt;/a&gt;, said,&amp;nbsp;”The quoted reduction in robberies of businesses is certainly encouraging and a testament to the work carried out by the police, the business sector and the private security industry to diminish the incidence of this type of crime. However, commercial crime is still an unwelcome reality and in order to continue reducing its effects on businesses it is essential for all parties to continue working together effectively.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #111111; font-size: 14px; line-height: 22px; margin-bottom: 1.571em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;“Businesses should check that their security measures are reliable and up-to-date. CCTV equipment, manned guarding and access control systems such as item tags have time and again proven invaluable in deterring criminals and responding more effectively to offences, but to get the most out of these systems they must be properly installed and monitored and provided by expert and professional security companies.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #111111; font-size: 14px; line-height: 22px; margin-bottom: 1.571em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;“The improved effectiveness of the security systems in place will in fact not only deter criminals, but also ensure immediate police response and facilitate the conviction of offenders.”&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #111111; font-size: 14px; line-height: 22px; margin-bottom: 1.571em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong style=&quot;font-family: Arial, Helvetica, sans-serif; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Links&lt;/strong&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.homeoffice.gov.uk/publications/science-research-statistics/research-statistics/crime-research/hosb0112/&quot; style=&quot;color: #2361a1; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; target=&quot;_blank&quot; title=&quot;Opens in new window&quot;&gt;British Crime Survey&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.bsia.co.uk/&quot; target=&quot;_blank&quot;&gt;British Security Industry Association &lt;/a&gt;(BSIA)&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Original news source: &lt;a href=&quot;http://www.securitynewsdesk.com/2012/01/19/breaking-news-crime-has-risen-by-4-public-more-satisfied-with-police/&quot; target=&quot;_blank&quot;&gt;Security News Desk&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/5099381163477890989/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/01/survey-crime-has-risen-by-4-public-more.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/5099381163477890989'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/5099381163477890989'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/01/survey-crime-has-risen-by-4-public-more.html' title='Survey: Crime has risen by 4%, public more satisfied with police and councils'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW9Gm8K_ydV2Ghl5kQhr9OfTP7_tVJn1C00pC_gAOZyWfsKVuMyO9AeoBl-Bib-j4_YOYBp3adFis5hXPvKXN_I9MPoghhERjeWJBeMmCFg5OKLeFom9jT-x4offbRibNbqABZiw_vP2o/s72-c/Capture.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-6812492993484707596</id><published>2012-01-21T22:39:00.001+00:00</published><updated>2012-01-22T18:26:55.159+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber security challenge"/><category scheme="http://www.blogger.com/atom/ns#" term="Paul Drury"/><title type='text'>The Cyber Security Challenge - King of The Hill</title><content type='html'>&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFCtyRPDXto6i7b6Oo-cC3ohn_hRTUBkcZfO-_nxFVtefxRMOJPSnTgm4-lpV8Pm9Q1xlrjGXZlKPoHf5gCTvHQZitrS3xkV6CBOQ65Ri3ux2PeFxdxUWpJdzrNplpNwC9RldD3yvHE2Y/s1600/Capture.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;120&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFCtyRPDXto6i7b6Oo-cC3ohn_hRTUBkcZfO-_nxFVtefxRMOJPSnTgm4-lpV8Pm9Q1xlrjGXZlKPoHf5gCTvHQZitrS3xkV6CBOQ65Ri3ux2PeFxdxUWpJdzrNplpNwC9RldD3yvHE2Y/s320/Capture.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;I attended one of the 3 stream finals of the &lt;a href=&quot;http://www.chatbacksecurity.com/&quot; target=&quot;_blank&quot;&gt;Cyber Security Challenge&lt;/a&gt; (CSC) ‘King of the Hill’ today. I was kindly invited some months ago as an influential blogger in the security industry which was nice, although Ellie (part of the CSC team), did tell me today that there are not many of us about, but still it was nice all the same!&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
