EDITORS NOTE : These are copy's of the Safety & Security Magazine myself and others help put on the Internet on a monthly basis for a couple years in 1990's before high speed internet when most connections where dial up Via old analog land lines on 2400 baud then 36000 baud and finally 56K baud modems
DSL was just starting and limited where available and Cable Modems, FIOS etc where not yet available it arrived via CompuServe, Prodigy AOL or BBS and had to be unzipped using a program like PK Zip to be read . If you where fortunate to have high speed internet you had an ISDN or T1 line or 36K serial line at your business or library you where using.
PLEASE NOTE MANY PHONE NUMBERS, EMAILS AND ADDRESSES ETC. ARE NO LONGER ACTIVE OR AVAILABLE Most have retired and moved and unfortunately we lost Ron Nelson to the lord a few years ago THIS IS FOR HISTORIC RESEARCH ONLY
BUT PLEASE ENJOY THE CONTENT AND HOW THINGS HAVE CHANGE
THE WORDS I TOLD YOU SO COME TO MIND IN MANY OF THE ARTICLES YOU WILL READ.
From 71552.1031@CompuServe.COM Mon Oct 28 21:24:21 1996
Return-Path: 71552.1031@CompuServe.COM
Received: from dub-img-4.compuserve.com (dub-img-4.compuserve.com [149.174.206.134]) by emin22.mail.aol.com (8.6.12/8.6.12) with ESMTP id VAA05759 for <NMarkow125@aol.com>; Mon, 28 Oct 1996 21:24:09 -0500
Received: by dub-img-4.compuserve.com (8.6.10/5.950515)
id VAA28080; Mon, 28 Oct 1996 21:19:00 -0500
Date: 28 Oct 96 21:16:37 EST
From: "Allan B. Colombo" <71552.1031@CompuServe.COM>
To: Shawn Arbogast <sma1os@wizard.stark.k12.oh.us>
Cc: Nick Markowitz <NMarkow125@aol.com>,
Laura Quarantiello/SL <73733.1653@CompuServe.COM>
Subject: November magazine, in ascii
Message-ID: <961029021636_71552.1031_EHL161-2@CompuServe.COM>
+--------------+ +--------------------------+ +--------------+
+---+ | | Safety & Security | | +---+
+--+ | | Magazine | | +--+
+--+ | | | | +--+
+--+ | | Carroll Publications | | +--+
+-+ +--------------------------+ +-+
===============================================================
Volume 2, Issue 11 (c)1996 Carroll Publications November 1996
===============================================================
Each month you'll find helpful and informative articles
on topics related to safety and security at home,
at work, and while traveling, in the
Safety & Security [electronic] Magazine.
+-------------------+
| Table of Contents |
+-------------------+
I. Editor's Say: On the Victimization of Seniors
II. Personal Protection: Crime Prevention for Seniors
III. Food Safety: Let's Talk Turkey
IV. In the News: Neither Rain nor Sleet nor Threat of Crime...,
Passenger-Side Air Bags, Big Business in Fake IDs, Plastic
Vent Pipe Can Catch Fire, Is Violent Crime Falling, NFPA
Launches Community Fire Safety Spots
V. The Mail: Police Radar Link To Cancer, Safety & Security
Magazine, Telephone Taps, Prevent Identity Impersonation, Gun
Ownership and Personal Safety
VI. Scams: High-Tech Con Games
VII. Alarm Systems: False Alarm Prevention
VIII. Law Enforcement: The Creation of the National DNA Index System
IX. S&S Update: Stop Bathroom Stall Thieves
XI. Editor's Last Say: How to view past crime prevention stories
X. Endnotes: E-mail addresses, View on the Web, Bulletin Boards,
and Disclaimer.
--------------------**--------------------
I.
Editor's Say:
The Victimization of Seniors
and Other Readings
Today, 13% of the U.S. population is over 60 years old. By the year
2020, the number of elderly in the United States is expected to reach
52 million, or one in every five people. The number of people in the
65-to-74 age group is decreasing as the number of people over 75
increases, says Eleanor Chelimsky, Assistant Comptroller General,
Program Evaluation and Methodology Division of the U.S. General
Accounting Office. These numbers are significant because people
inherently become more prone to violence and chronic disease as they
get older.
Recently, a series of violent attacks against elderly women in Fort
Collins, CO, perpetrated by a 20-to-30 year-old man, forced 20,000
senior adults who live there to rethink the way they live. Up until
recently, most of them rarely locked their doors, and I am sure that
most of them now have changed how they answer the door.
In each of the rapes and assaults that have recently taken place in
Ft. Collins, the assailant had gained access to the victim's home by
talking his way inside. In several cases he was even bold enough to
park his vehicle in the victim's driveway.
The first incident took place in February, 1996. It involved the
rape of an 85-year-old woman. In late June and early July two more 70-
year-old women were assaulted in their homes, this time the assailant
did not rape them. Then, in late July, two more elderly women were
attacked.
To help the elderly citizens of Fort Collins protect themselves,
Fort Collins' police are busy conducting crime prevention/safety
seminars. Hopefully these seminars will educate Fort Collins' citizens
well enough in basic crime prevention that there will be no more
repeat offenses.
Take The Time To Learn
Basic Crime Prevention
No one, least of all the elderly, should suffer the violence of
rape, assault or murder. In previous issues of the Safety & Security
[electronic] Magazine, the staff have written numerous articles
designed to help you avoid becoming a victim in your own home. In
"Identify Your Callers," in the July, 1996 issue, I discussed how to
verify the identity of your callers without opening your door. The
value of having a through-the-door peep hole lens, video/intercom
system, or a window, positioned in the right spot, were also pointed
out.
This month, Laura Quarantiello, Contributing Writer, offers
additional insights on how you can avoid being victimized. Ron Nelson
also offers numerous tips on how to cook safe this Thanksgiving in his
story, "Let's Talk Turkey." In addition, he provides helpful
information on how you can prevent false alarms. Nick Markowitz also
offers some interesting insights into popular scams.
Other Readings
This Month
In our Food-Safety corner this month, Ron Nelson, Co-Editor, talks
turkey. In his story, "Let's Talk Turkey," he offers sound advice on
how to safely prepare and cook this year's Thanksgiving bird. There
really is a difference in how you prepare a fresh bird to that of a
frozen bird. He covers all the bases from the preliminary preparations
to serving the big bird on your best silver.
Nelson also offers false-alarm helps in his story "False Alarm
Prevention." This is a must-read for those who have an electronic
alarm system that experience a false alarm now and then. Because
"false alarms" are probably the single most challenging problem that
law enforcement agencies face today, the ideas and information that
Nelson presents in this article will help you eliminate your own false
alarm woes. After you have read this article, Ron Nelson, as any of
the authors, can always be reached via E-mail for further information
and answers to your questions (see End Note for the authors' E-mail
addresses).
Nick Markowitz, Contributing Writer, also offers sound advice on how
to avoid high-tech crimes. From credit card application fraud to
satellite communications trickery, he presents a number of current-
running scams to be aware of. Do not miss this very-important story on
scam artists.
In addition, in "The Creation of the National DNA Index System," you
will learn about the Justice Department's efforts to establish a
national DNA database (NDIS) that will include the DNA prints,
picture, and criminal records of more than 250,000 felons nationwide.
The NDIS is expected to greatly speed up the time it takes to
establish positive DNA matches of known convicted felons.
And, do not forget our two most-recent departments: "In The News"
and "S&S Update." --Al Colombo
--------------------**--------------------
II.
Personal Protection:
Crime Prevention for Seniors
Laura Quarantiello
Victims are always targets first, and to a criminal looking to score
some quick cash or goods, the best targets are those who appear to
present the least resistance. Senior citizens often fit the victim
profile simply because they are perceived as weak and helpless, and
therefore open to all types of victimization. This stereotype of the
defenseless senior has done more to put the fear of crime into elderly
Americans than the actual percentage of occurrences warrant.[1]
Nevertheless, whether you are a senior citizen yourself or you know
one, there are several important steps that can be taken to close gaps
that make seniors vulnerable.
Since seniors often live alone, the homefront becomes a potential
weak point. Salesmen, gardeners and repairmen all become possible
threats. Never admit any of these people into your home. If at all
possible, do not even open the door to them when you are alone. If you
have scheduled a visit, be sure to have a friend or relative come by
to be with you during this time. Criminals have been known to use
repair ruses to case homes and to carry out attacks or thefts. If you
are a senior alone and are concerned about a persistent salesmen,
unexpected repairman or other visitor, do not hesitate to call the
police.
Seniors are particularly vulnerable to telephone fraud. Make it a
point never to buy anything from anyone over the phone. And, as a
general rule, never give out any personal information to anyone you do
not know over the phone. Especially do not tell anyone who calls that
you are alone. An answering machine can be your best friend in
combatting phone related crimes. Most salespeople will not leave
messages, freeing you from having to talk to them, and criminals will
not have a chance to get information from you. When you record an
answering machine message, say "We're not available to take your call
at the moment." Do not say "I" and do not say that you are not home.
Give the impression that you live with someone and that you are
screening calls.
On the street, senior citizens can become quick targets. It is not
unusual for older citizens to wait at bus stops or walk carrying
packages. Always be alert to your surroundings and keep a distance of
several feet between you and anyone else that stands at a bus stop.
Be especially careful of groups of people approaching or of vehicles
that may slow down near you. Stand away from the curb and in an area
visible to passing traffic. When carrying packages, never carry so
many that you fail to have one hand free. When you are burdened with
bundles, you are particularly vulnerable to assault.
Crime affects us all, regardless of age. A twenty-year-old can be
just as vulnerable as an 80-year-old. Why does a criminal pick one
person over another? It is the age-old predator's tactic of selecting
the weakest member of the herd for attack. Criminals often look for
those who appear sick, weak, confused, distracted, non-attentive, or
pre-occupied. These are prime attributes for a target and they give
the criminal what he most wants: an easy hit. Seniors, like all of us,
must learn to present an aura of awareness, of readiness for action.
This applies to personal safety and to other forms of crime
prevention, too. The steps you take to protect your home, vehicle and
property tells a criminal whether you are a victim just waiting to be
victimized or a hard target.
Senior citizens do not have to fear crime if they take proactive
steps against it. All seniors should contact their local police
department and request a home security check. A law enforcement
officer or crime prevention specialist will come out and do a site
survey of your home, telling you where your weak points are and
showing you how to better protect yourself from crime. Seniors should
also take advantage of any personal safety classes offered in their
area. Victims are always targets first... learn how to become a bad
target.
Endnote
[1] Bureau of Justice Statistics' "Sourcebook of Criminal Justice
Statistics 1994", lists the estimated rate (per 1,000 persons in
each age group) of personal victimization for all personal crimes
at 18.3% for persons age 50-64 and 7.8% for persons age 65 and
older. In comparison, persons age 12-15 have the highest rate of
victimization at 125.2%.
+--------------------------------------------------------------------+
| Laura Quarantiello is the author of the new book "Cyber Crime: |
| How You Can Protect Yourself from Computer Criminals" (LimeLight |
| Books, distributors order line 1-800-507-BOOK). She has been |
| published in numerous law enforcement publications and is on the |
| board of the Law Enforcement Communication Network. Quarantiello |
| also co-hosts a weekly informal crime prevention conference every |
| Monday night on CompuServe's Crime Forum(GO TWCRIME). --Al Colombo |
+--------------------------------------------------------------------+
--------------------**--------------------
III.
Food Safety:
Let's Talk Turkey
Ron Nelson
With the holiday season soon upon us, most of us are looking forward
to the traditional turkey dinner with all the fixings; but, unless you
exercise care, that turkey can cause serious illness. Follow the
following directions and safeguard your turkey day.
To Prepare Frozen Turkey-
o If you buy a frozen turkey, be sure to select one that is solidly
frozen--showing no signs of thawing; and make your selection just
before going to the check out counter.
o As soon as you arrive home, place it immediately in your freezer
where it will keep for up to 1 year if stored at a temperature of 0
degrees F. or below.
o DO NOT LEAVE THE TURKEY ON THE COUNTER TO DEFROST. This can cause
bacteria to grow to dangerous levels; bacteria that can cause
illness. To properly thaw your turkey, place it in a pan inside the
refrigerator and let it defrost there. An 8- to 12-pound whole
turkey will take approximately 1 to 2 days. A 20- to 24-pound bird
can take 4 to 5 days to thaw.
To Prepare Fresh Turkey-
o If fresh turkey is your choice, then you should buy it one or two
days before you plan to cook it.
o Be sure to check the sell-by date on the turkey to make sure it is
still fresh.
How to Cook Mr. Turkey
o When you are ready to begin cooking, remove the turkey from its
wrapper and remove the neck and giblets, if any, from the cavity,
o Be careful to wash both the inside and outside of the turkey with
cold water and drain. To minimize the spread of bacteria, be sure
to wash your hands, utensils, cutting board, counter, sink and any
surface that has come into contact with the turkey.
Now the Stuffing
o Do not use the same dish rags and towels that was used during the
clean-up operation for anything else until they have been washed.
This will prevent the spread of any bacteria remaining.
o Now prepare your favorite stuffing and place the turkey in the oven
and cook it until the meat thermometer, inserted into the thickest
area of the bird, reads 185 F. Cooking time will vary depending on
the oven, whether the turkey is stuffed, and the cooking technique
used. But you can expect an 8- to 12-pound, stuffed bird to take 3-
1/2 to 4-1/2 hours and 6-1/2 to 7 hours for a 20- to 24-pound,
stuffed turkey.
o When done cooking, place the bird on the counter, loosely covered,
for about 20 minutes to ease carving.
Now enjoy Mr. Turkey!
+-------------------------------------------------------------------+
| Editor's Note: For additional information try the following web |
| sites: US Consumer catalog- pueblo.gsa.gov/catalog.htm |
| Butterball home page- butterball.com |
| Honey Suckle home page- honeysucklewhite.com |
| Also, if you have access to CompuServe, download the file |
| Talkturk.txt. This file contains the complete text of the USDA |
| Home and Garden Bulletin, No. 243, "Talking Turkey," written |
| by Laura Fox. Happy Holidays to everyone! --Ron Nelson |
+-------------------------------------------------------------------+
--------------------**--------------------
IV.
In The News:
Neither Rain nor Sleet
nor Threat of Crime...
Postal Service carriers from New Orleans to Los Angeles are
facing more than just barking dogs on their appointed rounds these
days. On the first and third of each month, when Social Security and
welfare checks are delivered, carriers don flak jackets and clip
pepper spray to their belts in anticipation of attack as they travel
door to door in crime-infested neighborhoods. Postal carriers are the
new targets of criminals looking to get their hands on checks, which
they cash using false identification.
Los Angeles Postal Inspector Pamela Prince told USA TODAY that "our
carriers have been pistol-whipped, knocked unconscious, beaten with a
pipe, stabbed, sprayed with pepper spray and had their hands tied
behind their backs."
+--------------+ +--------------------------+ +--------------+
+---+ | | Safety & Security | | +---+
+--+ | | Magazine | | +--+
+--+ | | | | +--+
+--+ | | Carroll Publications | | +--+
+-+ +--------------------------+ +-+
==============================================================
Volume 2, Issue 10 (c)1996 Carroll Publications October 1996
==============================================================
Each month you will find helpful and informative articles
on topics related to safety and security at home,
at work, and while traveling, in the
Safety & Security [electronic] Magazine.
+-------------------+
| Table of Contents |
+-------------------+
I. Editor's Say: On Personal Privacy
II. Identity Fraud: Prevent Identity Impersonation
III. Alarm Systems: The Mysterious World of Passive Infrared
Detectors (PIRs)
IV. In The News: GPS Fails Hiker, Thief Sues Careless Gun Owner,
Court to Rule on Brady, Criminal Justice 1997
Appropriations.
V. The Mail: Terrorism Correction, Reader liked "terrorism" and
"roving wiretap" articles, Comments on gun-carry
laws.
VI. Child Safety & Regulation: Refrigerator Disposal Safety
VII. Gun Legislation: Two Years With Brady
VIII. Fire Prevention: Home Fire Protection, Part 2
IX. S&S Update: Partial Victory for Officer in Radar-Cancer Claim,
Meter-Reader Bill Passes Senate Committee
X. Editor's Last Say: Come visit our new homepage!
XI. Endnotes: E-mail addresses, View on the Web, Bulletin Boards,
and Disclaimer.
--------------------**--------------------
I.
Editor's Say:
On
Personal Privacy
-----------------------------------------
Privacy and personal safety are close
cousins. One depends upon the other.
-----------------------------------------
Just the other day I was searching the Internet's World Wide Web for
the home page of a nearby city. I found the home page easily enough,
but I also found a link that I was not expecting: a link to city
business licenses. A simple mouse click and across my screen scrolled
an alphabetized list of business license information, searchable by
business name, owner name, address, street or phone number. What is so
shocking about online accessible business licenses? The fact that the
home addresses of the owners were listed, too.
Now, you can tell me that these licenses are public record,
available for viewing at city hall by anyone. You can also tell me
that this has been the case for many years. But what you cannot tell
me is why information like this needs to be "broadcast" on the
Internet for access by anyone, anywhere, anytime. I can be in Newark
or Namibia and just by pointing my Internet browser to the appropriate
spot, I can search business licenses thousands of miles away. No need
to fly to your town and visit city hall, no need to make a formal
request. Just point and click and if you have got a business license,
I have got access to your home address.
What is wrong with this, you ask? Well, if you are like many people,
your address may be unlisted and your phone number, too. You probably
feel pretty safe, knowing that no one can get this information unless
you specifically give it out. But what about that business license?
Did you know that your home address appears there and did you know
that it is available through the Internet, to anyone, anywhere? The
world just grew a little smaller, didn't it?
The age of information and technology is a fascinating and exciting
time to be living in, there is no doubt about that. But it is also a
time where our privacy has become a tenuous thing. The technology
explosion and the free flow of information have opened up pipelines of
access, making private information about you easier to discover.
Did you know that CD-ROM's containing the data from telephone books
nationwide are hot sellers at computer stores? Did you know that the
46-MHz., cordless telephone that gives you so much freedom to roam
around the house can be overheard by a scanner radio available for
less than $100 at any electronics store, or that the cellular phone in
your car can also be overheard easily in the same manner? And you were
more worried about possible government wiretaps. The reality is, our
safety and security are affected today, right this minute, by privacy
concerns far more likely than anything the government may rule into
being.
The protection of our individual personal privacy usually is not
high on the list of crime concerns for the average person. We are more
concerned with violent crimes like robbery, assault, rape and related
offenses. After all, these are the crimes that make the headlines; the
headlines that frighten us and push us to bar our doors, purchase
handguns and live in a state of fear, waiting for our number to come
up.
For many, privacy is secondary because it just is not scary enough.
