Skip to main content

Video Teaches Public to Spot Terror Plots

The following news article appeared on Denver Colorado’s 9news.com web site last night. I reviewed the video, which is about eight minutes long, and found it to contain some very good information that is just as relevant to residents of Mount Rainier as it is in Colorado and across the country. I recommend it highly.

The video tells individuals that if they observe any of the eight signs of terrorism they should call the Colorado Information Analysis Center at their toll free number. That will not work here in Maryland. Residents should replace the CAIC number with that of the Maryland Coordination and Analysis Center (MCAC): 1-800-492-TIPS (8477).

You can view the video by clicking on the following web link:
http://thecell.org/wp/8-signs-of-terrorism-video/

Video Teaches Public to Spot Terror Plots
Written by: Jeffrey Wolf Deborah Sherman
9News.com (Colorado)

A new video released Monday teaches Coloradans how to recognize eight signs of terrorism, including suspects testing security, acquiring supplies and rehearsing terrorism plots.

The video was co-produced by the nonprofit Center for Empowered Living and Learning (the CELL) in Denver and the Governor's Office of Homeland Security. They created it over the last four months using a $30,000 federal grant.

It is narrated by former Denver Broncos quarterback John Elway and 9NEWS Anchor Kim Christiansen.

"Eight years after 9/11, it's important to remember that the United States is not immune from terror attacks," Governor Bill Ritter said. "The video will help empower citizens with the knowledge they need to protect our communities, our state, our nation."

Ritter and U.S. Homeland Security Secretary Janet Napolitano released the new video after touring the CELL Monday afternoon.

"Unfortunately, the world we live in today, everyone has to assume the threat of terrorism is anywhere," Napolitano said. "It's New York City, it could also be Denver."

Napolitano says attacks across the world show the battle against terrorism is a shared responsibility.

"You just can't leave it up to a state agency to do it, you can't just leave it to a federal agency to do it, there are things, practical things, that every individual can do that will help minimize the risk of terrorism," she said.

"Without question, every one of us has the potential to make a difference in the fight against terrorism," Ritter said. "It all starts with being alert and being prepared."

Comments

Popular posts from this blog

Boston Marathon/West, Texas Spam Campaigns

There is a new spam campaign in circulation using the Boston Marathon bombings that occurred on April 15, 2013 as a lure. Users are sent an e-mail encouraging them to a watch a video of the explosion. When the user clicks on the enclosed link to watch the video malware is installed on the user’s computer.   The following URL patterns have been found in these e-mails: http://[IP-address]/boston.html   http://[IP-address]/news.html   When the user clicks on one of the links the Kehlios worm is installed on the user’s system which has the capacity to send spam; carry out Distributed Denial of Service Attacks; and steal online currency such as bitcoins. Most major anti-virus vendors have signatures for detecting this malware so users should keep their antivirus programs up-to-date.   In addition to the Boston Marathon spam campaign, a West, Texas plant explosion spam campaign has also sprung up. This spam campaign uses similar exploitation techniques as the Boston Marathon spam campaign p

The Risks of Connecting Devices to Public Charging Stations

The following information  comes courtesy  of the  New Jersey Cybersecurity & Communications Integration Cell Public cell phone charging stations supplied with power cables or USB ports located in stores, airports, libraries, and schools may seem like a convenient way to charge your mobile devices on-the-go, but can you be sure that your device and data will be safe if you connect? These kiosks can contain concealed computers that attempt to extract data such as contact information, photos, and videos from connected devices, unbeknownst to the users. Additionally, malicious or compromised charging stations can expose devices to the risk of a malware infection. Even if the charging station isn’t malicious, the manufacturer or owner of the kiosk may require users to input their email addresses or phone numbers in order to charge their devices, potentially exposing them to unwanted marketing campaigns, spam emails, and scam calls. The NJCCIC recommends ensuring your d

Police Report: May 8-11

Friday May 8th : 3400 block of 11 Newton Street : At about 2 pm officers responded for the report of a woman who had been assaulted by her boyfriend. The boyfriend allegedly punched the woman in the mouth and choked her. She told the officers that she did not want any police assistance and refused to tell the officers what had occurred. She was referred to the District Court Commissioner if she decided to press charges at a later time. Saturday May 9th : Nothing significant to report. Sunday May 10th : 4500 block of Eastern Avenue (BP station) : At about 11 am officers responded for the report of a stolen auto. The officers met with the victim/owner who told them that he left the keys to his 2002 Lincoln on the front seat when he went inside to pay for gas. When he came out of the store he saw his Lincoln being driven up Eastern Avenue towards Rhode Island Avenue by a black male (no further description). A check of the area for the stolen car proved negative and a lookout for it was gi