Today’s event was sponsored by &lt;a href=&quot;http://www.pwc.co.uk/eng/services/forensic_services.html&quot; target=&quot;_blank&quot;&gt;PWC &lt;/a&gt;and &lt;a href=&quot;http://www.saic.com/&quot; target=&quot;_blank&quot;&gt;SAIC&lt;/a&gt;, there were proper journalists present from Wired, BBC (&lt;a href=&quot;http://www.speakerscorner.co.uk/file/a758b55d3a56774fae0385161c360100/adam-shaw-working-lunch-business-finance-consumer-affairs-money-facilitator-speaker.html&quot; target=&quot;_blank&quot;&gt;Adam Shaw&lt;/a&gt;) and City AM.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;I was a little apprehensive going into today as Cyber Security is a little out of my area of expertise although the boundaries across security specialisms are&amp;nbsp;constantly becoming blended and we now have to be experts in all disciplines (and HR and Legal and Audit and Risk Management etc etc).&amp;nbsp;&lt;/span&gt;By the way the location was perfect with two of the most iconic landmarks in London, the Tower of London and Tower Bridge literally on the door step.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The morning kicked off with a brief presentation about the CSC and then we went straight into&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;a very comprehensive demonstration of the&amp;nbsp;exercise&amp;nbsp;that the candidates would experience later in the day during their competition.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;My Cyber expert and ‘ethical hacker’ was Jonathan of PWC, who’s knowledge was impressive, although he had only been in security for a couple of years! He gave me a whirl wind tour of the tools of his trade and I was surprised to hear that the penetration software is easily available and for free apparently! He&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;went on to demonstrate how easy (for him) to compromise and potentially control a series of targets. He also showed me how a ‘password list’ is&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;utilised&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;by a hacker to automatically search for the&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;specific&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;password required to gain access to the chosen target (which I have read about but never seen done in front of me). Our password list contained 1.5m examples of commonly used passwords!&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;I was also shown how easy it is to hack a &lt;a href=&quot;http://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol&quot; target=&quot;_blank&quot;&gt;SMTP&lt;/a&gt;&amp;nbsp;(Simple Mail Transfer Protocol…get me) which ultimately enables the hacker to send emails containing the actual companies domain name. These would appear to be official emails by the person&amp;nbsp;receiving&amp;nbsp;them but may for example contain a piece of &lt;a href=&quot;http://en.wikipedia.org/wiki/Malware&quot; target=&quot;_blank&quot;&gt;Malware &lt;/a&gt;or inappropriate images (the implications may be far reaching as experienced by &lt;a href=&quot;http://chatbacksecurity.blogspot.com/2011/12/cyber-security-hacked-stratfor-security.html&quot; target=&quot;_blank&quot;&gt;STARTFOR&lt;/a&gt;&amp;nbsp;at the end of 2011). It certainly demonstrated to me the importance of simple preventive measures like choosing good passwords and ensuring regular security patching.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;During the day I met a number of candidates, some first timers and others who attended last week’s event at&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.sophos.com/en-us/&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot; target=&quot;_blank&quot;&gt;Sophos&lt;/a&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;. Most of the candidates I met are current university students with an interest in computers and/or cyber security but with little practical experience.&amp;nbsp;It was good to see people who are in the early stages of their careers and actually have a hunger and eagerness to progress into this industry.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
I also had the opportunity to speak to some of sponsors who are security professionals in their right and it was good to exchange ideas and to share best practice (which is exactly why I blog).&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; color: #222222; font-family: Arial, sans-serif; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
I actually came away with more knowledge then I walked in with, however I was&amp;nbsp;truly&amp;nbsp;shocked at just how easy &#39;hacking&#39; is (with a few free tools and some technical know how of course). As I type this article there are thousands of people all over the world using these tools&amp;nbsp;looking&amp;nbsp;for opportunities and their next potential target.&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
I even found out what this type of art is called……&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