Unfortunately, however, we do need to add privacy to our list, because
the information about you that a criminal can lay his hands on may
increase the odds that you will fall victim to crime. Of course, there
is no way to completely sanitize your life, unless you become a hermit
living in the desert, but there are ways to reduce the outflow of
personal information. Here is are some steps you can take today to
make your life safer:
1) Obtain a post office box and use that address, if possible, for any
correspondence. Driver's licenses, business and professional
licenses, bills, etc., should all depict a post office box.
2) Remove your name (even if it is just a last name) from your
mailbox. Display only the address. Do the same for any letters you
write. If you cannot use your P.O. Box, at least leave your name
off the return address. Do not make it easy for the bad guys to
target you.
3) Obtain an unlisted telephone number, or have your address removed
from your phone book listing. Use your first and middle initials
along with your last name.
4) Refuse to acknowledge who you are to phone solicitors. When someone
calls asking for you, immediately ask who is calling. Divulge
nothing unless you are absolutely sure of who is on the other end.
5) Never use a conventional cordless telephone. If you must have the
convenience of a cordless telephone, purchase a 900-MHz., digital,
spread-spectrum model. These cannot be easily overheard. The same
goes for cellular telephones. Until digital cell phones come into
widespread use, be very careful what you say and always remember
that a cell phone is a radio transmitter that anyone can intercept.
Never give out personal information over them, ever! Wait until you
can find and use a wire-connected phone (one whose handset is
hardwired to the base, with the base hardwired to the wall.)
These tips are by no means complete, so always be on the look out
for ways in which your personal privacy can be affected. For instance,
I was waiting in line at the video store the other day and the
conversation between the customer ahead of me and the clerk went
something like this:
Clerk: You're Jane Doe?
Customer: Yes.
Clerk: And you live at 1234 State Place?
Customer: Yes.
Okay, so the clerk was just confirming that the person in front of
them was the same person who held a video store membership.
Regardless, I now had this lady's name and address. What can I do with
it? I do not know, I am not a criminal. All the customer had to do was
silently show the clerk her driver's license. That would have
confirmed the information without the entire store finding out her
personal information.
My point is, we protect ourselves in many ways every day, but we
seldom spend much time or thought protecting our privacy. But, privacy
and personal safety are close cousins. One depends upon the other.
Look around you, what can you do today to ensure your personal
privacy? --Laura Quarantiello
--------------------**--------------------
II.
Identity Fraud
Prevent
Identity Impersonation
Al Colombo
Arnold and Rose recently received a credit card bill for more than
$5,000. Shortly thereafter, a second bill arrived from another credit
card company in excess of $3,500. Yet, Arnold and Rose live a modest
life in a rural community in a small home. Arnold claims that neither
he or his wife made any of the purchases on either of the credit
statements. This family was victimized by an "identity thief."
An "identity thief" is someone who assumes the identity of another
individual. Many times they do this in order to obtain credit through
someone else's name so they can make purchases without paying for
them. In this case, the "identity thief" used Arnold's name, place of
employment, and social security number to obtain two credit cards
without Arnold's knowledge.
Identity fraud is fast becoming one of the most serious crimes of
this decade. In fact, according to Eunice Moscoso, Cox News Service
Journalist, Trans Union, one of many U.S credit reporting agencies,
recently reported that more than 1,400 people contact their fraud
division each day concerning credit theft.
The manner in which these criminals obtain credit in other peoples'
names is not all that complicated or difficult. This is because of the
interchange of data that exits between many of today's databases.
Often, by simply obtaining a social security number or a license plate
number, an "identity thief" is able to assume someone's identity. Once
one or both of these facts are known, the perpetrator can obtain
almost anything else they need to submit a credit application.
How to Protect
Your Identity
There are several things that people can do to safeguard their
identity and existing sources of credit. The most important first step
is to treat your social security number as if it is privileged
information. Guard it and keep it secret from as many people as
possible for this is a major piece of the identity-fraud puzzle that
someone needs to know when they intend to impersonate someone else.
Protecting your social security number is not always easy to do,
considering the fact that sales clerks commonly request it before they
will allow you to pay for a purchase with a check. In this case, tell
them that you would rather keep your social security number private.
Ask them what other kind of identification that you can provide that
will serve the same purpose.
Store clerks will also ask to see your drivers license. Be aware
that your social security number is often a matter of public record in
this regard. In some states, it is even included on the face of the
drivers license. If this is the case in the state where you reside,
consider holding your drivers license for them, placing your thumb
over the spot where your social security number is printed. Again,
indicate to them that you are serious about safe guarding your social
security number.
To further protect your social security number, when you renew your
drivers license, ask the state attendant whether your social security
number is optional where you live. In many states, like Ohio, giving
this information is entirely up to the applicant and may not be
necessary for issuance. In this case, your social security number will
remain safe because it is not a matter of public record with the DMV
(Department of Motor Vehicles). In addition, it will no longer appear
on the face of your drivers license.
You should also, like so many people are doing these days, refrain
from having your social security number printed on the front of your
bank checks. Remember, you should do everything in your power to avoid
giving anyone your social security number. This is privileged
information that not everyone should be allowed to have.
Protecting Existing
Credit Information
Some identify impersonators do not have to go to great extremes to
establish the identity of their victims. This is especially true when
the victim carelessly allows valuable personal information to lay
about for someone to see. Nowhere is this as true as it is in retail
stores. Here, clerks carelessly dispose of carbon credit transaction
slips by throwing them in the trash. Consumers share in the blame for
this kind of crime because they do not ask the clerks for their carbon
copy before leaving.
Armed with the credit information displayed on a carbon credit
transaction slip, which can be obtained from the trash bin out back
of the retail store, all the criminal has to do is solicit the credit
card company for a new card, under the pretenses that the original
card was lost.
ATM (automatic teller machine) receipts are no less important and
should be retained after a transaction has taken place. The
information contained on these slips of paper can be used by
knowledgeable thieves to electronically steal funds from existing
savings and checking accounts. The same information can help the
criminal perform debit purchases as well. This is especially true of
high-tech thieves who have their own magnetic card-making equipment.
Likewise dangerous are the pre-approved credit card offers that
people receive in the mail. If you are not interested in one of these
offers, do not throw it in the trash without first cutting the card up
into little pieces. If you have a fireplace in your home, a sealed
fireplace preferably, you might even consider burning these slivers of
paper and plastic so there is no possible way for them to fall into
the wrong hands.
Avoid Over-The-Phone
Credit Transactions
People with existing credit should also avoid making purchases over
the telephone where they have to give their credit card number and
social security number over the telephone. In most cases of over-the-
phone credit fraud, it is the mail order clerk on the other end of the
telephone that will misuse the information imparted in this manner.
This not only relies on the honesty of the mail order clerk, but It is
quite possible for a criminal to "bug" the telephone of an intended
victim to obtain important facts about them. In most cases they do
this by connecting a telephone tap to their telephone line with a
self-starting/stopping tape recorder that records everything that
is said on that telephone line.
In this case, the telephone "bug" intercepts each conversation,
initiating the operation of a tape recorder attached to the bug.
Although bugging can be done at the premises, and routinely is, the
safest way for this to be done is to attach this equipment to the
suspect telephone line at another location along the wire path. A
typical telephone line will appear at many outside connection boxes
along the way to the victim's home or business. In most cases, the
criminal is able to plant the bug and a miniature, slow-speed tape
recorder inside a telephone cabinet at the premises or inside a phone
connection pedestal, away from the eyes of the intended victim.
If you suspect that your telephone is tapped outside your home or
business, call the telephone company and they will check your outside
wiring. If you suspect that the tap/bug is located on the inside,
there is no way other way to find it other than hiring a professional
counter-surveillance expert to debug your telephones. Although a
visual check can reveal the existence of a phone bug, it usually
requires a trained eye to know what to look for.
--------------------**--------------------
III.
Alarm Systems:
The Mysterious World of Passive
Infrared Detectors (PIRs)
Ron Nelson
PIRs are the most common motion detector used by security companies
today for interior use. But what is a PIR, how does it work, and
should they be part of your security system? Good questions, read on
for the inside scoop on PIRs.
PIR detectors are electronic devices that detect an intruder by
sensing his body heat when he enters or moves around the area of
protection. The device consists of a mirror or lens that can focus the
energy, a thermal sensor to detect the energy, and associated
electronics to analyze the information. The area that a unit can
protect is usually given in feet representing the length and width of
its pattern, such as 35 X 35 feet. or 150 X 8 feet.
The mirror/lens divides the area of coverage into multiple zones of
detection. This can be visualized by holding your hand out and
spreading your fingers. Each finger represents one optic zone of the
detector. An actual PIR detector actually uses much more than 5 zones
of detection, and some models can detect motion up to 200 feet from
the unit. The PIR can only detect motion within one of its zones and
is most sensitive to motion across the zones since this is what causes
the greatest change in energy.
Many manufacturers make a selection of lens or mirrors for the
detector so that the area of coverage can be changed by simply
replacing the optics. This is particularly helpful if you decide to
get a pet after your security system has been installed. Another
feature of the mirror/lens is that you can mask, block out, any
segment that may cause a problem by covering it with the tape supplied
by the manufacturer. For example, if there is a radiator within one of
the protected zones, you can place the tape on that segment and by
doing so prevent it from causing a false alarm.
The thermal sensor used in today's PIRs is actually two or four
sensors in a single unit. The two-element device, which is commonly
called a Dual PIR, divides each zone into two distinct, side-by-side
detection areas. A person moving will first activate one of these
sensors and then the other. This allows the PIR to reject alarms that
originate from heated surfaces or even RF interference, since motion
is detected simultaneously by both elements.
A four-element device, which is commonly called a Quad PIR, further
divides the zones into an upper and lower area. This allows the unit
to compare the signals received, further reducing the possibility of
false alarms.
PIRs incorporate additional features that help to minimize false
alarms, such as white-light filters and pulse-count circuits. The
white-light filters, for example, prevent the device from falsing
(false alarming) when exposed to a source of direct light where the
pulse-count circuit tells the unit not to activate unless it detects
motion multiple times in rapid succession.
Some PIRs have a special Pet Alley lens that prevents them from
detecting motion near the floor. This option can allow your pet to
roam the area when the system is on, as long as it does not jump or
climb on something inside the detection area.
Proper PIR placement is essential for good protection and false
alarm-free operation. Consider the following guidelines when using PIR
detectors:
o Match the PIR to the area. Using a unit that has a 100-foot range in
a twenty foot room can cause false alarms.
o Do not mount the unit facing windows or any source of rapidly-
changing heat or cold air.
o Seal all openings into the unit to prevent insects and drafts from
entering the unit and causing false alarms.
o Mount the unit so that an intruder will have to walk across the
detection pattern, rather than towards the detector.
o If using a Pet Alley lens, carefully examine the room to ensure that
the pet cannot climb high enough to activate the unit.
o Be careful with mylar balloons and other hanging objects. A PIR is
capable of detecting them when they are within the detection area
and if they can move when the air is turbulent.
o Mask any zones that may cause false alarms.
o Last but certainly not least carefully walk test each unit to
accurately determine the area of coverage.
--------------------**--------------------
IV.
In The News:
Global Positioning
System Fails Hiker
The Global Positioning System (GPS) failed Michael Rego of Hooksett,
N.H., August 24th as he hiked up a mountainside in New Hampshire.
Rego, who carried a cellular telephone and GPS positioning unit,
became lost after his GPS unit failed. The problem was his, however,
and not the GPS unit or the GPS network--for the batteries went dead
and he failed to bring fresh sets along with him.
Without a fresh set of batteries, all Rego could do was dial up
mother on his cellular telephone and ask for help. But, soon after
that, according to newspaper accounts, the batteries in Rego's
cellular telephone went dead. Not having an extra set of batteries
for his cellular, he was forced to use his nose to hike his way out of
the wilds. He used the position of the newday's sun, managing to hike
his way back to civilization on August, 25th.
The GPS satellite network is commonly used to establish the
longitude and latitude of people, places and things. It is used by
surveyors, U.S. Coast Guard, Army Corps of Engineers, U.S. military,
civilian groups and a host of others. At the center of this technology
are 24 earth-orbiting satellites that belong to the U.S. Department of
Defense (DOD).
At first, use of the GPS was restricted to only military personnel.
It's primary use was to establish the position of fighting troops and
war machines--anywhere on the face of the earth, in the water, or in
the air. After the introduction of an enhanced version of GPS, called
the Differential Global Positioning System (DGPS), a committee was
assembled to study the possibility of making GPS technology available
to civilians.
Because of the recommendations of this committee, civilian access to
the GPS was finally made possible. Now, ordinary citizens can use the
GPS to track wild animals; identify and locate civilian aircraft; find
lost or stolen vehicles; keep tabs on company vehicles (including
speed); determine their own location when hiking; find their way
through urban, suburban and rural streets; and study the moanings and
groanings inside the crust of the earth. DGPS brought the accuracy of
the GPS up from 100 meters to mere millimeters.
The moral of this story is: be sure to take extra batteries with you
when you go hiking with a GPS tracking device and a mobile cellular
telephone.
----------*----------
Judge Rules That Thieves Can
Sue Careless Gun Owners Too
An eleven-year-old boy was accidentally shot and killed by a fourteen-
year-old high on marijuana after they and two other youths stole a
.22-cal. handgun from a pickup truck. According to Law Enforcement
News, John Jay College of Criminal Justice, New York, NY, the
fourteen-year-old was eventually convicted of negligent homicide.
The mother of the 11-year-old youth who died subsequently sued the
four youths and the adult owner of the pickup truck and stolen
firearm. She maintained that everyone shared in the responsibility of
her son's death. The Montanna Supreme Court, however, did not agree
with her, ruling in favor of the owner of the stolen firearm.
"While agreeing with [the boy's mother] that [the gun owner] had a
duty to the public to safeguard his firearm, the court's majority said
he was not to blame for [the boy's] death. [The firearm owner] could
not have foreseen that his truck would be burglarized, or that a boy
smoking marijuana would handle a loaded weapon found in the vehicle,
the Justices said" (Law Enforcement News, June 30, 1996).
Although the owner of the stolen firearm was relieved of any
responsibility for the youth's death, the fact that the Montanna
Supreme Court allowed the mother of the victim to sue the owner of the
stolen gun means that thieves who are injured by carelessly stored or
even stolen firearms can sue their owners. The Justices said that
"under state law, the owner of a firearm whose use or storage of a
weapon leads to [the] injury [of another person] has long been liable
to a civil suit" (Law Enforcement News).
----------*----------
Court To Rule On Brady
Background Checks
The court intends to rule in its next term on the legality of the
provision of the 1993 Brady Handgun Violence Prevention Act that
requires state and local law enforcement agencies to conduct
background checks. Law enforcement agencies are changeling the
constitutionality of this provision citing a clause in the Tenth
Amendment that infers that this provision of the Brady Act infringes
on the powers reserved for the states (see "Two Years With Brady" in
this issue).
"The federal appellate courts have come to different conclusion
regarding the constitutionality of the provisions" (Justice Bulletin,
National Criminal Justice Association, Washington, D.C., July issue,
page 13).
----------*----------
Criminal Justice
1997 Appropriations
The House approved their fiscal 1997 spending bill on July 25th.,
providing nearly the same funds as the 1996 budget for criminal
justice grants. Although, at the writing of this article, the Senate
has yet to approve a final draft, the House version calls for $1.4
Million for Community Oriented Policing (COPS), $571 Million for the
Local Law Enforcement Block Grant Program, $680 Million for prison
construction grants, $500 Million for reimbursement to the states for
incarceration of criminal aliens, $145 Million for programs
administered by the Justice Department's Office of Juvenile Justice
and Delinquency Prevention (OJJDP), and $60 Million for the Byrne
discretionary program.
The Senate version calls for a $10 Million increase in OJJDP
funding, but the agency that administers the money may have to
discontinue their current emphasis on non-institutional alternatives
for juvenile offenders. In its place, Senate would require programs
designed to prevent juvenile violence.
According to the National Criminal Justice Association, Washington,
D.C., although S.1991, the Anti-Gang and Youth Violence Control Act of
1996, will receive the same level of funding, it is receiving very
little attention from either party in Congress. S.1991 was introduced
by Senator Joseph R. Biden Jr. (D-Del.) on behalf of the Clinton
Administration.
--------------------**--------------------
V.
The Mail:
From: Ed Best, CompuServe
Subject: Terrorism, Should We Be Afraid
Issue: September, 1996
In your article: Terrorism: Should We Be Afraid, you referred to the
TWA Flight 800 and the pipe bomb explosion in Olympic Park, Atlanta as
"sites of terrorist attacks that have occurred...." I do not
think TWA 800 or the Olympic Park Bombing have been determined to be
terrorist attacks.
I read and enjoy your magazine as I am involved in the industrial side
of safety. I have mentioned your magazine to other colleagues as a
source of good information. It is disturbing to see misinformation
being printed as your credibility is at stake, as well as mine now for
my recommendation of your magazine. When I put out information, I try
to get as many people as are willing to review it, for accuracy etc.
I am suprised your counterparts missed this also. A statement of
correction in the next issue, would be in order.
----------*----------
From: Will Saylor, CompuServe
Subject: Terrorism: Should We Be Afraid
Personal Privacy: Is Anyone Listening
Issue: September, 1996
I just reviewed the September Safety & Security Magazine. I am
impressed with Laura Quarantiello's terrorism (Terrorism: Should We Be
Afraid) and Ron Nelson's article on roving wiretap technology
(Personal Privacy: Is Anyone Listening) stories. I am Particularly
impressed with Laura's style of writing and research of topics at
hand. Overall, thought both pieces were very well researched and
balanced.
----------*----------
From: Leonard Topley, P.I., CompuServe
Subject: Gun Carry Laws, The Mail
Issue: September, 1996
The police officer who, in your last issue (The Mail, September 1996),
said that as a LEO (law enforcement officer) has no problem with law
abiding citizens and that everywhere carry laws have been passed
violent crime has decreased significantly is correct.
Legal guns are not the problem. The incidents of "drunks" with guns is
a myth. Remember also the police have no legal obligation to protect
you or your family.
----------*----------
From: Lloyd, CompuServe
Subject: Gun Carry Laws, The Mail
Issue: September, 1996
In Arizona, we passed a concealed carry (CC) law about 2-3 years ago.
I do not know the current figures but the last I heard, there were
30,000 to 50,000 CC permits issued. To date, there have been NO
incidents of anyone with a CC permit committing an illegal act with
their weapon. There has only been ONE incidence where a weapon owned
by a person with a CC permit was used in an illegal act: a woman with
a mental problem in a hospital grabbed the gun from her husband's pack
and shot a few rounds. Luckily she injured no one.
I do not know what the law requires in other states, but in Arizona,
to get a CC permit, you have to take (and pass) firearms classes. I
think 12 to 16 are required. And these classes are *real* classes and
you can easily flunk if you do not pay attention and do your homework.