﻿&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;a href=&quot;http://www.chatbacksecurity.com/&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheaxFE-lvmyMhodau5XfG8v8HoxGDFASq-mmMFbEN-0XLGGOlSGkhkwYzHB0h3t2Ap-RzQdqq0byfpAtRKSx_e3Zzxul8Vz-nSX-dmtkn965iY5HPdCY5DaedaVID8JNhmatqXy46dCC0/s200/fail-boat.png&quot; width=&quot;197&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot;&gt;Ascii Art!&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
What I like about the CSC is that it&#39;s nurturing talent and raising the profile of a profession which is&amp;nbsp;apparently&amp;nbsp;struggling to attract new talent - but at least they are doing something about it! Will the CSC attract more talent into the industry? Will it uncover new talent? Do we need to continue to protect our national&amp;nbsp;infrastructure&amp;nbsp;and business interests? I think it’s a resounding yes to all of these points and lets hope that the CSC continues to run for many years.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The final takes place in March and the&amp;nbsp;&lt;a href=&quot;https://cybersecuritychallenge.org.uk/prize-detail.php&quot; target=&quot;_blank&quot;&gt;prize&amp;nbsp;&lt;/a&gt;list is impressive.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
I look forward to watching the BBC programme (and of course if I am in it) and a special thank you goes to Ellie for the kind invitation and your hospitality on the day.&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: justify;&quot;&gt;
If you want to learn more about the challenge please click on&amp;nbsp;&lt;a href=&quot;http://chatbacksecurity.blogspot.com/2011/11/what-is-cyber-security-challenge-uk.html&quot; target=&quot;_blank&quot;&gt;this&lt;/a&gt;.
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/6812492993484707596/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/01/cyber-security-challenge-king-of-hill.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/6812492993484707596'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/6812492993484707596'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/01/cyber-security-challenge-king-of-hill.html' title='The Cyber Security Challenge - King of The Hill'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFCtyRPDXto6i7b6Oo-cC3ohn_hRTUBkcZfO-_nxFVtefxRMOJPSnTgm4-lpV8Pm9Q1xlrjGXZlKPoHf5gCTvHQZitrS3xkV6CBOQ65Ri3ux2PeFxdxUWpJdzrNplpNwC9RldD3yvHE2Y/s72-c/Capture.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4932448786174130096.post-355612896388265221</id><published>2012-01-19T21:05:00.000+00:00</published><updated>2012-01-19T22:31:04.351+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="olympics"/><category scheme="http://www.blogger.com/atom/ns#" term="Paul Drury"/><title type='text'>Olympics counter-terrorism training offered to London burger vendors</title><content type='html'>&lt;br /&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial, sans-serif; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;line-height: 19px; text-align: -webkit-auto;&quot;&gt;Police want licensed mobile traders to help spot suspects who may be looking at potential targets for 2012 Games&lt;/span&gt;&lt;span style=&quot;line-height: 18px; text-align: -webkit-auto;&quot;&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-family: arial, sans-serif; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
Burger van workers and other licensed mobile traders are being offered free counter-terrorism training to help them spot suspects who might be reconnoitring potential targets in the runup to the&amp;nbsp;&lt;a href=&quot;http://www.london2012.com/&quot; style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #005689; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot; title=&quot;&quot;&gt;Olympics and Paralympics&lt;/a&gt;.&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-family: arial, sans-serif; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg22xExpjYKi_MEPNmn9dcmvpkGB-VE_IDwqjGOZ2MTNCsq_-bfmZNnBTzHhxn5MJoTr8oV5Yd-sEUCmeyo5hF3N58nNQZUxOgSDXqVqPdxQFPCs33pLt44ZPXOt8lXGAp9GcHKg8JnWYo/s1600/Fast-Food-Trailer--007.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg22xExpjYKi_MEPNmn9dcmvpkGB-VE_IDwqjGOZ2MTNCsq_-bfmZNnBTzHhxn5MJoTr8oV5Yd-sEUCmeyo5hF3N58nNQZUxOgSDXqVqPdxQFPCs33pLt44ZPXOt8lXGAp9GcHKg8JnWYo/s320/Fast-Food-Trailer--007.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;The on-street presence of people selling food and drink in&amp;nbsp;&lt;a href=&quot;http://www.guardian.co.uk/uk/london&quot; style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #005689; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot; title=&quot;More from guardian.co.uk on London&quot;&gt;London&lt;/a&gt;&amp;nbsp;– from ice-cream to baguettes, pizzas and hot dogs – means they are well placed to &quot;contribute to effective&amp;nbsp;&lt;a href=&quot;http://www.guardian.co.uk/uk/surveillance&quot; style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #005689; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot; title=&quot;More from guardian.co.uk on Surveillance&quot;&gt;surveillance&lt;/a&gt;&quot;, according to environmental health experts.&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-family: arial, sans-serif; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
The training is being offered by the Metropolitan&amp;nbsp;&lt;a href=&quot;http://www.guardian.co.uk/uk/police&quot; style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #005689; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot; title=&quot;More from guardian.co.uk on Police&quot;&gt;police&lt;/a&gt;&amp;nbsp;and Westminster council and builds on an existing scheme in which business representatives attend courses to get tips on &quot;&lt;a href=&quot;http://www.chatbacksecurity.com/&quot; target=&quot;_blank&quot;&gt;hostile reconnaissance&lt;/a&gt;&quot;, what to do in case of an attack – including the &#39;dos and don&#39;ts of bombs&#39; – and understanding police communications and cordons.&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-family: arial, sans-serif; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
But not all traders will find themselves on the right side of the law. Many will be subject to spot checks to establish that they are operating legally and safely, with those suspected of breaches having their names, dates of birth and nationalities passed to police and the&amp;nbsp;&lt;a href=&quot;http://www.ukba.homeoffice.gov.uk/&quot; style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #005689; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot; title=&quot;&quot;&gt;UK Border Agency&lt;/a&gt;(UKBA) for investigation of possible criminal links and their immigration status.&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; color: #333333; font-family: arial, sans-serif; line-height: 18px; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
Source: &lt;a href=&quot;http://www.guardian.co.uk/uk/2012/jan/19/london-olympic-street-vendors-counter-terrorism&quot; target=&quot;_blank&quot;&gt;The Guardian&lt;/a&gt;&amp;nbsp;- click on the link to read more&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;i&gt;&lt;span style=&quot;color: #333333; line-height: 18px;&quot;&gt;Comments from Chatback......&lt;/span&gt;..t&lt;span style=&quot;color: #282828; line-height: 20px; text-align: -webkit-auto;&quot;&gt;he total number of people involved in the security operation is apparently around 45,000ish (including&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #333333;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;20,000 security guards - an increase from an&amp;nbsp;original&amp;nbsp;figure of 10,000, and 13,000 military personnel, and 12,000+ Police officers (in London)). Not forgetting that these numbers are directly linked to the Olympics and it does not include the additional numbers of security staff that businesses, retailers, offices will automatically add during this busy time. I don&#39;t think we should forget that securing the&amp;nbsp;Olympics&amp;nbsp;is costing over £1bn (originally&amp;nbsp;£600m) and with all these big numbers why on earth do we need to train &#39;burger van workers&#39; in Hostile Recon??&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-repeat: no-repeat no-repeat; border-collapse: collapse; margin-bottom: 13px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #333333; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;All I can say is that this years&amp;nbsp;&lt;a href=&quot;http://www.ifsec.co.uk/&quot; target=&quot;_blank&quot;&gt;IFSEC&amp;nbsp;&lt;/a&gt;will not be &#39;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #252c31; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;the largest annual security event in the UK&#39; the 2012 Olympics&amp;nbsp;games will be!!&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://chatbacksecurity.blogspot.com/feeds/355612896388265221/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/01/olympics-counter-terrorism-training.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/355612896388265221'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4932448786174130096/posts/default/355612896388265221'/><link rel='alternate' type='text/html' href='http://chatbacksecurity.blogspot.com/2012/01/olympics-counter-terrorism-training.html' title='Olympics counter-terrorism training offered to London burger vendors'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg22xExpjYKi_MEPNmn9dcmvpkGB-VE_IDwqjGOZ2MTNCsq_-bfmZNnBTzHhxn5MJoTr8oV5Yd-sEUCmeyo5hF3N58nNQZUxOgSDXqVqPdxQFPCs33pLt44ZPXOt8lXGAp9GcHKg8JnWYo/s72-c/Fast-Food-Trailer--007.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>