Naturally, a background check is required to get the CC permit. I
believe the classes are $150 to $250 and a the permit costs $50.
Will there be an incident regarding one of these CC people one of
these days? I am sure there will be. Is that risk enough to make me
want to stop 99.9% of the others from carrying (legally) a concealed
weapon? No.
----------*----------
From: Dennis Novak, Compuserve
Subject: Gun Carry Laws, The Mail,
Issue: September, 1996
This seems to be the opinion of most of the officers on the line,
actually dealing with criminals (re: carrying licensed firearms).
If you are armed and confront the police, remember that they have no
idea whether you are a good guy or not, despite your white hat. Be
calm, careful, and do not startle anyone. If appropriate, let the cop
on the scene know you are armed. If you are calling in a help call, be
sure and let the officer know you are armed. He will be more careful
to avoid surprising you when he responds.
Editor's Note: E-mail is always welcome on the articles contained in
the Safety & Security [electronic] Magazine. Direct them to
Al Colombo at safety.security@cancomm.com. --Al Colombo
--------------------**--------------------
VI.
Child Safety and
Regulations:
Refrigerator Disposal Safety
Nick Markowitz
It happened again. Two young brothers, playing in a wooded area,
suffocated when they became trapped inside an improperly-disposed-of
refrigerator. Once the door slammed shut, there was virtually no way
for them to open the door. So, how could the owner of this
refrigerator have avoided these two needless deaths?
The primary way to avoid a tragedy, as well as legal action, when
disposing of a refrigerator, is to inquire of your city and state
government as to what they expect you to do. With that said, here are
some general guide lines that will help you avoid problems.
Before disposing of an old refrigerator, either remove the door(s)
completely or chain and padlock it closed. You can also block it
open or permanently close it in a matter that children cannot
open it. Removing the door, however, is the preferred method.
If you come across an improperly-disposed-of refrigerator while
walking along a street or rural pathway, call the local police and
inform them of the hazard.
Refrigerant Disposal
New Federal disposal rules require that the refrigerant in the
refrigerator or air conditioner unit, whether it is in a residential
or commercial setting, be removed and reclaimed by an approved,
licensed service technician. Failure to remove the refrigerant can
result in a fine by the EPA (Environmental Protection Agency) of
$25,000 and 10 years in prison. The EPA offers a reward, up to
$10,000, to anyone who informs them of an improperly disposed-of
refrigerator and refrigerant.
The EPA rule was brought about because it is believed that the
release of refrigerant gas, mainly freon-12, also known as cfc
(chloroflorocarbons), breaks down in the atmosphere after being
carried up to the atmosphere by tornadoes and other weather anomalies.
Once in the upper atmosphere it turns into flouric acid, an extremely
dangerous compound that is believed to destroy ozone in the
atmosphere.
The overall affect of this chemical action is the distruction of the
earth's ozone layer. It is the ozone layer that filters out harmful
Ultraviolet (UV) rays that can cause skin cancer. Because of this the
EPA has set forth stringent rules on how freon is to be handled and
transported. Only licensed technicians are permitted to handle freon.
Individuals who are not licensed are no longer allowed to administer
freon in automobiles. Unlicensed individuals are also not to purchase
or possess freon containers.
Special programs have been set up to handle this problem in many
communities were they pick them up in mass and recycled them at a
central location. If your community does not have such a program, you
must call and pay for a licensed freon technician to remove the gas at
a cost of about $10 to $35 a unit.
Once the gas is removed, the technician then affixes a sticker to
the appliance verifying that the gas has been removed. He then will
take the gas he has accumulated in his recovery tank to a supply
house who forwards it to another location where it is recycled for
reused.
Even if you are sure that the refrigerator you are getting rid of is
empty of freon you must still have a licensed technician verify that
it is. Otherwise, the rubbish company who's job it is to dispose of it
will not be able to do so; and if they do, they face severe penalties.
Of course, the unfortunate part to all this is that it has made the
cost of servicing freon-based equipment expensive. This is because the
freon substitutes, which are safer than cfc, are less efficient. In
fact, experts say that they actually add to the global warming problem
because it takes more fossil fuel to generate the electricity
necessary to operate these appliances.
The jury is still out on the whole matter and many articles pro and
con have been published. But regardless of the outcome, the fact is
that you, as the owner of a refrigerator or air conditioner, have to
follow the rules now set forth by the EPA, or you will surely pay the
consequences if you are caught.
--------------------**--------------------
VII.
Gun Legislation:
Two Years With Brady
--------------------------------------
Is gun control really effective at
reducing gun-related violence?
--------------------------------------
By Al Colombo
The "Brady Bill" officially became the "Brady Handgun Violence
Control Act" on February 28, 1995. The Brady Act is intended to
prevent known offenders from obtaining guns through legal means.
There are those in the law enforcement community who believe that
the federal government has no jurisdiction, according to the Tenth
Amendment, in this regard, and that mandating state and local law
enforcement agencies to conduct background checks of handgun
applicants is wrong. The primary reason for the opposition is a lack
of manpower and finances to properly execute this provision.
The U.S. Supreme Court, for example, ruled in 1992 (New York vs.
United States) that the background-check requirement in the Brady Act
imposed an unreasonable burden on state and local law enforcement
agencies. This ruling also upheld the premise that this provision of
the Brady Act also violated the Tenth Amendment by interfering with
the duty of the Sheriff, as defined by the state of New York.
Then, just recently, two conflicting court decisions came down from
the U.S. Court of Appeals for the Second Circuit and the U.S. Court of
Appeals for the Fifth Circuit on this Brady Act provision. On the one
hand, the Second Circuit Court ruled that the Brady background-check
provision does not violate the Tenth Amendment of the U.S.
Constitution, and on the other hand, the Fifth Circuit Court ruled
that it does.
In the first case, Frank vs. United States, the Sheriff of Orange
County, Vt. and the CLEO (Chief Law Enforcement Officer), per the
Brady Act, challenged the constitutionality of the provision. Their
main argument was that it imposes a tremendous financial burden on the
state and its various local governments. The Second Circuit Court
based its decision on the fact that background checks fall within the
current scope of the duties of the current agencies involved.[1]
The U.S. Court of Appeals for the Fifth Circuit, on the other hand,
ruled that the Brady Act provision that mandates background checks is
unconstitutional on the grounds that it "commandeers the legislative
processes of the states by directly compelling them to enact and
enforce a federal regulatory program," which, according to the Tenth
Amendment, is not permitted.[1] In Koog vs. United States, the elected
Sheriffs of Val Verde County, Texas, and Forrest County, Miss., sought
"declamatory and injunctive relief from the background check provision
of the Brady Act." Their motion was made on the grounds that this
Brady Act provision violates the Tenth Amendment.[1]
Why Opposition To Brady
Many of the law enforcement agencies affected by the Brady Act have
vigorously opposed it because they are small with limited resources.
Thus, conducting background checks puts an enormous financial burden
on these departments by way of manpower and financial resources. In
addition, Brady's federal mandate provides no funds with which to
help these agencies finance these checks.
Early on in the debate, U.S. District Judge John Roll struck down
that part of the Brady Law that requires law enforcement agencies to
conduct background checks in Tucson, Arizona.
"Roll issued a permanent injunction against the provision of the law
that requires local authorities to conduct background checks of
buyers. The Justice Department is considering an appeal" (Law
Enforcement News, June 30, 1994).[2]
This ruling came about after Sheriff Richard Mack, Graham County,
Arizona, filed a lawsuit, stating that the Brady Law was
unconstitutional in the first place and that the background-checks
provision would over tax the finances of his small department.[2]
In an effort to curb the effects of the Brady Law, the officials of
Santa Rosa County, Florida, established a county-wide militia in which
every able-bodied man, woman, and child is a member. "They say militia
members will be exempt from the law under a provision of the Second
Amendment which reads, 'A well regulated Militia, being necessary to
the security of a free State, the right of the people to keep and bear
Arms, shall not be infringed'."[2] Pennsylvania enacted a similar law
some years ago.
Governor Walter J. Hickel, Alaska, also signed into law a bill that
allows the residents of Alaska to carry a concealed weapon. "...he
acted because of concerns expressed by citizens on their need to
protect themselves against criminals. Under the law, Alaskans will
have to obtain a permit from the State Police to carry a concealed
handgun legally. They must be at least 21 years old, pass a criminal
background check and a gun-safety course and pay a $125 fee."[2]
How Effective Is
The Brady Act?
The Brady Act prevents known criminals from obtaining handguns by
imposing a five-day waiting period. During this five days, the state
or local law enforcement agency in that jurisdiction must conduct a
background check on the applicant.[3] If the applicant proves to be a
previously-convicted felon, their application for the purchase of a
firearm is rejected.
The Brady Act is one of many legislated efforts designed to control
the sale and possession of firearms. As a condition of parole, for
example, past offenders are not permitted to own, carry or buy
firearms. The issue of gun ownership in general is at question as a
powerful lobby, usually referred to as the "anti-gunners," continue to
chip away at the right of U.S. citizens to own guns. This movement is
most often driven by liberal politicians and usually well-meaning
citizen groups. On the opposing side of the anti-gun-ownership issue
are the avid hunters and the NRA (National Rifle Association), which
is doing everything it can as an organization to preserve our Second
Amendment rights.
Despite the Brady Act and numerous other programs, federal weapon
offenses have increased by 175% between 1982 and 1992. In addition,
most of the felons convicted in federal court of a firearm-related
offense have already served time in a correctional facility. Of those
convicted of a firearms-related offense, 47% were already prohibited
in some way from owning or possessing a firearm.[4]
Is gun control really working? President Clinton recently pointed
out that, thus far, more than 60,000 known criminals have been
prevented from obtaining a handgun because of this law. Critics also
point out that many of the "criminals" referred to in this 60,000-
plus number includes those guilty of minor offenses, such as traffic
violations and unpaid parking fines. Perhaps more time is needed
before an accurate assessment of the effectiveness of the Brady Act
can be honestly performed.
Bibliography
[1] Two Courts At Odds Over Brady Act Constitutionality, Justice
Bulletin, National Criminal Justice Association, Washington, D.C.,
June, 1996.
[2] Coast-to-coast activity on gun laws, Law Enforcement News,
published by John Jay College of Criminal Justice, June 30, 1994,
pg. 7.
[3] Gun Control: The Brady Law's Impact, Richard Lacayo, published by
Time, February 20, 1995, pg. 47.
[4] Federal Firearms-Related Offenses, Ken Carlson and Tanutda
Pittayathikhun, Abt Associates Inc., published by the U.S.
Department of Justice, Office of Justice Programs, Bureau of
Justice Statistics, Washington, D.C., June 1995, NCJ-148950.
--------------------**--------------------
VIII.
Fire Prevention:
Home Fire Protection
Part 2
---------------------------------------
The 1996 NFPA National Fire Safety Survey
---------------------------------------
Al Colombo
When it comes to the threat of fire, people generally feel safer in
their homes. Yet, this is exactly where they are most likely to die
because of a fire. In a recent report, published by the National Fire
Protection Association (NFPA), Quincy, Mass., 53% of people queried
said that they feel safer in their own home than they do elsewhere.
The same report also revealed that 78% to 80% of all fire deaths occur
in the home.
"People are most at risk from fire in their homes and cars, but they
feel safest at home. They are least likely to feel safe in a hotel,
but hotels are among the safest places to be, based on a comparison of
fire deaths to time of exposure" (1996 NFPA National Fire Safety
Survey, National Fire Protection Association, Quincy, Mass.).
Where People Feel Safe From Fire
+=============+===============+===================+
| Location | Percentage | No. Fire Deaths |
+=============+===============+===================+
| Home | 53% | 78%-80% |
| | | |
| School | 19% | 0%-0.2% |
| | | |
| Workplace | 14% | 2%-4% |
| | | |
| Shopping | 6% | Not Available |
| Mall | | |
| | | |
| Car | 5% | 10%-12% |
| | | |
| Hotel | 3% | 0%-0.5% |
+-------------+---------------+-------------------+
| 1996 NFPA National Fire Safety Survey |
+-------------------------------------------------+
Right or wrong, people instinctively feel safer when they are at
home. One reason, and probably the most common, is that this is where
they spend 55% to 75% of their time. At home is also where they can let
their hair down. The "Home" is the proverbial oasis of solitude and
quietness where people feel insulated and safe from the world and all
the dangers that lurk there. In summary, it is where people go to get
away from it all.
Currently, according to the NFPA survey report, the most common fire
safety precaution used by people in their homes is that of smoke
detectors (93%). Others include fire extinguishers (72%), yearly
furnace inspections (63%), and monthly smoke detector tests (55%).
Although fire extinguishers are one of the most common fire safety
devices now in home use, NFPA points out that their research revealed
that most homeowners do not really know how and when to use them.
Common Fire-Safety Equipment
in U.S. Homes
+===============================+
| Device or | Percentage |
| Practice | |
+===============================+
| Smoke Detectors | 93% |
| | |
| Fire | 72% |
| Extinguishers | |
| | |
| Annual furnace | 63% |
| Inspections | |
| | |
| Monthly Smoke | 55% |
| Detector Tests | |
| | |
| Annual Chimney | 44% |
| Inspections | |
| | |
| Practiced | 36% |
| Escape Plan | |
| | |
| Escape Ladder | 16% |
| | |
| Automatic Fire | 4% |
| Sprinklers | |
+-----------------+-------------+
| 1996 NFPA National Fire |
| Safety Survey |
+-------------------------------+
"Slowly but surely," NFPA says, "automatic fire sprinklers for the
home are catching on, particularly in rental properties in the western
U.S." However, for early warning of fire, the smoke detector has
proven itself time and again as a life saver. Homeowners are still better
off adequately protecting their homes with multiple smoke detectors.
Because so many people now have at least one smoke detector in their
homes, the number of annual fire deaths has drastically decreased.
Perhaps because of this, NFPA's survey revealed that 88% of the people
queried believe that it would be their smoke detector that would wake
them up in a fire. The next likely method is that of the actual smell
of smoke (4%).
What Would Wake People
in a Fire Situation
+===============================+
| Item To Awaken | Percentage |
| People | |
+===============================+
| Smoke Detectors | 88% |
| | |
| The Smell of | 4% |
| Smoke | |
| | |
| A Pet | 3% |
| | |
| Noise | 2% |
| | |
| Heat | 1% |
| | |
| Nothing | 1% |
| | |
| Other | 1% |
+-----------------+-------------+
| 1996 NFPA National Fire |
| Safety Survey |
+-------------------------------+
"The other items mentioned will do little to wake people threatened
by fire. The odor of smoke may be powerful to someone who is already
awake, but the sense of smell is weaker during sleep," NFPA says.
"Furthermore, the first effect of gases from fire is to deepen sleep,
not to wake people up."
The truth of the matter is, people without smoke detectors usually
die from smoke inhalation, long before the heat of the fire actually
reaches them. The ordinary smoke detector is the best early-warning
means that people have that will awaken them when there is a fire. Be
sure to install at least one smoke detector on each floor of your home
and have at least one detector in each bedroom hallway.
Another critical matter is how these smoke detectors are installed.
Many people fail to read the instruction booklet that came with their
detectors. Consequently, when they install them, they either do so too
close or not close enough to the corner of the wall and ceiling.
Although the most common range for the mounting distance of a smoke
detector is 8 to 12 inches from the corner of the wall and ceiling,
always read the installation booklet and use the recommended distance
given by the manufacturer.
+---------------------------------------------------------+
| Editor's Note: Watch for future articles on NFPA's fire |
| national survey, that will appear in the Safety & |
| Security [electronic] Magazine. --Al Colombo |
+---------------------------------------------------------+
--------------------**--------------------
IX.
S&S Update
Partial Victory for Officer
In Radar-Cancer Claim
The Virginia Workers Compensation Commission, Norfolk, Va., recently
agreed to pay part of the medical expenses incurred by Frank Chappell,
a Portsmouth, Va. police officer, after he was disgnosed as having
testicular cancer. Chappell was repeatedly exposed over a 13-year
period to the low-level radiation of a traffic radar gun. As part of
this treatment, Chappell underwent the removal of his right testicle
in 1994.
Seeking compensation for his medical bills, the Virginia Workers
Compensation Commission found reasonable evidence that Chappell's
cancer was the result of his daily exposure to a traffic radar gun,
which he held between his legs while sitting in his police car.
According to Law Enforcement News, John Jay College of Criminal
Justice, New York, N.Y., his claim was originally refused because he
waited too long to file complaint. Chappell then filed an appeal with
the Commission, and in the mean time Portsmouth City agreed to pay the
portion of his medical expenses not covered by his health insurance.
In addition, they agreed to pay sick time for the days he lost during
his chemotherapy treatments, which were every day for more than four
months.
Since the settlement, Chappell has filed an $11 Million civil suit
against the company who manufactured the radar unit he used everyday.
----------*----------
Meter-Reader Bill
Passes Senate Committee
Legislation pending in Pennsylvania may force utility companies to
conduct extensive criminal background checks, psychological screening
and drug testing on all prospective employees who intend to read
meters. The proposed legislation resulted after a Pennsylvania woman
was allegedly raped in her own home by a contract meter reader working
for Bermex Inc. Bermex provided meter readers to Peoples Gas Co. of
Pittsburgh under special contract.
The bill passed the Senate Consumer Protection and Professional
Licensure Committee in late June. Before it can become law, however,
it must be heard in full chamber. The bill would require proof that
utility companies have conducted the appropriate background checks and
psychological testing. Union workers in the utility industry, however,
say that the bill falls short of protecting consumers because under
the provisions of this bill, utility companies can still hire contact
meter readers.
--------------------**--------------------
X.
Editor's Last Say:
Visit The Safety & Security [electronic] Magazine homepage on the
World Wide Web. From there you can access each of the editors' E-mail
addresses and subscribe to the magazine for E-mail delivery. Clicking
on a special link will also enable you to view the current issue of
the magazine, as well as back issues in a depository of past issues.
Also, view additional safety-related articles, many of them written
by Al Colombo, Editor, on the "Home Safety" homepage. Both the "Safety
& Security Depository" and "Home Safety" homepages are contained on
the Osnaburg Wizard Web server; compliments of East Canton High
School, Stark County, East Canton, Ohio.
You can find us at: http://ourworld.compuserve.com/homepages/acolombo.
--------------------**--------------------
XI.
EndNotes:
S&S Magazine
E-mail Addresses
Allan B. Colombo
Editor
al.colombo@cancomm.com Internet
Ron Nelson
Co-Editor
72202.121@compuserve.com Internet.
Laura Quarantiello
Contributing Writer
73733.1653@compuserve.com Internet.
Nick Markowitz
Contributing Writer
nmarkow125@aol.com Internet.
-----+-----
On The Web:
Safety & Security Home Page
http://ourworld.compuserve.com/homepages/acolombo
Safety & Security Depository
http://wizard.stark.k12.oh.us/community
-----+-----
Bulletin Boards:
CompuServe Information Systems-
TWCRIME, AARP, TWDWELLINGS, SafetyNet
Canton Communications (CanComm)
Canton, Ohio
Online: 330-477-4504
Voice: 330-477-3080
-----+-----
Disclaimer
The information and tips contained in the Safety & Security
Magazine is meant for entertainment purposes only. The
authors cannot guarantee the personal safety and well
being of those who read and use the information herein.
(c)1996 Carroll Publications
Safety & Security Magazine
P.O. Box 30076
East Canton, Ohio 44730
Phone: 330-488-1119
safety.security@cancomm.com
From abc1os@wizard.stark.k12.oh.us Thu Oct 9 20:36:58 1997
Return-Path: <abc1os@wizard.stark.k12.oh.us>
Received: from wizard.stark.k12.oh.us (wizard.stark.k12.oh.us [199.218.200.6])
by mrin46.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
with ESMTP id UAA13937 for <nmarkow125@aol.com>;
Thu, 9 Oct 1997 20:36:07 -0400 (EDT)
Received: from LOCALNAME (208.132.38.153) by wizard.stark.k12.oh.us
with SMTP (Eudora Internet Mail Server 1.2); Thu, 9 Oct 1997 20:34:26 +0100
X-Sender: abc1os@wizard.stark.k12.oh.us
X-Mailer: Windows Eudora Light Version 1.5.2
Mime-Version: 1.0
Content-Type: multipart/mixed; boundary="=====================_876450255==_"
To: 100336.675@compuserve.com, 72274.3147@compuserve.com,
bshaffer@ix.netcom.com, 75667.1035@compuserve.com
From: Allan Colombo <abc1os@wizard.stark.k12.oh.us>
Subject: October issue, Safety & Security Mag
Cc: 100145.2747@compuserve.com, kken@vais.net, edualves@ism.com.br,
nmarkow125@aol.com, 72274.3147@compuserve.com, minorj@timken.com,
randy.mitchell@tpr.vnet.com, randy.mitchell@chrysalis.org,
76606.1202@compuserve.com, nvestig84u@aol.com, sesecprdt@aol.com
X-Attachments: C:\PCWRITE\S&S\OCT97MAG.TXT;
Date: Thu, 9 Oct 1997 20:34:26 +0100
Message-ID: <1335693230-10872709@wizard.stark.k12.oh.us>
--=====================_876450255==_
Content-Type: text/plain; charset="us-ascii"
Welcome to the Safety & Security Electronic Magazine Mailing List!
The Safety & Security [electronic] Magazine is a monthly publication
that provides helpful tips and information on personal, home and workplace
safety and security. This monthly publication also includes Helpful travel-
related stories.
There are three ways to receive the Safety & Security [electronic]
Magazine: download or view it on a BBS, download or view it on the World Wide
Web, or direct to your mailbox via E-mail.
To subscribe, send a message to acolombo@compuserve.com with
one of the keywords, JOIN, ADD or SUBSCRIBE, in both the subject line and
body of the message text.
To remove yourself from this mailing list, send a message to
acolombo@compuserve.com with one of the keywords, DELETE, UNSUBSCRIBE or
REMOVE, in both the subject line and body of the message text.
If you have any problems subscribing or unsubscribing, please send an
e-mail message to safety.security@cancomm.com.
This is a distribution mailing list only. Any messages sent to this
mailing list will not be distributed to all members. It will be sent to the
author of the S&S Magazine.
Al Colombo (safety.security@cancomm.com)
--=====================_876450255==_
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: attachment; filename="OCT97MAG.TXT"
+-----------------+ +--------------------------+ +-----------------+
+-+ | | | | +-+
+---+ | | Safety & Security | | +---+
+--+ | | [electronic] | | +--+
+--+ | | Magazine | | +--+
+--+ | | | | +--+
+--+ +--------------------------+ +--+
==================================================================
Volume 3, Issue 11 (c)1997 Safety & Security Magazine October 1997
==================================================================
Each month in the Safety & Security [electronic] Magazine
you will find helpful and informative articles on topics
related to property protection and personal safety and
security at home, at work, and while traveling.
+-------------------+
| Table of Contents |
+-------------------+
I. Editor's Say: Crime Prevention Month; The Power of Prevention --
Action Makes the Difference
II. Personal Protection: Defend Yourself From Werewolves
III. Basic Crime Prevention: Break The Crime Triangle
IV. In The News: Police to Have Unlimited Access to Medical Records;
Bank Secrecy Act; Sex Offenders and Civil Commitment;
Police Find Fugitives Using Welfare Rolls
V. Home Protection: Home Security Basics
VI. Virus Protection: How To Protect Your Software; What You Don't
Know About Viruses Can Hurt You, Part 3
VII. Highway Safety: Road Rage, the New American Killer
VIII. Technology: GPS Ready For Mass Markets
IX. Editor's Last Say: Privacy Concerns
X. EndNotes: Staff, E-mail addresses, View On The Web, Bulletin
Boards, Subscription Info, Disclaimer, Contact Info
----------*----------
I.
Editor's Say:
Crime Prevention Month
-------------------------------------------
This year's theme, The Power of Prevention:
Action Makes the Difference
-------------------------------------------
Whether you work in policing, corrections, military the public
sector, preventing crime in your neighborhood and home is extremely
important; not only for you personally, but for your family, friends
and neighbors as well. Unless everyone takes the time to get involved
by reporting suspicious persons and activities, our neighborhoods will
grow increasingly unsafe.
Every October, the National Crime Prevention Council, Washington,
D.C., sponsors Crime Prevention Month. This year's theme, "The Power
of Prevention: Action Makes the Difference," proclaims what
communities all across the nation already know: crime prevention
is everybody's business. When everyone comes to the place where they
are willing to get involved, crime and fear will no longer dominate
our lives.
Scattered throughout this issue are numerous crime prevention
stories, written by the staff of the Safety & Security magazine, the
Ohio Crime Prevention Association, Dublin, Ohio, and the National
Crime Prevention Council. With a little time and effort, your home
can be the safe castle that it was once ment to be. --Al Colombo
+----------------------------------------------------------+
| Send your comments and questions to the author of this |
| editorial by sending it to: safety.security@cancomm.com |
+----------------------------------------------------------+
----------*----------
II.
Personal Protection:
Defend Yourself From Werewolves
------------------------------
There are predators out there.
------------------------------
Michael E. Chesbro
October is the month for Halloween, for ghouls, goblins,
werewolves...and "Crime Prevention Month." Many of us enjoy a good
monster movie around Halloween, and the chill runs through us as we
watch the werewolf hunt its victim. However, none of us expect to run
into one on the way home from the theater. After all, they are only
make believe...right?
Actually, the author believes in werewolves because he has seen
them; and he has seen their victims. These werewolves are not those
found in monster movies; but rather they are found on the streets of
our cities and towns. They are the violent criminals who hunt down the
innocent on the street and in their homes.
Werewolves hunt for people who have money, someone to rape, anyone
to beat until they are broken and bloody. Werewolves also kill simply
because someone has wondered into their "turf," or because they are of
a different race. Sometimes they kill for no apparent reason at all,
other than they are bored and need something entertaining to occupy
their wasted time.
Remember the riots in Los Angeles where a violent minority group did
not agree with the verdict returned by a court and jury. Do not forget
the woman dragged from her car, beaten and thrown into the gutter
where she layed while people drove her car away with her infant child
in the back seat. Although the woman survived, her child was found
murdered and thrown into a trash dumpster! Violent crime is a real
concern in today's society. No one wakes up in the morning knowing
that he or she will be attacked later in the day; no one plans to be a
victim of violent crime--but violent crime's occur every day!
Unfortunately, many people do not believe in the violent criminal who
stalks our streets. Like the werewolf in the movies, the violent
criminal just is not real. We may read in the morning newspaper that
someone was beaten and robbed last night. We may feel shocked to read
of the nurse who was raped in the hospital parking lot as she walked
to her car after working a late shift.
We should also wonder about the fact that after the citizens in our
nation's capital were denied the right to own a firearm, and thus lost
their most effective means of self-defense, the murder rate in
Washington, DC rose 300 percent!!! Yet, too often, we read about these
crimes and then turn to the sports page, the better homes section, or
the comics and forget that the victims on the front page could have
been us. After all, we say, that happened in "the city;" we live in a
nice quite neighborhood, I do not have anything that anyone would want.
Oh... I would just give them my purse (wallet) and call the
police..... I do not really carry much cash, and I can cancel the
credit cards with a quick telephone call. However, will your wallet or
purse be enough to satisfy the criminal who may decide to kill you
just because he does not like the way you look, or maybe he does not
want to leave any witnesses behind.
In this article the author hopes to convince you that there is a real
threat of violent criminal attack, and to offer some options for
dealing with this threat. No one means of self-defense is right for
everyone. In some places, ill-conceived laws limit citizens' choice
in the self-defense methods available. In other cases. you may not be
prepared to commit to using a certain method of self-defense.
Generally, it may be said that the very best method of self-defense
is simply the knowledge or awareness that you could easily become the
target of a violent criminal. You should have a pre-planned and
practiced method of defending yourself ready if such an attack ever
occurs so you will not become a victim. With that in mind, let us
consider some of the possible self-defense methods available to you.
Firearms
In the hands of a person who is competent in its use, a firearm is
by far the most effective tool for defense against a violent, life-
threatening criminal attack. Of all the firearms available, the
handgun is generally the most effective firearm for personal defense,
although the shotgun has its own unique advantages.
When choosing a handgun for self-defense, choose a caliber that has
a proven ability to stop a violent attacker at close range with a
single, well-place shot. This being said, you must understand that no
handgun round can be guaranteed to stop a violent, determined
attacker in each and every case.
Of all the handgun calibers available, the .45 caliber ACP is
generally considered the most effective self-defense round. Other
effective calibers are the .357 Magnum, 10mm, and .40 caliber S&W.
Using specialty ammunition 9mm Parabellum (Luger) and .38 Special can
also be effective. Calibers smaller than .38, or 9mm do not have
sufficient energy to be effective self-defense rounds.
A second, and very important consideration when choosing a handgun
for self-defense is to choose a handgun that you can easily carry
concealed. The most powerful handgun in the world will do you no good
if it is not available to you when it is needed. Many states (at least
those that recognize the rights of their citizens) provide for the
average citizen to receive a permit to carry a handgun for self-
defense. In states where you may lawfully carry a handgun, it pays to
choose one that may be easily carried, thus making it more likely that
you will have your handgun should you need it.
Finally, if you choose to carry a handgun for self-defense you must
be competent in its use. This means regular practice on the shooting
range. Here is a brief, simple test you can perform at the shooting
range to gauge your self-defense shooting ability:
1) Start with your handgun holstered and concealed as you would
normally carry it on the street.
2) From a distance of 7 yards (21 feet) you will fire at two 10 inch
diameter targets. At the signal to fire, draw your handgun from its
holster and fire two rounds at each target (a total of four
rounds).
3) Record your time from the start signal to your fourth shot.
4) Repeat this drill three more times, for a total of four times and
16 shots fired. For each shot on target give yourself 10 points
(maximum 160 points, 16 x 10). Add your times (in seconds) for each
of the four series you fired. Divide your total time in seconds
into your total score from hits on your target (i.e. 150 points, 15
out of 16 hits, in a total of 16 seconds gives you a final score of
9.375).
5) A score above 9.0 is Excellent, 7.5 to 9.0 is Good, 6.0 to 7.5
Fair, and below 6.0 is Unsatisfactory.
This is intended only as a brief self-evaluation of your self-
defense shooting ability. There is much more involved in using a
handgun for self-defense than shooting drills on the range. Therefore,
the author strongly recommends that, if at all possible, you should
attend a school that teaches proper use of handguns in personal
defense.
For additional information about handguns in self-defense, contact
one of the following schools:
* Chapman Academy, 4350 Academy Rd., Hallsville, MO 65255, Tel:
800-847-0588
* Gunsite Training Center, Box 700, Paulden, AZ 86334, Tel: 520-
636-4565
* Thunder Ranch, Inc., Box 53, Mountain Home, TX 78058, Tel:
210-640-3138
* Wilson Combat, Box 578, Berryville, AR 72616, Tel: 1-800-955-
4856
Pepper Spray
Chemical self-defense sprays (commonly called "tear-gas" or "mace")
are available in three basic types: CN, CS, and OC (pepper spray). CN
and CS are chemical agents developed by the military as training and
riot control agents. OC (Oleoresin capsicum) is derived from cayenne
peppers.
All of these substances, CN, CS, and OC, have the same intended
effect in self-defense: they cause tearing of the eyes, difficulty in
breathing, and pain. The objective in this case is to deter an
attacker. It is generally accepted that, in personal self-defense
situations, OC is more effective than CN or CS is deterring an
attacker. Therefore, we will focus on OC, or pepper spray, as it is
often called.
OC may be had in 1% solution, 5% solution, and 10% solution. There
is almost no difference, so far as the individual effect, of 1, 5 or
10 percent OC in its ability to incapacitate an attacker. The real
difference lies in duration of effect (i.e. how long it take the
individual sprayed with pepper spray to recover from its effects). In
a self-defense situation this is not all that important, as the effect
from a 1% solution OC product is usually sufficient enough to allow
an intended victim to escape before their attacker recovers from the
effects of the pepper spray.
So, just how effective is pepper spray? A research paper, published
by the National Institute of Justice (NIJ) in March 1997, showed that
OC spray successfully incapacitated humans in 156 out of 174
confrontations, or about 90% of the time. In the other 18 cases the
report stated that the subjects were not fully subdued. The report
further stated that these 18 individuals appeared to be on drugs or
mentally troubled, and suggested that such individuals may not yield
to the effects of OC.
The NIJ study focused on Baltimore (MD) County Police Department's
use of OC in police operations. Although OC has some limitations,
there is clearly a place for its use in individual self-defense
situations.
As with any method of self-defense, however, there is a need to
practice one's self-defense techniques. Most supplies of chemical
self-defense sprays also provide inert (water based) training sprays.
If you intend to add OC in your self-defense plan, the author strongly
suggests that you obtain one of these training sprays. Also, practice
with a partner.
Martial Arts
There are several different styles of martial arts. The purpose of
of each one of them will vary in their emphasis. Where one schools
focuses on traditional martial arts, another highlights the
competition of the sport. Others concentrate on self-defense and some
even attempt to combine all these traits in their training. For the
purposes of this article, however, the author will focus on martial
arts for self-defense purposes only.
The first thing to understand is that no system of martial arts
(unarmed self-defense/hand-to-hand combat) will make one entirely
invincible. A good martial arts program will allow the student to
learn techniques that can be employed to defend against an attacker.
It will also improve the level of physical fitness of the student and
allow the development of confidence so that the student does not
project an image of "target" or "victim" to a would-be criminal.
With all other things being equal (skill and teaching ability of the
instructor, professionalism of the school, etc.) the best all around
"self-defense" martial art, suitable for the greatest number of
people, is Jujutsu. Jujutsu and its associated arts will teach you to
throw a person to the ground, to escape from holds and grabs, and to
defend against punches and kicks. Most importantly however, Jujutsu
will teach you to fall or be thrown to the ground without being hurt.
You may also hear it said that "Strength is not important in martial
arts if you have mastered the techniques." Generally, this is not
true. Strength does, in fact, play an important part in any hand-to-
hand situation. However, if you do not have a lot of physical
strength, you will usually do better with a throwing art, like Jujutsu
or Aikido, as opposed to a martial art that focuses on strikes, like
Karate. The 105 pound woman who is attacked by a 250 pound,
intoxicated man will usually have a better chance of using a
throwing/tripping technique to throw her attacker to the ground and
escape than she will by trying to disable him with punches and kicks
before trying to escape.
The study of martial arts requires dedication and commitment. Some
people spend their entire lives in pursuit of the mastery of a martial
art. From the self-defense perspective, no matter what martial art you
choose to study, you should plan to train regularly for six months to
a year before you can reasonably be expected to be able to effectively
use your martial arts techniques against a determined attacker.
Your Most Effective Weapon
If there is any one secret to self-defense and protection from
crime. it has got to be "personal awareness." Criminals generally seek
out victims who appear to be "easy targets." If you are alert and
highly aware of your surroundings, and you have a well thought-out
plan for self protection, it is quite likely that you will never face
a violent criminal because criminals go for easy targets.
Editor's Note: Mention of a product or service in this article does
not constitute an endorsement by Safety & Security Magazine or its
author. Those products and services listed are intended to serve
only as a starting point for individuals wishing to obtain
additional information regarding their specific self-defense
needs. --Michael Chesbro
+---------------------------------------------------+
| Send your comments and questions to the author of |
| this story. Send it to 100336.675@compuserve.com |
+---------------------------------------------------+
----------*----------
III.
Basic Crime Prevention:
Break The Crime Triangle
Al Colombo
Crime prevention begins with a basic understanding of why crime
occurs in the first place. In reality, law enforcement and crime
prevention practitioners all agree that there are three elements to
crime: "need," "opportunity," and a "victim." These three crime causes
form a triangle:
+-------------------------------------+
| NEED |
| /\ |
| / \ |
| / \ |
| / \ |
| / \ |
| / \ |
| / \ |
| OPPORTUNITY -------------- VICTIM |
+-------------------------------------+
| Crime, as seen by the above Crime |
| Triangle, requires all three |
| elements before a crime can take |
| place. (Source: OCPA, Dublin, Oh) |
+-------------------------------------+
At the very top of the triangle is "NEED." At the bottom left is
"OPPORTUNITY," and at the bottom right. "VICTIM." All three must be
present for a crime to occur. For example, when a crime takes place,
there is always a perceived NEED on the part of the criminal. This
NEED might be real or it may be imagined; but, to the perpetrator, it
is real.
NEED can take the form of cash, but more often it involves property
theft, which is often converted to cash. For example, a disgruntle
employee at a large manufacturing company may feel quite justified in
taking raw or finished goods from an assembly line, rework department
or stockroom. Their rationale is quite simply that they are merely
getting the additional pay that the company should have paid them but
did not. Another example is the retail sales clerk who believes that
it is alright to take finished goods from their employer's store. In
this case, the NEED for goods may have been encouraged by a lost
promotion or a forgotten pay raise.
The second element necessary for crime is OPPORTUNITY. In the case
of the factory worker and sales clerk, both were trusted by their
employer and given full access to the goods that were taken. One way
to minimize the risk of loss is to limit or remove employee access.
By eliminating opportunity you reduce the likelihood of theft.
However, by eliminating employee access, the effective and efficient
operation of both a retail or manufacturing company would surely
suffer.
The third element needed is a VICTIM. Just like the other two, if
you remove the VICTIM from the crime triangle, then you eliminate the
crime. In fact, interrupt any one of these three crime aspects, and
you eliminate the crime. Of course, criminals often do more than just
steal goods. In fact, victims also take the form of individuals, and
personal safety and security is the primary reason why police officers
and crime prevention practitioners work hard to teach people how to
protect themselves using basic crime prevention tools.
One way that crime prevention practitioners say that you can prevent
crime is to carefully choose where you go and when you go there. If
you must venture out after dark, especially in the city, be especially
aware of people and activities going on around you. If walking alone
on the sidewalk, do not walk next to the buildings, someone could be
waiting in one of the alcoves for a victim to come along. By the same
token, do not walk too close to parked cars, for fear that someone
might be crouched down behind one of them.
Above all, trust your instincts. For example, while walking along a
city sidewalk after dark you suddenly sense danger, chances are you
are in danger. Trust your instincts and take immediate action to
protect yourself. If necessary, and if saftey permits, cross the
street to the other side; or, if there are no cars on the street, walk
on the street to avoid danger.
Parking garages are another source of danger for ordinary people.
When entering one, make sure that ALL your doors are locked, stay
alert, be on your toes, and be ever ready to respond at a moment's
notice. Be sure to carefully choose the spot you park in. Make sure
it is well lit and as close as possible to the stairway or elevators.
Before pulling into the parking spot you have chosen, check
underneath the cars adjacent to the spot you want. Look for someone
crouched down behind one of them. If necessary, pull up so you can see
the other side of the farthest vehicle, then back up and pull in the
spot. Also, avoid parking in a slot next to a car with someone sitting
in it. This person, no matter how honest they may appear, could be a
predator waiting for a victim to come along.
In each of the situations above, the intended victim made an
attempt to minimize their risk of attack by reducing or removing a
criminal's OPPORTUNITY or by eliminating the VICTIM. For example, by
not parking next to a car with someone in it, you eliminate a
criminal's OPPORTUNITY by removing the VICTIM. You also remove
the criminal's OPPORTUNITY when a locksmith installs double-cylinder
deadbolt locks on all your doors and an electrician installs ample
outside lighting around entrances. If you eliminate the one, you
remove the other, which greatly reduces risk.
+--------------------------------------------------------------+
| Send your comments and questions to the author of this story |
| by sending it to: safety.security@cancomm.com |
+--------------------------------------------------------------+
----------*----------
IV.
In The News:
Police To Have Unlimited
Access to Medical Records
The Clinton administration is about to provide state and federal law
enforcement with unlimited access to medical records without the
consent of the patient, something that has traditionally not been
allowed. "Donna Shalala, the secretary of health and human services,
plans to announce the proposals at a congressional hearing Thursday,"
said Robert Pear, author of NEW LAWS MAY LET POLICE INSPECT MEDICAL
RECORDS, N.Y. Times News Service.
Although the reason for this change in federal law is related to the
recent state and federal investigations into Medicare and Medicaid
fraud, privacy advocates are sure to question the potential for misuse
by unscrupulous investigators in matters not related to medical
payment fraud. According to Pear, such investigations conducted by the
FBI have more than tripled over the past five years. This means it
will be easier for law enforcement to access medical records than a
bank's database, cable television records, or video rental records.
Access to these information sources will continue to be protected by
federal privacy laws.
-----*-----
Bank Secrecy Act
According to Ira Madsen, author of THE BANK SECRECY ACT--ANOTHER
GOVERNMENT ASSAULT, if you fail to report certain monetary
transactions, even though they are entirely honest and above board,
you open yourself to arrest and a criminal felony charge.
"You may not know this, but under the provisions of the Bank Secrecy
Act, a Currency Transaction Report (IRS Form 4789) must be filed with
the IRS for any cash transaction involving $10,000 or more. But that
is not all. CTRs must also be filed by anyone purchasing more than
$3,000 in money orders or making transfers among bank accounts in a
series totally $10,000 or more," says Madsen.
Banks are also required to report these transactions, and they can
file for you as well. But, if a teller suspects that you do not know
to file, he or she could turn you in by personally calling federal
authorities and telling them about the transaction. For doing so, the
employee stands to collect $150,000 as a reward. Although this is
unlikely to occur, according to Madsen, the mechanism that could make
this happen is now in place.
The reporting requirement allegedly also applies to, "Private
bankers, brokers, investment bankers, currency dealers, check cashing
firms, credit card and insurance companies, metals dealers, jewelers,
pawnbrokers, loan companies, travel agencies, money senders, real
estate transactions, casinos and others," says Madsen.
For not filing, violators face five years in prison and a $250,000
fine. Not only that, but under federal law, the accounts involved in
the transaction(s) is subject to seizure. For additional information,
visit http://www.pnc.com.au/~cafmr/hammell/index.html, which is
sponsored by John C. Hammell, legislative advocate, IAHF, or E-mail
him at jham@concentric.net.
-----*-----
Sex Offenders and
Civil Commitment
The Supreme Court, in a recent decision (Kansas vs. Hendricks),
ruled in favor of the State of Kansas, allowing law enforcement in
Kansas to confine sex offenders found "mentally abnormal" or with a
"personality disorder" that is likely to result in a predatory sexual
act. In this case, the sex offender can be committed to a mental
hospital.
The guidelines set down in the Kansas legislation requires the state
to first provide counseling and an examination by a mental health
professional. The confinee must also be given the right to cross
examine witnesses and to review state-presented documentary evidence.
Once committed, the state must afford the sex offender every
opportunity to prove himself competent. For example, the court that
committed the individual must determine whether continued commitment
is necessary by conducting annual reviews. The individual himself is
also permitted to file a petition of release; or the secretary of
social and rehab services can have him released by declaring that a
change in his situation has occurred.
-----*-----
Police Find Fugitives
Using Welfare Rolls
Thanks to legislation signed this past June, law enforcement in Ohio
is taking a serious bite out of crime by using state welfare rolls to
locate wanted fugitives of the law. According to Lt. Dan Pierron of
the Montgomery County sheriff's department, the sheriff's office sent
86 names to the state auditor's office. Forty three names came up
after running a cross check using the welfare database. Seventeen of
the 43 either fell under another department's jurisdiction or the
perpetrator was not discovered at the addresses given.
In the end, 12 warrants were served. Pierron said that his
department intends to continue to use state welfare records to locate
fugitives because it gives them another place to look. It is also an
effective way to save state welfare money, said Bob Lidman, state
auditor's office.
+--------------------------------------------------------------+
| You can send your comments and questions to the author of In |
| The News by sending them to acolombo@compuserve.com |
+--------------------------------------------------------------+
----------*----------
V.
Home Protection:
Home Security Basics
Ron Nelson
A good security system incorporates many devices that are designed
to alert you and the necessary authorities of an attempted burglary or
dangerous situation. Well designed systems have layers of protection
that can be incorporated into your security program, depending upon
your lifestyle and occupancy of the home.
The traditional approach is to use contacts on exterior openings and
then install a network of interior "traps" or additional areas of
protection that will be activated when an intruder moves about the
house. This month we will look at these basic burglary detection
devices and future articles will cover fire, gas, water, other
security-related detection devices, and remote monitoring techniques.
Contacts
The first-line of defense are contacts installed on doors and
windows. These devices will activate the alarm if the door/window is
opened more than a few inches. It is advisable to have contacts on all
exterior doors and windows that a would be burglar could use to gain
entry. This would include all basement, ground floor, and even on the
upper floors if there is a roof, ledge or other means that could
facilitate entry.
Most contacts used today consist of two parts, a sealed reed switch
and a magnet. They may be surface mounted or concealed ranging in size
from 1/4 to 3 in. and come in a few selected colors such as white,
ivory, or brown. If you want to be able to leave certain windows open
a little for ventilation, it is possible to install one switch and two
magnets, one in the fully-closed position and the second positioned so
that window can be open. Care should be exercised when doing this to
make sure that the open area is not sufficient to allow entry or to
permit an intruder to compromise the contact.
Glass-Break Detectors
These units are designed to detect the sound and or vibration of
breaking glass. Depending upon the type of detection employed, they
are mounted directly on the glass, frame, wall, or ceiling. Units
designed for wall and ceiling mount can provide protection for more
that one window. When installing glass break detectors it is very
important that the area of coverage be tested with all window
coverings, drapes/blinds, etc., in their normal position.
Screens
A higher cost alternative to glass break detectors is to use
residential window screens. These are special screens that have a fine
wire woven into the material which will break if someone cuts the
screen. These devices have the additional advantages of being active
at all times and do not hamper your normal opening/closing of the
window.
Interior "Traps"
These are devices that are designed to detect the motion of an
intruder as they move about your home. They can be motion detectors,
stress detectors, floor mats, or even contacts on interior doors.
Since the purpose of these units is to detect an intruder after they
have gained entry into the home they react to movement and are
generally not active when the home is occupied.
Motion Detectors
Most motion detectors used today are either Passive Infrared
Receivers (also called Passive Infrared Detectors or PIRs) or dual-
technology detectors, such as those that combine PIR technology with
microwave detection. Dual detectors have gained in popularity due to
their able resistance to false alarms.
You can install motion detectors in every room or locate them in
areas that are likely to be used by a burglar, such as common halls,
stairs, computer room, or the master bedroom. If you have pets care
must be exercised in locating motion detectors so that they are not
activated by the movement of your pet. Some manufacturers have
designed special "pet immune" detectors that reduce the possibility of
a pet-caused false alarm. In any case, special care is in order when
installing this type of detector. These units can not be active when
you are at home or likely to enter the areas of protection.
Stress Detectors
These are electronic devices that are generally mounted on the floor
beams and can detect the slight flexing or stress that is caused in
the floor joists when someone walks through a room. These units can
be adjusted to allow pets to move about without tripping the system.
Floor Mats
Mats are long, thin switches that are generally placed under the
carpets in a home. They are activated by the weight of someone
walking on them. Like motion detectors, these devices should be active
when you are at home for they can easily cause false alarms.
Interior Contacts
Interior door contacts can also be used to detect movement inside
your home. By installing contacts on certain doors, such as basement,
garage, closet, safe, gun cabinet, and bedroom doors, you can protect
interior areas without installing interior motion detectors, which is
ideal in homes with pets. Using this arrangement, an alarm condition
is initiated when an intruder opens an interior door. These are much
less expensive than the other methods of interior detection but will
not detect an intruder who does not open any of the selected doors.
Which approach is right for you? That depends upon many factors,
like the construction of your home, your family's lifestyle, the
degree of security desired, and, of course, the amount of money you
wish to spend. Before buying the first thing that comes along, discuss
the various security approaches available with your local security
company, then decide on what is best for you. Remember, in security
there is no such thing as "one size fits all." A truly effective
security system is one that is specifically designed for your
particular home.
+------------------------------------------------+
| Send your comments to the author of this story |
| by sending them to: ron@topservice.com |
+------------------------------------------------+
----------*----------
VI.
Virus Protection:
How To Protect Your Software
---------------------------------
What You Don't Know About Viruses
Can Hurt You, Part 3
---------------------------------
Bruce Shaffer
Now, what can you do to protect yourself from a virus attack? There
is only one way to ensure that you have no viruses and that you will
never get one: build your own PC from the ground up, including
programming the CPU. Do not include any disk drives or comm ports
either.
Not a very useful computer would you say? You can, however, do other
things to minimize your chances of contracting a virus infection,
such as:
o USE A QUALITY VIRUS SCANNER!
This is the single most important thing you can do. In
addition to installing the software, you must also maintain the
signature files for it as well. These are usually posted
somewhere electronically every month. A high quality program
will also allow for intermediate updates during the month.
Register your software so you can avail yourself of what ever
services the publisher offers.
o NEVER, EVER DISABLE YOUR SCANNER!
For almost every instance where I was called in to help out
someone who was running a scanner and kept it up to date, they
disabled the scanner because it was interfering with something
they tried to do. I did this myself once and picked up EXEBUG
virus.
o SCAN EVERY DISKETTE OR CD-ROM THAT GOES INTO YOUR PC!
The majority of viruses are spread via diskette. If the
diskette went into someone else's PC, then there is a good
chance it is infected. Even blank diskettes out of a sealed
box can be infected. Formatting a diskette will not clean the
virus off of it if it is formatted on an infected PC.
o DO NOT EXECUTE ANY PROGRAM THAT IS E-MAILED TO YOU!
If it is from a trusted source, then I would scan it first. If
it just appears in your mailbox one day from an unknown source,
delete it. Experience shows me that it is probably worth what
you paid for it. There was a program that used to be sent to
new users on AOL that would format the user's hard drive for
them. This particular program was sent out by some twisted
vandal who thought there were too many people on AOL already.
The author was awaiting sentencing the last I heard.
o VIEW E-MAILED .DOC FILES WITH A VIEWER, NOT MSWORD!
Even if you trust the person who sent it to you. Macro viruses
are so easy to write that in the last two years we have seen
literally hundreds of new macro viruses come on the scene.
They are coming out so often and are so easily spread across
the Internet that there is a chance that your document could
contain one that is not recognized yet by your scanner.
o CHANGE THE BOOT SEQUENCE OF YOUR PC!
PCs, by default, always look to the floppy drive first when
booting and will attempt to load whatever they find there.
Virtually all PCs made in the last three years will allow you
to change that so that the PC always boots off of your hard
drive first. You will need to refer to the documentation that
came with your PC to change your BIOS settings. Doing this
will eliminate almost 80% of the known viruses, or all boot
sector viruses.
o BEWARE OF THE FALSE AUTHORITY!
Many people claim to know all about viruses. Perhaps they do,
but, I would check credentials. My own credentials are a
Bachelor's Degree in Computer Science, almost 20 years
experience in the computer industry, (strictly technical), have
spent the last 10 years in computer services, am a network
engineer, am a member of the NCSA, have been fighting viruses
since I first saw them in 1988 and can give references. Like I
said, check credentials.
o BEWARE OF THE SCANNER THAT WILL DETECT ALL KNOWN AND UNKNOWN
VIRUSES!
If it can detect all known and unknown viruses, why bother with
anything else, like monthly update subscriptions? Every
antivirus publisher will offer subscriptions for signature file
updates, which is a fairly lucrative service. This service
alone would tell you that the software company does not trust
its own claim.
Check the trade magazines for comparative reviews. Ask
questions of people who use the software. You can find out a
bit about the publisher by checking with organizations like the
NCSA web page at www.ncsa.com. NCSA does certification of
antivirus vendors and have a fairly rigorous requirement set
that vendors must meet for certification. You can also find
out a lot by monitoring the moderated news group,
news:comp.virus.
o USE BACKUPS!
If you have the facilities, back up your PC on a regular basis.
This will at least give you a base to fall back on in the event
your PC is trashed by a virus. If you do not have access to a
zip drive or a tape backup, at least back up your important
data files to floppy when you save them. Software can always
be reinstalled from the original diskettes.
o MAKE A RESCUE DISKETTE!
There are many utilities available today that will make a copy
of your important system files on floppy. Even without a
rescue utility, you can make a clean boot disk for your system.
It needs to be bootable, and should include important files
such as EDLIN (do not laugh, it is a reasonable text editor
that will do in an emergency. Try putting EDIT on a
diskette!), FDISK, FORMAT, a copy of your autoexec.bat and
config.sys, (rename them to something else). If you are using
Win95, use the utility that comes with it to make a rescue
disk.
We used to be able to think in terms of "If I get a virus;" but,
this is no longer true. Today, we must think in terms of "When I get a
virus" and then do what we can to move that date as far out as
possible. We must also do what we need to do to minimize the damage
and ease the recovery for when we lose the drives. It may sound odd,
but, we need to practice safe computing.
No one can faithfully guarantee that you will never get a virus;
but, we can minimize the chances that it will occur as well as the
impact. Follow the steps outlined in all three parts of this story
and you will minimize both risk and impact. Also, read as much as you
can about viruses, but be sure to discount far-reaching claims and
conflicting advice. It is a big net out there and not everyone means
to do you good.
If the advertisements for antivirus software proclaim that it can
protect your computer against all known and unknown viruses, even
those not written yet, you would be well advised to look at some other
software. There is not a single antivirus package on the market today
that can truthfully make that claim.
Beware of software vendors who resort to media pumping to sell
product. The reason that they do this is simply to pump up sales.
This is a tactic that has been used by a number of failing or waning
software companies who offer inferior product(s). It is unfortunate
that this tactic is still in use today.
Of all the security risks prevalent in today's computer-based
society, a virus is the most likely form of attack that you will see.
Open your eyes, be aware of what you are doing and you will have a
very good chance of surviving a virus attack.
+--------------------------------------------------------+
| You can send your comments and questions to the author |
| of this story. Send it to bruceshaffer@keyport.com |
+--------------------------------------------------------+
----------*----------
VII.
Highway Safety:
Road Rage, the
New American Killer
Nick Markowitz
An Elderly couple out for a nice sunny afternoon ride is suddenly
menaced from behind by an unknown, young male assailant. Because they
were in the left passing lane and doing only 50 mph in a 65 zone, the
assailant decided to force them to do the legal speed limit. The first
thing this boy did was flash his high-beam headlights, then he began
honking his horn and making indecent finger gestures at the old
couple. Then he began to yell profanities at them out of the window.
The older gentleman driver became frightened and confused, so he
sped up and attempted to pull into the right lane to allow the
belligerent, young driver to go around him. But, the other driver
followed him into the right lane, continuing his assault against them,
to the point where the elderly driver lost control of his vehicle.
Going off the side of the road, the older driver crashed his car into
a ditch. The young assailant behind him drove on, yelling "good for
you, you old fool!"
Fact or fiction? This might be a good story plot for a Steven
Spiegel movie, such as Dennis Hopper starred in with an enraged truck
driver called "Road Games," if it were not for the fact that people
are often seriously injured when angry drivers fail to keep their
anger under control. Everyday in America incidents like this one plays
itself out on U.S. roadways, sometimes with deadly results.
The typical person who engages in road rage activities is typically
male, between the ages of 16 and 36, although cases exist of people,
also women, well into their 50s. Sometimes the most surprising thing
about these perpetrators is that they are often mild mannered outside
of their vehicles, yet crazed and extremely offensive on the highway.
Some states have initiated programs were road rage and aggressive
drivers are spotted and ticketed for their offenses. In Pennsylvania,
a Highway Department van or car is often used, driving 55 in a 65 mph
zone and in the passing lane so to identify road-rage drivers that
like to intimidate drivers by flashing their headlights, sounding
their horns and tailgating. The description of the vehicle and driver
is then radioed ahead to a waiting State Trooper who then stops the
driver and tickets them. On one particular afternoon, on a single
stretch of highway, Pennsylvania State Troopers stopped 63 road-rage
motorists and caught three drunken drivers, all in the space of six
hours.
What can you do to protect and prevent road-rage motorists from
targeting you? Check out the following helpful tips:
1) When in the left lane someone flashes their headlights at you,
either speed up to meet the maximum speed limit or move to the
right lane, allowing the individual to pass you. Keep your eyes
straight ahead and on the road and do not look over at the road-
rage driver's vehicle, which can sometimes escalate their attack
against you.
2) Never pull off the road and get out of your car to fight a road-
raged individual because the adrenaline level within the other
individual may be pumped up to the point where you have little
chance of defending yourself.
3) If you do accidentally cut off someone, the universal hand gesture
of pointing at your head with a circular gesture to show you
screwed up and are apologizing will some times stop a road rage
attack.
4) If you are followed off the main highway, keep your doors locked
and keep moving. Drive to a well populated, busy location or the
nearest police station, or find a telephone in a busy area from
which to dial 911. Give the dispatcher your location, a description
of the vehicle and driver, as well as the other vehicle's license
plate number, if possible.
5) Keep a cheap, throw-away camera in your vehicle at all times with
which to take a picture of the vehicle, driver and license plate.
It can also come in handy should you become involved in an accident
and need to document damage, vehicle locations, etc.
6) If you have a handicapped placard on your vehicle mirror, take them
off when driving to avoid identifying yourself as someone who
might be an easy target. Besides, in most states, it is against the
law to move your vehicle with it attached to the mirror.
7) Do not bring a firearm into a road confrontation. Not only is it a
bad idea, but it can lead to further problems for you if another
well-intending motorist reports seeing you display it in traffic. A
firearm should never be considered unless you have been forced to
stop by the side of the road and you feel your life is in immanent
danger.
8) Buy a can of mace (check your local authorities about licensing
arrangements, if required) or OC pepper spray and learn how and when
to use it. Keep it handy in your vehicle, should you be forced off
the road. Stay inside your car with the window rolled down no more
than an inch or two, and if the road-raged person verbally or
physically threatens you, roll your window down enough so you can
safely spray them in the eyes. Be sure not to spray yourself in the
eyes in the process. Then roll up your window and leave the area,
if possible, or blow your horn until someone notices you and help
arrives. Chemical spray may also come in handy when leaving or
entering your vehicle in a parking lot or parking garage.
Remember, your best defense is defensive driving. Always obey the
traffic laws so other motorists do not have a reason to become angry
with you in the first place.
Editor's Note: Being handicapped and driving with special
accellerator and brake adapters, it takes me a few
seconds to execute a maneuver than a non-impaired
driver. On several occasions young drivers, ages 16 to
30, have threatened me on the highway because of this,
despite the fact that my vehicle is clearly marked with
handicapped plates. In each case, I had them stopped and
arrested by calling 911. I gave the dispatchers the
description of both the vehicles and the drivers. There
have also been times that I've been targeted because I
have handicapped plates on my vehicle. --Nick Markowitz
+--------------------------------------------------------------+
| You can send your comments and questions to the author of |
| these stories by sending them to nmarkow125@aol.com |
+--------------------------------------------------------------+
----------*----------
VIII.
Technology:
GPS Ready For Mass Markets
Gary Miller
Although current GPS (Global Positioning System) commodities such as
aviation, marine, and automotive navigation in addition to surveying
and identification of field sites for drilling operations etc. have
become common place, the market area for the technology has not
expanded significantly. That may be changing in the very near future.
Soon, with a few keystrokes or the press of a button, we may be able
to find a lost child*, call for help on a cellular phone equipped with
GPS so that the operator can send assistance to our exact location, or
simply locate the family car that seems to be lost in that enormous
stadium parking lot. But for now, the market analysts agree that on-
board automobile navigation is the growth market for GPS.
Just in this year alone, there were about 1.14 million auto-mobile
GPS systems installed across the globe. And it is estimated that the
totals will climb to above 11 million by the year 2001. This trend is
estimated to produce a market value of $1.7 billion in component sales
alone.
The next-generation market of GPS products may include functions such
as:
* Real-time updates on traffic information
* Links to digital/cellular communications systems
* 8-Mb of memory for Internet access and E-mail
* Air bags that call 911 and trigger a GPS locator upon impact
Industry trend watchers predict that many of the smaller board and
modular chip manufacturers will merge with or form alliances with the
larger vendors to realize their fair share of the emerging GPS
markets.
*Editors Note: In the "lost-child" scenario, I would hope and pray
that the locator device placed on the child would be in the form
of a wrist watch or disguised as some other form of jewelry or
wearing apparel. There is talk of using a micro-chip implant
similar to those already being used on animals. The political
undertones of "implants" on any human being are obvious here, and
should be greatly scrutinized. --Gary Miller
+--------------------------------------------------------------+
| You can send your comments and questions to the author of |
| these stories by sending them to gary.miller@cancomm.com |
+--------------------------------------------------------------+
----------*----------
IX.
Editor's Last Say:
Privacy Concerns
During the past week, I have seen two documentary programs on cable
that dealt with the topic of Cyber Warriers and Cyber Spies. One
common thread disclosed in both programs was that ALL our finances and
the system that contains ALL our money--personal, corporate, and
government--is based on vulnerable digital technologies. That accounts
for 90 percent of ALL money and investments!
It was noted that it is now possible for just ONE hacker or
technospy to bring this nation (or any nation) to its knees. In
addition to financial disaster, electrical power systems, air traffic
control and rail transportation are now computerized. Get the picture?
The U.S. government has used its own hackers to breach our computer
security systems. Out of 800 cyber break-ins at the CIA headquarters
at Langley, VA, only 22 were detected by those people whose job it is
to detect such intrusions. Scarry, isn't it?
Also covered in one of those documentaries, was that the CIA has all
but admitted to using human "implants" to keep track of their own
spies. Who can guess how many "other" people have been knowingly or
un-knowingly implanted with ID/tracking devices. It is common
knowledge that the GPS (Global Positioning System) can be used to
track such devices.
Now, I read this week in one of my computer trade publications that
the commercial use of GPS will be expanded beyond the navigation-based
technology, and will be used for such applications as finding lost
children. My question is: will those children be "implanted" with
cyber-ID chips? If so, who will be the next group of people to be
implanted? Maybe the elderly confined to nursing homes would be
implanted in case they would walk away. Then there are those confined
to our prisons. Wow, what a great way to keep tabs on them.
That just about narrows it down to you and I. I am sure that our
government could find a good "reason" to implant the rest of us if
and when they want to. Incidentally, according to one of the
documentaries, the CIA implants deal with "mind control." (shudder)
--Gary Miller (gary.miller@cancomm.com)
----------*----------
X.
EndNotes:
S&S Magazine
E-mail Addresses
Allan B. Colombo
Editor
acolombo@compuserve.com
http://web.raex.com/~colombo/
Ronald E. Nelson
Co-Editor
ron@topservice.com
http://ourworld.compuserve.com/homepages/ren_productions/
Nick Markowitz
Contributing Writer
nmarkow125@aol.com
Gary Miller
Contributing Writer
gary.miller@cancomm.com
Michael Chesbro, BCFE, CPO, CSS, DABFE
Contributing Writer
100336.675@compuserve.com
http://ourworld.compuserve.com/homepages/chesnotes/
Bruce Shaffer
Contributing Writer
bshaffer@ix.netcom.com
-----+-----
View On The Web:
Safety & Security Home Page
http://ourworld.compuserve.com/homepages/acolombo/
Safety & Security Depository
http://ourworld.compuserve.com/homepages/acolombo/backissu.htm
-----+-----
Bulletin Boards:
CompuServe Information Systems Forums:
TWCRIME, AARPFORUM, TWDWELL, EWCFORUM, SafetyNet
Canton Communications (CanComm)
Canton, Ohio
Online: 330-477-4504
Voice: 330-477-3080
-----+-----
Subscription Information:
To subscribe to the ASCii version of the Safety & Security
[electronic] Magazine, send an E-mail message with the word SUBCRIBE
in the message text to ccmag-request@cancomm.com. To unsubscribe, send
an E-mail message with the word UNSUBSCRIBE in the message text area
to the same address.
-----+-----
Disclaimer
The information and tips contained in the Safety & Security
Magazine is meant for entertainment purposes only. The
authors cannot guarantee the personal safety and well
being of those who read and use the information herein.
Copyright(c)1997
Safety & Security Magazine
safety.security@cancomm.com
P.O. Box 30076
East Canton, Ohio 44730
--=====================_876450255==_--
+-----------------+ +--------------------------+ +-----------------+
+-+ | | | | +-+
+---+ | | Safety & Security | | +---+
+--+ | | [electronic] | | +--+
+--+ | | Magazine | | +--+
+--+ | | | | +--+
+--+ +--------------------------+ +--+
===================================================================
Volume 3, Issue 12 (c)1997 Safety & Security Magazine November 1997
===================================================================
Each month in the Safety & Security [electronic] Magazine
you will find helpful and informative articles on topics
related to property protection and personal safety and
security at home, at work, and while traveling.
+-------------------+
| Table of Contents |
+-------------------+
I. Editor's Say: Doctor Death's Free Body Parts
II. Fire Prevention: Kerosene Appliance Safety
III. Personal Safety: Carbon Monoxide -- The Silent Killer
IV. In the News: Cases of Drug-Resistant Tuberculosis on Rise;
Corrections Privitization in New York Not Likely; Call for
Encryption Algorithms for Advanced Encryption Standard; NIST
Reports on New DNA Sequencing Technologies; Sun Research
Reveals Problems Ahead; Auto-Dial Messaging for ProActive
Policing; Supreme Court on Religious Freedom; The Great
Chicago Fire, Change in Story?
V. Mail: Domestic violence; Evaluation of Pepper Spray; Thank you;
Link to our site; Feedback on e-zine
VI. Question & Answer: Identity Fraud Concerns
VII. Fire Safety: Electric Heaters, An Alternative to Kerosene
VIII. Home Safety: Earthquakes and Fire
IX. Editor's Last Say: Is Your Garbage Worth Protecting?
X. EndNotes: Staff, E-mail addresses, View On The Web, Bulletin
Boards, Subscription Info, Disclaimer, Contact Info
----------*----------
I.
Editor's Say:
Doctor Death's Free
Body Parts
Doctor Jack Kevorkian, the doctor-of-death, is at it again. Only
this time, he is trying to sell the public and medical profession an
inperfect bill of goods. He wants to shift attention away from the
real issue of assisted suicide and place it on society's need for body
parts. If he is successful, and there is a good chance he will be,
this will lead to the normalization of euthanasia. Our government has
taken God out of almost everything else, we cannot allow them to
remove God from the decision of death.
| Isaiah 40:6,7 |
| |
| 6 -- The voice said, Cry. And he said, What shall I cry? All |
| flesh is grass, and all the goodliness thereof is as the flower |
| of the field: |
| 7 -- The grass withereth, the flower fadeth: because the spirit |
| of the Lord bloweth upon it: surely the people is grass. --KJV |
The decision of "when is it time to die" for all of us, even those
who are terminally ill, should be left to our Maker and not the
doctor-of-death or any other physician. What is doctor death's tie-in
with Safety and Security? Well, if this practice should ever become
legalized and sanctioned by the U.S. Government, abuse is almost sure
to follow. Maybe not right away, and then again...
Take a good, serious look at China's body-parts business where for
US$30,000, US$5,000 down and a blood sample, you can buy an operation
and the body part you need from the Red Communist Chinese Military.
After doing a DNA typing of your blood, they then match it to that of
a Chinese prisoner already in custody (I assume he/she is already in
custody). At a scheduled date, this particular prisoner, along with
many others (who I assume are likewise designated as body-part
donors), are put to death. Their body parts are then removed from
their bodies and immediately placed within the recipients'. Because
the execution date was transmitted to each of the recipients, they
were already there, ready to receive their body part.
I hope the doctors and good citizens of the United States do not buy
into what Kovorkian is selling. What he is proposing is inhuman and
good doctors should be above that. The life of one for the life of
another, this is God Almighty's job, not ours. We should not encourage
this kind of imoral, unethical behavior, for the potential for abuse
is far too great. No matter how positive it might sound, there is no
way to escape the fact that this is an atrocity.
A little over two years ago, I painfully watched my dear mother,
Nova Jane, age 72, die of cancer. She was a second-hand-smoke victim,
given her close proximity to my father, a well-meaning, good man who
smoked constantly. Her death was slow and painful, and much as I still
agonize over it, I am certain that she would not have wanted to end
her life a moment sooner than God deemed necessary. She was a strong,
courageous woman and she died with dignity. --Al Colombo
+--------------------------------------------------------------+
| The opinions expressed in Editors Say is the personal views |
| of the writer and not Safety & Security [electronic] |
| Magazine or staff. You can send your comments to the writer |
| of this editorial at: safety.security@cancomm.com |
+--------------------------------------------------------------+
----------*----------
II.
Fire Prevention:
Kerosene Appliance Safety
Nick Markowitz
Fires can occur at any time, especially when there's been a natural
disaster. Whether it is a bad storm, an earthquake (see Section IV),
or merely a power outage, if it is cold weather, the first thing many
people do is drag out their kerosene heaters and lanterns. In this
regard, under the best of conditions, fire safety is a must; but it is
even more critical during an emergency.
The first rule of thumb when using kerosene appliances is to use
good-quality kerosene fuel. K1 is usually the best, but always follow
the manufacturer's recommendations. If someone you know should offer
you some other kind of fuel that they say will work in your kerosene
appliances, such as jet fuel, no matter what the price, pass it up and
buy the real thing.
Another rule of thumb when using kerosene appliances is to store the
fuel in an approved container and keep the cap on tight to prevent
spills and contamination. If the can you want to use had gasoline in
it at some time in the past, no matter how thorough you may have
washed it, do not use this can for your kerosene fuel. Only use cans
that have had nothing other than kerosene in them.
Local Regulations and Maintenance
Some communities do not permit their citizens to use kerosene
appliances in some environments. This is especially true of apartment
tenants. However, in some communities this also applies to single-
family dwellings. So, before you buy a kerosene lantern or space
heater, be sure to check with the local building codes authority and
fire inspection department to find out if they are allowed.
Naturally, after sitting all summer without being used, always take
your kerosene appliances to a specialist to have them maintained.
Cleaning is very important and you should have them install a new
wick. Be sure the technician that works on your appliance uses only
replacement parts approved by the original manufacturer.
Another important aspect associated with using kerosene appliances
is the distance between them and combustible materials in the
environment. Maintain at least one foot (12 inches) of space between
them and draperies, furniture and other combustibles.
These appliances also require constant supervision to assure that
they do not catch on fire or cause a fire by radiated heat. In
addition, supervision assures that children in the home will not come
into contact with the hot surface of a kerosene device.
Another concern is that of carbon monoxide. Are you using your
kerosene appliance in a well-ventilated area? What about a carbon
dioxide CO detector? In a tightly sealed room, CO could become an
issue in short order, causing those inside the enclosed area to become
ill or even perish. A CO detector will provide early warning of such a
problem. Because power may be an issue during a disaster, it is
probably wise to purchase both a battery and electric model.
Thawing Water Pipes
Frankly, one of the things that people mistakenly do is use kerosene
heaters to thaw out water pipes. The best procedure is to thaw pipes
by naturally heating the room. They take longer to thaw, this is true,
but the fire risk of the other alternative is too great and
potentially costly to consider. Another alternative, if electricity is
available, is to use an electric hair dryer.
Another risk in the home is the use of what some call a "salamander"
kerosene heater. These are often found on construction sites in some
portions of the country. One man lost his new home and almost his
family when he used one for this very purpose. He only walked away
from it for three minutes--instant inferno.
There is little doubt that kerosene heaters make a great emergency
source of heat and light. But they also contribute to many winter time
fires and fire deaths. Before using your kerosene heater, be sure to
follow the above advice and read the instruction manual that came with
your kerosene appliances.
Editor's Note: Remember, if you use a kerosene heater in the wrong
way, you may get one of those house calls from your local fire
department. Using a kerosene lantern can also get you into trouble
if you do not know how to safely use them. I cannot stress enough
the need to read the instruction manual that came with your
appliances, or you might end up taking an unexpected trip to the
hospital. In the mean time, think SNOW!!! --Nick Markowitz
+------------------------------------------------+
| Send your comments and questions to the author |
| of this story at safety.security@cancomm.com |
+------------------------------------------------+
----------*----------
III.
Personal Safety:
Carbon Monoxide -- The
Silent Killer
----------------------------------------
Reprinted from the November 1995 Issue
of the Safety & Security Magazine
----------------------------------------
Ron Nelson
According to the US Consumer Product Safety Commission CO Fact
Sheet, in the year 1989 there were 295 deaths associated with CO
poisoning and close to 5,000 people are treated each year in emergency
rooms for symptoms of CO poisoning. The problem has grown so great
that in 1993 President Clinton declared the last week in September as
"CO Safety Awareness Week." Many municipalities have also adopted
legislation requiring the installation of CO detectors in homes and
recreational vehicles
What is Carbon monoxide?
CO is a colorless, odorless, and highly poisonous gas that is
produced when fuels containing carbon are burned. It is about 3%
lighter than air and as such tends to rise under normal conditions.
It is dangerous because when it is inhaled it combines with
hemoglobin, the oxygen carrying substance in blood cells, and prevents
them from absorbing needed oxygen. This lack of oxygen causes
headaches, nausea, followed by unconsciousness and ultimately death.
As little as 1/5 of 1% may prove fatal in less than 30 minutes. CO is
a particularly insidious gas since it is odorless and someone may be
exposed to dangerous levels without knowing it.
Symptoms of Carbon Monoxide poisoning:
* Mild exposure- Slight headache, nausea, vomiting, and fatigue.
These symptoms are sometimes described as "flu like".
* Medium exposure- Severe throbbing headache, drowsiness, confusion,
fast heart rate.
* Extreme exposure- Unconsciousness, convulsions, cardiorespiratory
failure, death.
The disorientating effects of CO poisoning often prevent the victims
from seeking help even though they are aware that they are not feeling
well.
Each year many deaths are caused by CO gas escaping from furnaces,
stoves, and fireplaces when the ventilation is not properly regulated.
If you develop CO poisoning symptoms leave immediately and call your
local fire department or ambulance if the symptoms are severe. You may
also notify your local gas company or HVAC contractor.
Types of CO detectors
There are 2 basic types of CO detectors, Biomimetic and Taguchi.
Biomimetic units, also called gel cell or litmus, utilize a
semipermeable gel that changes color when exposed to CO. This gel
absorbs CO at the same rate as human hemoglobin, and its color is
directly related to the amount of CO absorbed. The detector has a
light beam which shines through the gel and senses the change in
color, activating the device. These units require that the sensor pack
be replaced every 2 years and are also known to be sensitive to
cooking or other fumes.
Taguchi units, also called tin oxide or figaro, utilize a specially
doped semiconductor that changes its resistance when exposed to CO.
The detector senses this change and activates the unit. A new
technology for detecting CO is called non-dispersive infrared. This
type of detector is still under development but promises to be a much
better and reliable method to detect CO.
Installation of detectors
Due to its lighter than air composition CO detectors should be
located near the top of a wall or on a ceiling. Do not mount it
directly in a corner since the normal movement of air causes a dead
spot in that area.
In addition do not locate it within 5 feet of a CO producing source,
such as furnace, since false alarms may occur. Due to the unique
composition of CO, detectors are specifically designed to react only
to its presence and are not combined with other types of gas
detection.
Power and connection to security systems
The detectors currently available may be powered by batteries, 110
vac, 12 vdc, or 110 vac with battery backup. Units may also be
purchased that have a relay output for connection to any security
system control or wireless transmitter.
If you will be connecting your detectors to a security system, they
must be installed on dedicated 24 hour zones to insure proper reaction
to an activation. As always, make sure that you completely read the
detector instructions that are packed with each unit, and follow all
of the manufacturers directions.
What to do if your detector activates
If your CO detector activates you should leave the location
immediately and check to make sure everyone got out. Call your local
fire department, your local gas company or HVAC contractor. You can
open the windows to ventilate the area and clean out the CO buildup.
Do not take any chances, it is much better to call for assistance
than to become another statistic. It is also possible for CO poisoning
to occur from faulty exhaust pipes on automobiles or trucks. If you
begin to experience headaches or nausea while driving or riding in an
automobile or truck, you should open the windows immediately and have
the exhaust system checked.
Monthly maintenance
Cleaning- You should clean the outside of the detector with a vacuum
or soft brush and make sure that no objects are blocking the unit or
restricting air flow around it.
Testing CO detectors- These units are designed to detect only Carbon
monoxide so they can not be checked for actual operation. If the unit
is equipped with a test button you should use it to test the unit. If
your detector is connected to a remote monitoring office please
remember to notify your security company prior to testing.
For additional information check your local library or you can
contact your gas supplier, utility company, local fire department, or
HVAC contractor.
+------------------------------------------------+
| Send your comments and questions to the author |
| of this story at safety.security@cancomm.com |
+------------------------------------------------+
----------*----------
IV.
In The News:
Cases of Drug-Resistant
Tuberculosis on Rise
As reported in the September, 1996 issue of Safety & Security, the
advance of drug-resistant TB is on the rise. Recently, a survey
conducted by researchers for the World Health Organization (WHO) and
the U.S. Centers for Disease Control and Prevention (CDC) confirmed
the existence of multi-drug resistant (MDR) TB in one third of the 35
countries who were queried. TB is caused by an airborne bacterium.
This new strain of TB is almost sure to spread to other countries.
This is of grave concern to the world health community because WHO's
research reveals that anyone infected with TB of any strain is likely
to infect 10 to 20 people every year.
The drug-resistant strain of TB is said to be the result of poor
medical practices, such as infected people that fail to take all of
the medication prescribed. This common, wide-spread practice permits
drug-resistant strains to occur. Also a problem, doctors often
prescribe the wrong medication, which essentially has the same effect.
Because the cost of treating MDR tuberculosis is about a hundred
times more expensive than traditional TB, a large portion of the
people who have it will not receive the correct treatment. Not only
will the assure the death of these people, but it will serve to
further spread these mutated strains.
WHO reports a 96% recovery rate among patients who use Directly
Observed Treatment Shortcourse (DOTS). DOTS entails the suprvision of
patients being treated by better assuring that they take the right
medication for the prescribed period of time. According to WHO,
because not everyone has access to DOTS, only 3 million of the 8
million cases of TB reported annually are curable. For additional
information on this strawin of TB, check out WHO's web site at:
http://www.who.ch/programmes/gtb/dritw/foreward.htm.
-----*-----
Corrections Privitization
in New York Not Likely
Dennis C. Vacco, Attorney General of New York says that in his legal
opinion, the privitization of prisons in New York State is not likely.
According to Corrections Journal, Pace Publications, May 21, 1997;
"senator Michael Nozzolio, chairman of the Senate's Crime Victims,
Crime, and Correction Committee, asked for the opinion after learning
of inquiries made by the Corrections Corporation of America, the
leading private corrections firm in the nation...."
Lack of proper training and limited powers were two of the issues
that Vacco mentioned in his legal opinion. He said that employees of
private corrections companies would not be sworn peace officers, but
rather private citizens. This means that their right to use force
against prisoners would be greatly limited by New York law. Because of
this, private correctional employees might not be legally able to
apply the necessary force required to stop a prison riot or ward off
an escape--not without serious legal consequences. Not only that, but
prisoners that try to escape from a privately run correctional
facility could not be legally charged with Escape or Attempted Escape
according to New York law.
Editor's Note: For more information on correctional issues or their
semi-monthly publication "Corrections Journal," ISSN 1089-2575,
contact Pace Publications, 443 Park Ave. South, New York, NY 10016;
phone 212-685-5450; or by fax 212-679-4701. --Al Colombo
-----*-----
Call For Encryption Algorithms
for Advanced Encryption Standard
Security product manufactures, voluntary standards organizations and
others are invited to submit their encryption algorithms for
inspection and evaluation. The algorithm selected could become the
basis of an Advanced Encryption Standard (AES). According to a notice
published in the 12 Sept. 1997 Federal Register, the AES will specify
an unclassified, publicaly-disclosed encryption algorithm that will be
made available, royalty free, to anyone in the entire world for
protecting information.
Candidate algorithm submission packages must be received no later
than 15 June 1998. Submissions received prior to 15 April 1998 (tax
day :-) will be reviewed for completeness by NIST and their submitters
notified of any deficiencies by 15 May 1998. This should allow time
for corrections before the 15 June deadline.
Editor's Note: For more information on the AES program, contact
Technology Lab, Attn: AES Nominations, A231 Technology Bldg., NIST,
Gaithersburg, MD 20899; call 301-975-3696; fax 301-948-1233; or E-
mail aesquest@nist.gov. You can also visit the AES web site at:
http://csrc.nist.gov/encryption/aes/aes_9709.htm. --Al Colombo
-----*-----
NIST Reports on New DNA
Sequencing Technologies
National Institute of Standards (NIST) reported a new DNA sequencing
technology, developed by GeneTrace Systems Inc., Menlo Park, CA, that
is hundreds of times faster than current methods and at a fraction of
the cost. It is expected that this research will lead to a set of
highly-effective drugs that will make the diagnosis of diseases and
the identification of people, as part of a forensic exercise or
paternity test much faster.
Co-funded by both NIST and Technology's Advanced Technology Program,
the company developed the technology needed to apply fast and accurate
mass-spectrometry techniques to the identification of DNA fragments.
The system is able to identify the sequence of base chemicals in a
given DNA strand in as little as five seconds, rather than the three
hours required for conventional DNA separation today.
GeneTrace reduced labor costs by using a robotics system for initial
sample handling. The process combines DNA probing, sequencing and
sizing reactions with mass spectrometry. Eight patents on this new
process are now pending. The company expects this technology to lead
to genetic screening tests for as little as a few dollars, compared
to the $300 to $5,000 now required. Several companies are now using
GeneTrace's technology for pilot projects that focus on gene discovery
and expression, genotyping and other topics.
In an entirely different effort, NIST recently reported the
existence of a new DNA chip technology that has the potential of
revolutionizing the sequencing of DNA, genetic disease diagnosis,
detection of pathogens in food and water, forensics and personal
identification and other applications. The NIST DNA chip is made of
one layer of single-stranded DNA molecules, which self-assemble on
gold. This forms a well organized monolayer. The surface-tethered DNA
can then bind complementary small fragments of single-stranded DNA
from solution. Such DNA sensors could be used for analysis of blood or
urine samples from a patient, or in water or food. In theory, NIST
claims that DNA chip sensors could also be developed to check for many
types of bacteria and viruses.
Editor's Note: For more information on the GeneTrace's DNA Sequencing
method, contact Michael Baum, NIST, at 301-975-2763. For additional
information on the NIST DNA chip method, contact Linda Joy, NIST,
at 301-975-4403 or linda.joy@nist.gov. --Al Colombo
-----*-----
Sun Research Reveals
Problems Ahead
It was recently reported by National Public Radio (NPR) that since
1991, scientists have known that our sun is emitting two additional
spectral bands of radiation. According to public radio, so certain are
these findings that our sun was officially reclassified from its
original "stable star" category to "variable-output."
What is the significance of this recent finding to us on planet
earth? According to NPR, this increase in energy output is thought by
some scientists to be cause of El Nino, which, according to
scientists, is not showing any sign of abatement at this time. It is
expected that El Nino will continue to cause adverse weather patterns
across the globe. Experts say it has already affected agricultural
output in developing countries, such as Australia and Brazil. Its
affects are expected to reach output in developed countries as well.
-----*-----
Auto-Dial Messaging for
ProActive Policing
Police departments, like the Baltimore County, MD, police
department, are taking a proactive stance to policing using an auto-
dialer message system, manufactured by VoieWorld, Scottsdale, AZ. The
system, which costs about $5,000, enables police officials to
automatically send voice messages over the telephone network to
hundreds or thousands of residents, warning them of crime trends,
specific crime problems, and other situations.
"We can very quickly identify all of the households in a community
that's experiencing a crime problem. We enter the phone numbers
automatically thorugh a computer to the auto-dialing system, and
within minutes, we can deliver our message to people, alerting them to
the problem and giving them suggetions as to what they can do to
reduce their chances of being victimized," said Philip Canter, Chief
Statistician, Baltimore County, MD, police department (Law Enforcement
News, John Jay College of Criminal Justice, New York, NY, 15 October
1997 issue).
According to Canter, his department is able to discern a difference
in crime statistics in Baltimore County because of this auto-dialing
system. In fact, the same system was used by Los Angeles Police
Department to warn police officers in LA County after the verdict in
the 1992 state trial of LAPD officers who were charged in the beating
of Rodney King.
-----*-----
Supreme Court on
Religious Freedom
The Supreme Court recently ruled (City of Boerne versus Flores) that
the Religious Freedom Restoration Act of 1993 is unconstitutional and
that by passing this act, Congress overstepped its Constitutional
authority and interfered with state soverignty.
-----*-----
The Great Chicago Fire
Change in Story?
If Richard F. Bales, a title insurance lawyer in the employ of
Chicago Title Insurance Co., is right, Mrs. O'Leary's cow may not have
tipped over the kerosene lantern that was alleged to have caused the
great Chicago Fire of 1871. According to records, the fire that killed
300 and made homeless more than 100,000 started in Mrs. O'Leary's
barn. The popular story has it that her cow kicked over the lantern as
she was being milked.
According to Bales, the fire may have started in O'leary's barn, but
Mrs. O'Leary may not have been the culprit. One of the problems with
the original investigation, says Bales, was that no one had adequately
mapped out the area. Because he has ready access to the property
records kept by Chicago Title, he was able to detect possible
discrempencies in a Peg Leg Sullivan's story.
"[Bales] was struck that Peg Leg Sullivan seemed to have a lot to
say. Sullivan said he had been in front of another neighbor's house
and had seen the fire break out in the O'Leary's barn. But Bales
discovered that the title records showed that at least one house,
maybe two, plus an 8-foot-high fence would have blocked Sullivan's
view," says Pam Belluck, author of MRS. O'LEARY'S COW MAY HAVE BEEN
FRAMED, published by The New York Times.
At the time, Sullivan told authorities that he ran to Mrs. O'Leary's
barn to save the animals, then ran out of the barn to get help. All of
this he did on his wooden peg leg, says Bales. Records also revealed
that Sullivan told authorities that he visited the barn every evening
to feed a cow that his mother kept there. All of this, says Bates,
throws a serious doubt on the popular story that claims that Mrs.
O'Leary's cow started the fire.
+----------------------------------------------------------+
| You can send your comments and questions regarding these |
| stories by sending them to safety.security@cancomm.com |
+----------------------------------------------------------+
----------*----------
V.
Mail:
From: GM
Network: worldnet.att.net
Date:
Subj: domestic violence; April, 1997 issue
The article in your April S&S Magazine, which covered the Domestic
Violence Offender Gun Ban, sponsored by Senator Frank Lautenberg (D-
NJ), shows another prime example of the twisted thinking and
conflicting statistics fostered by the Clinton administration and his
left-wing comrades in Washington.
I remember, as part of Clinton's policy on crime, he was going to put
"100,000" more cops on the street. That figure in reality has become
approximately 18,000 to 25,000 additional police officers so far.
Now... enter the Domestic Violence Offender law, and we lose 60,000
police officers. That gives us a NEGATIVE gain of from 35,000 to
42,000. I guess that's what comes from outcome-based education.
Just because you are living in a rural area, and maybe only own a
double-barrel shotgun, don't turn your back on the city folks who
have had their handguns taken away! Mr. farmer, YOU could be next!
A story on the American Freedom Network this week told of a new
"Anti-Gang" crime bill that would disqualify you from ever owning a
firearm if you so much as had a shoplifting charge against you when
you were in grade school!
Come on people... WAKE UP! The government has slowly and
methodically picked away at our society by eliminating our 2nd
Amendment rights one class at a time, and one weapon at a time.
-----*-----
From: John Rich
Network: CompuServe
Date: September 15, 1997
Subj: Evaluation of Pepper Spray
Source: NIJ Research in Brief, U.S. Department of Justice Office of
Justice Programs, National Institute of Justice. You can find the full
report at: www.ncjrs.org/txtfiles/162358.txt
Key Findings:
o OC spray successfully incapacitated humans in 156 out of 174 (90
percent) confrontations.
o In 18 encounters, subjects were not fully "subdued " by OC; in 7 of
these incidents, subjects exhibited bizarre behavior and appeared
to be on drugs or mentally troubled, thus suggesting that such
individuals may not yield to OC's effects.
o While assaults on officers were declining prior to implementation
of the OC spray program, the rate of decline increased after OC was
introduced.
o Twenty-one officers received minor injuries when they used the
spray, but none reported lost work days.
o Similarly, only 14 suspects received injuries, none of which
required hospital treatment.
o Use-of-force complaints decreased by 53 percent in the study period
despite decreased manpower and increased demand for services. No
complaints addressed the use of OC.
o Although training instructions stated that sprays were maximally
effective from a distance of 4 to 6 feet, many officers applied the
aerosol to humans from distances of less than 3 feet, which may
have diminished the spray's effectiveness.
o Overall, study findings showed that a well-developed OC-spray
program can provide operational benefits to police.
Interesting triva about pepper spray:
As early as 2300 B.C., Chinese armies dispersed enemy forces by
using "stink pots" -- red pepper burned in hot oil that produced
irritating and suffocating smoke -- in massive frontal assaults.
Editor's Note: Thanks to John Rich for the OC update. --Al Colombo
-----*-----
From: Russ
Network: aol.com
Date: October 6, 1997
Subj: Thank you.....
Al,
What a great service you are providing. I am buying my first home and
want to install my own security system. How do I get in touch with the
International Association of Retired Police Chiefs for a kit to mark
my personal belongings and obtain window stickers stating same?
One more thing, I have read most of the info that you have published
re: home security, but I have not been able to find a dealer or
catalogue from which to purchase the necessary components to make my
own customized alarm system.
Once again, the information I have received thus far has been of great
help to me of which I am most appreciative.
Thank you, Russ
-----*-----
From: Will
Network: bkstr.ucsb.edu
Date: October 17, 1997
Subj: Link to our site
If you would like could you add a link to our web site at the UC Santa
Barbara Asset Protection. We have a lot of loss prevention info and
report forms at the site. We also have a live video feed so people
visiting our site can see who or what we are watching.
Thank you.
Will Wood, AP Director UCSB AP web site-
http://www.bookstore.ucsb.edu/lp/lp.html
-----*-----
From: William Plante
Network: home.com
Date: October 13, 1997
Subj: Feedback on e-zine
Hi!
I am a security consultant based in the Phoenix, AZ area and originally
from Canada. I was browsing the web when I hit your home page.
Wow, neat e-zine. You obviously dedicate a great deal of time and energy
to maintain this service - you should be highly commended for your
efforts.
Thanks.
William Plante
Principal Consultant
Corinthian Consulting, LLC
+---------------------------------------------------------------+
| You can send your comments and questions for inclusion in |
| the mail section by sending it to safety.security@cancomm.com |
+---------------------------------------------------------------+
----------*----------
VI.
Question & Answer:
Identity Fraud Concerns
-----------------------------------------
"Question & Answer," a new
department for difficult questions.
-----------------------------------------
Expert: John Bailey, CPS; Las Vegas, NV
Biography: Bailey specializes in wholesale database and other
information services. Nation-wide investigative referral
service, executive protection and privacy, tactical and
custom mission-specific training programs, and software for
investigators. E-mail: Task_force@compuserve.com
-----------------------
READER'S QUESTION -- In the early hours of Sunday morning my home was
burglarized. The thief's only loot was my fiance's purse. It
contained almost no cash but did include her "identity." It
included her Social Security Card, Driver's License, credit cards
and other things of minor value.
I read in an article that with the information that the thief got
he/she can create a new "identity." I also read that that there
was a way to advise the credit agencies that under no circumstances
should they allow anyone to receive credit using this ID.
I have three questions about all of this:
1) -- How does one go about this?
2) -- When she needs to, how does she get access to her own
credit?
3) -- I noticed that when you apply for credit it is noted on
the bottom who has attempted access of your credit
history. Is it wise to get a copy of your credit
history every month for a while after a situation like
this to see if anyone is attempting access? And if so,
how?
BAILEY'S ANSWER -- You did not mention whether you were home or not.
If you were, count yourself lucky that you did not have to cope
with the worse. This is pretty typical of a "cat" burglar job,
where they take the easiest item(s) and leave without taking the
risk of searching for more loot. Without knowing more details, it
is hard to draw conclusions about the probable perps. If, for
instance, the purse was visible from the outside of the house, and
the window was open, any neighborhood kid could have done it on a
dare, and everything but the cash probably went into a nearby
dumpster or ditch.
I want to comment on the notion that a person's identity is
contained on pieces of paper and plastic. This reminds me of the
way certain native peoples fear that photographs steal their souls.
The media has worked hard to maximize the emotional impact of this
issue to make it more newsworthy. They have inadvertently also
maximized the emotional impact of ID theft on the victims by
promoting the concept that a human being's identity held captive by
ink on paper. Tell your fiancee that you still know who she is -
Her "identity" is intact. All that has been taken are some papers
that have no intrinsic value. Help to minimize the impact of this
issue.
Make sure that no keys were taken. Change locks if necessary. And,
an all-around security review is definitely in order for emotional
reasons as well as practical ones. It is possible that your
perpetrater is more than a thief, so advise your intended
concerning physical security, etc. The two best tools for this are
awareness and physical barriers.
The remainder of your letter asked about the thief potentially
using your fiancee's papers to create a new identity. I have worked
some of these fascinating cases assisting the Secret Service, the
Postal Service, NYCPD and other agencies. Fraud is a growth
industry, and we can count on seeing more of it and endless new
incarnations as communications and banking technologies evolve.
You asked specifically about "advising the credit agencies" to keep
the thief from obtaining credit in your fiancee's name. This theft
is not the typical way in which a fraudster would go about
obtaining information. It is too dangerous, and pays too little.
However, the thief may sell the ID to someone else who is smarter.
So, some fraud crimes may arise from the original theft.
The credit bureaus are not particularly interested in every stolen
purse. And, they have no control over who receives credit. You also
do not want to muck up her credit file over this. Nevermind about
the credit bureaus. They protect the banks, that frankly do not
care about one instance of fraud. Let us concentrate on protecting
you and yours instead.
Fraud schemes vary. The most common attack would involve obtaining
credit in your fiancee's name and absconding with merchandise or
cash advances on a card. There is not much you can do about this,
even if her purse were not stolen. It is a very common crime. The
good news is that you are not liable for the bills, and it
should not cost much more than some aggrevation with the banks.
This type of crime has become common and banks are now easier for
consumers to deal with about it.
Of more concern are frauds that could target your lady's own bank
account through the use of various check or transaction schemes. In
the wake of this theft, the lenders for stolen cards will usually
close those accounts and issue new cards with new account numbers.
Have your fiancee call all of her credit card lenders - not just
the ones whose cards were stolen. Have them note the accounts.
Specifically, tell them that no change of address is planned, and
that any changes in address should alert them. Have the accounts
noted that no extra cards should be issued to "husband" or other
family members. Have her establish some security protocol with
them, using a security code OTHER than SSN, or mother's maiden
name. Your fiancee can contact her bank(s). She can ask them about
security protocols to curtail fraud, and she can establish
procedures (passcode) for the release of account information. If
banking information was in the purse, she can consider closing the
account and opening a new one, or even changing banks.
General security against all kinds of identity theft should
include, as in this case, physical security of documents. That
includes security of your trash. Many fraudsters obtain the
foundation of their information by picking through garbage. Some
people throw away the most interesting things. In my investigative
career, I have found everything from interoffice memos about
illegal toxic dumping, to copies of CEO's personal 1040 forms and
attachments. A good fraudster can use a single sales receipt, a
bank deposit slip, or a check carbon to steal from you or your
bank. Use a good quality shredder, or use these kinds of things to
prime your fireplace this winter.
Other security precautions include refusing to give your SSN,
telephone number, address, or even your name to people who do not
really NEED to have it. Refuse to sign release forms that allow
information to pass hands.
Ask people who will have access to the information you provide. Ask
them to tell you this IN WRITING. "Do not talk to strangers" - even
on the phone. Several fraud schemes involve coaching credit card
numbers out of people over the phone. Never order merchandise by
phone if the sales person called you. They may make you a great
offer just to get your card number.
Checking your credit report periodically is probably a good thing -
to make sure the information is correct and current. Fraud moves
faster than you can detect or fight by monitoring these files,
(there are three different major files).
Fraud is here to stay. Although you can not entirely prevent it,
attention to your privacy and physical security can minimize your
"victim potential." Pay attention to the rules of the game so that
if you are victimized, at least you are not left holding the empty
bag.
+--------------------------------------------------------------+
| You can send your comments and questions to the author of |
| these stories by sending them to safety.security@cancomm.com |
+--------------------------------------------------------------+
----------*----------
VII.
Fire Safety:
Electric Heaters,
An Alternative to Kerosene
Nick Markowitz
1) Whenever possible, use an electric heater rather than a kerosene
type.
2) Keep electric space heaters away from combustibles, such as drapes
and clothing.
3) Never allow the use of an electric space heater when you are away
from home.
4) Make sure the electric outlet into which your electric space heater
is plugged is load capable.
5) When using electric space heaters, do not use extension cords. This
is an almost sure way to start a fire, especially when the
metallic conductors within it are too small and unable to safely
handle the electrical load of the heater.
6) Instead of blow torches and other open-flame devices when
thawing water pipes, use a hair dryer.
7) When there is a doubt, the best procedure of all is to call a
professional. He has the proper tools to safely and effectively
thaw out your pipes.
+--------------------------------------------------------+
| Send your comments and questions to the author of this |
| story. Send it to safety.security@cancomm.com |
+--------------------------------------------------------+
----------*----------
VIII.
Home Safety:
Earthquakes and Fires
Did you know fires often happen after strong earthquakes, causing
damage to homes and businesses? In fact, the Great San Francisco
earthquake that occurred on April 18, 1906 caused a lot of damage to
buildings, but the fires that burned unchecked for three days after
the earthquake destroyed the city.
According to the National Fire Prevention Association (NFPA),
Quincy, Massachusetts, there are several steps that residents can take
now to reduce the risk of fire when an earthquake happens later.
o Have approved flexible gas fittings installed for gas appliances
such as water heaters, furnaces and stoves. Many gas lines break
at their weakest point, where they are fitted to an appliance. A
flexible fitting allows for movement during earthquakes without
breaking the line. Check with your gas utility company for more
information.
o Strap your water heater to wall studs using perforated metal tape
called "strap iron" or "plumber's tape." This will keep the water
heater from toppling over in an earthquake, and also protects a
large supply of drinking water you may need after the quake.
There are also many ways to avoid fires after an earthquake.
o Use a flashlight to inspect for damage. After an earthquake, more
people die in residential fires caused by using candles during a
power outage than from the actual earthquake itself.
o Avoid turning light switches on or off. A small spark inside the
switch can touch off a fire due to leaking gas.
o Sniff for leaking gas. If you smell gas, open windows if you can,
and get out of the building/house. Call the gas company and fire
department from someone else's home. If you do not smell gas, do
not turn the gas off. You will need it for cooking and heating.
For additional information on earthquake safety and protective
measures that you can take before a quake happens, call the American
Red Cross chapter in your area and/or the National Fire Prevention
Association (NFPA) at 617-770-3000, fax to 617-770-0700, or E-mail at
library@nfpa.org.
+---------------------------------------------------------+
| You can send your comments and questions regarding this |
| story by sending it to safety.security@cancomm.com |
+---------------------------------------------------------+
----------*----------
IX.
Editor's Last Say:
Is Your Garbage Worth Protecting?
There are those who believe that because everyone has the right to
public information that safeguards are not needed to protect it.
However, the other day, when I went to renew my vehicle plates, the
girl at the DMV handed me some folded papers and instructed me to take
my own waste paper home and dispose of it.
Thinking this a bit odd, I promptly asked her why couldn't she
dispose of it here, behind the counter. She told me something that I
already knew, but hadn't thought of at that moment. She said that
recently, on several occassions, people from the bureau had
encountered people going through their trash dumpsters. She said that
they were obviously looking for papers with peoples' Social Security
Numbers, names, and birthdays on them. When I asked if they had called
the police about it at the time, she said there was nothing they could
do about it, these materials were no longer theirs to protect once
they placed them in the garbage.
Do you think about the important kinds of information you frequently
dispose of in your trash can? Could someone be freely looking through
your garbage without your knowledge? --Al Colombo
+----------------------------------------------------+
| Send your comments and questions to the author of |
| this story. Send it to safety.security@cancomm.com |
+----------------------------------------------------+
----------*----------
X.
EndNotes:
S&S Magazine
E-mail Addresses
Allan B. Colombo
Editor
al.colombo@cancomm.com
http://web.raex.com/~colombo/
Ron Nelson
Co-Editor
ron@topservice.com
http://ourworld.compuserve.com/homepages/ren_productions/
Nick Markowitz
Contributing Writer
nmarkow125@aol.com
John Bailey
Contributing Writer
http://ourworld.compuserve.com/homepages/task_force/
task_force@compuserve.com
-----+-----
View On The Web:
Safety & Security Home Page
http://ourworld.compuserve.com/homepages/acolombo/
Safety & Security Depository
http://ourworld.compuserve.com/homepages/acolombo/backissu.htm
-----+-----
Bulletin Boards:
CompuServe Information Systems Forums:
TWCRIME, AARPFORUM, TWDWELL, EWCFORUM, SafetyNet
Canton Communications (CanComm)
Canton, Ohio
Online: 330-477-4504
Voice: 330-477-3080
-----+-----
Subscription Information:
To subscribe to the ASCii version of the Safety & Security
[electronic] Magazine, send an E-mail message with the word SUBSCRIBE
in the message text to ccmag-request@cancomm.com. To unsubscribe, send
an E-mail message to the same address with the word UNSUBSCRIBE in the
message text area to the same address.
-----+-----
Disclaimer
The information and tips contained in the Safety & Security
Magazine is meant for entertainment purposes only. The
authors cannot guarantee the personal safety and well
being of those who read and use the information herein.
Copyright(c)1997
Safety & Security Magazine
safety.security@cancomm.com
P.O. Box 30076
East Canton, Ohio 44730
Phone: 330-488-1119
+-----------------+ +--------------------------+ +-----------------+
+-+ | | | | +-+
+---+ | | Safety & Security | | +---+
+--+ | | [electronic] | | +--+
+--+ | | Magazine | | +--+
+--+ | | | | +--+
+--+ +--------------------------+ +--+
===================================================================
Volume 3, Issue 12 (c)1997 Safety & Security Magazine November 1997
===================================================================
Each month in the Safety & Security [electronic] Magazine
you will find helpful and informative articles on topics
related to property protection and personal safety and
security at home, at work, and while traveling.
+-------------------+
| Table of Contents |
+-------------------+
I. Editor's Say: Doctor Death's Free Body Parts
II. Fire Prevention: Kerosene Appliance Safety
III. Personal Safety: Carbon Monoxide -- The Silent Killer
IV. In the News: Cases of Drug-Resistant Tuberculosis on Rise;
Corrections Privitization in New York Not Likely; Call for
Encryption Algorithms for Advanced Encryption Standard; NIST
Reports on New DNA Sequencing Technologies; Sun Research
Reveals Problems Ahead; Auto-Dial Messaging for ProActive
Policing; Supreme Court on Religious Freedom; The Great
Chicago Fire, Change in Story?
V. Mail: Domestic violence; Evaluation of Pepper Spray; Thank you;
Link to our site; Feedback on e-zine
VI. Question & Answer: Identity Fraud Concerns
VII. Fire Safety: Electric Heaters, An Alternative to Kerosene
VIII. Home Safety: Earthquakes and Fire
IX. Editor's Last Say: Is Your Garbage Worth Protecting?
X. EndNotes: Staff, E-mail addresses, View On The Web, Bulletin
Boards, Subscription Info, Disclaimer, Contact Info
----------*----------
I.
Editor's Say:
Doctor Death's Free
Body Parts
Doctor Jack Kevorkian, the doctor-of-death, is at it again. Only
this time, he is trying to sell the public and medical profession an
inperfect bill of goods. He wants to shift attention away from the
real issue of assisted suicide and place it on society's need for body
parts. If he is successful, and there is a good chance he will be,
this will lead to the normalization of euthanasia. Our government has
taken God out of almost everything else, we cannot allow them to
remove God from the decision of death.
| Isaiah 40:6,7 |
| |
| 6 -- The voice said, Cry. And he said, What shall I cry? All |
| flesh is grass, and all the goodliness thereof is as the flower |
| of the field: |
| 7 -- The grass withereth, the flower fadeth: because the spirit |
| of the Lord bloweth upon it: surely the people is grass. --KJV |
The decision of "when is it time to die" for all of us, even those
who are terminally ill, should be left to our Maker and not the
doctor-of-death or any other physician. What is doctor death's tie-in
with Safety and Security? Well, if this practice should ever become
legalized and sanctioned by the U.S. Government, abuse is almost sure
to follow. Maybe not right away, and then again...
Take a good, serious look at China's body-parts business where for
US$30,000, US$5,000 down and a blood sample, you can buy an operation
and the body part you need from the Red Communist Chinese Military.
After doing a DNA typing of your blood, they then match it to that of
a Chinese prisoner already in custody (I assume he/she is already in
custody). At a scheduled date, this particular prisoner, along with
many others (who I assume are likewise designated as body-part
donors), are put to death. Their body parts are then removed from
their bodies and immediately placed within the recipients'. Because
the execution date was transmitted to each of the recipients, they
were already there, ready to receive their body part.
I hope the doctors and good citizens of the United States do not buy
into what Kovorkian is selling. What he is proposing is inhuman and
good doctors should be above that. The life of one for the life of
another, this is God Almighty's job, not ours. We should not encourage
this kind of imoral, unethical behavior, for the potential for abuse
is far too great. No matter how positive it might sound, there is no
way to escape the fact that this is an atrocity.
A little over two years ago, I painfully watched my dear mother,
Nova Jane, age 72, die of cancer. She was a second-hand-smoke victim,
given her close proximity to my father, a well-meaning, good man who
smoked constantly. Her death was slow and painful, and much as I still
agonize over it, I am certain that she would not have wanted to end
her life a moment sooner than God deemed necessary. She was a strong,
courageous woman and she died with dignity. --Al Colombo
+--------------------------------------------------------------+
| The opinions expressed in Editors Say is the personal views |
| of the writer and not Safety & Security [electronic] |
| Magazine or staff. You can send your comments to the writer |
| of this editorial at: safety.security@cancomm.com |
+--------------------------------------------------------------+
----------*----------
II.
Fire Prevention:
Kerosene Appliance Safety
Nick Markowitz
Fires can occur at any time, especially when there's been a natural
disaster. Whether it is a bad storm, an earthquake (see Section IV),
or merely a power outage, if it is cold weather, the first thing many
people do is drag out their kerosene heaters and lanterns. In this
regard, under the best of conditions, fire safety is a must; but it is
even more critical during an emergency.
The first rule of thumb when using kerosene appliances is to use
good-quality kerosene fuel. K1 is usually the best, but always follow
the manufacturer's recommendations. If someone you know should offer
you some other kind of fuel that they say will work in your kerosene
appliances, such as jet fuel, no matter what the price, pass it up and
buy the real thing.
Another rule of thumb when using kerosene appliances is to store the
fuel in an approved container and keep the cap on tight to prevent
spills and contamination. If the can you want to use had gasoline in
it at some time in the past, no matter how thorough you may have
washed it, do not use this can for your kerosene fuel. Only use cans
that have had nothing other than kerosene in them.
Local Regulations and Maintenance
Some communities do not permit their citizens to use kerosene
appliances in some environments. This is especially true of apartment
tenants. However, in some communities this also applies to single-
family dwellings. So, before you buy a kerosene lantern or space
heater, be sure to check with the local building codes authority and
fire inspection department to find out if they are allowed.
Naturally, after sitting all summer without being used, always take
your kerosene appliances to a specialist to have them maintained.
Cleaning is very important and you should have them install a new
wick. Be sure the technician that works on your appliance uses only
replacement parts approved by the original manufacturer.
Another important aspect associated with using kerosene appliances
is the distance between them and combustible materials in the
environment. Maintain at least one foot (12 inches) of space between
them and draperies, furniture and other combustibles.
These appliances also require constant supervision to assure that
they do not catch on fire or cause a fire by radiated heat. In
addition, supervision assures that children in the home will not come
into contact with the hot surface of a kerosene device.
Another concern is that of carbon monoxide. Are you using your
kerosene appliance in a well-ventilated area? What about a carbon
dioxide CO detector? In a tightly sealed room, CO could become an
issue in short order, causing those inside the enclosed area to become
ill or even perish. A CO detector will provide early warning of such a
problem. Because power may be an issue during a disaster, it is
probably wise to purchase both a battery and electric model.
Thawing Water Pipes
Frankly, one of the things that people mistakenly do is use kerosene
heaters to thaw out water pipes. The best procedure is to thaw pipes
by naturally heating the room. They take longer to thaw, this is true,
but the fire risk of the other alternative is too great and
potentially costly to consider. Another alternative, if electricity is
available, is to use an electric hair dryer.
Another risk in the home is the use of what some call a "salamander"
kerosene heater. These are often found on construction sites in some
portions of the country. One man lost his new home and almost his
family when he used one for this very purpose. He only walked away
from it for three minutes--instant inferno.
There is little doubt that kerosene heaters make a great emergency
source of heat and light. But they also contribute to many winter time
fires and fire deaths. Before using your kerosene heater, be sure to
follow the above advice and read the instruction manual that came with
your kerosene appliances.
Editor's Note: Remember, if you use a kerosene heater in the wrong
way, you may get one of those house calls from your local fire
department. Using a kerosene lantern can also get you into trouble
if you do not know how to safely use them. I cannot stress enough
the need to read the instruction manual that came with your
appliances, or you might end up taking an unexpected trip to the
hospital. In the mean time, think SNOW!!! --Nick Markowitz
+------------------------------------------------+
| Send your comments and questions to the author |
| of this story at safety.security@cancomm.com |
+------------------------------------------------+
----------*----------
III.
Personal Safety:
Carbon Monoxide -- The
Silent Killer
----------------------------------------
Reprinted from the November 1995 Issue
of the Safety & Security Magazine
----------------------------------------
Ron Nelson
According to the US Consumer Product Safety Commission CO Fact
Sheet, in the year 1989 there were 295 deaths associated with CO
poisoning and close to 5,000 people are treated each year in emergency
rooms for symptoms of CO poisoning. The problem has grown so great
that in 1993 President Clinton declared the last week in September as
"CO Safety Awareness Week." Many municipalities have also adopted
legislation requiring the installation of CO detectors in homes and
recreational vehicles
What is Carbon monoxide?
CO is a colorless, odorless, and highly poisonous gas that is
produced when fuels containing carbon are burned. It is about 3%
lighter than air and as such tends to rise under normal conditions.
It is dangerous because when it is inhaled it combines with
hemoglobin, the oxygen carrying substance in blood cells, and prevents
them from absorbing needed oxygen. This lack of oxygen causes
headaches, nausea, followed by unconsciousness and ultimately death.
As little as 1/5 of 1% may prove fatal in less than 30 minutes. CO is
a particularly insidious gas since it is odorless and someone may be
exposed to dangerous levels without knowing it.
Symptoms of Carbon Monoxide poisoning:
* Mild exposure- Slight headache, nausea, vomiting, and fatigue.
These symptoms are sometimes described as "flu like".
* Medium exposure- Severe throbbing headache, drowsiness, confusion,
fast heart rate.
* Extreme exposure- Unconsciousness, convulsions, cardiorespiratory
failure, death.
The disorientating effects of CO poisoning often prevent the victims
from seeking help even though they are aware that they are not feeling
well.
Each year many deaths are caused by CO gas escaping from furnaces,
stoves, and fireplaces when the ventilation is not properly regulated.
If you develop CO poisoning symptoms leave immediately and call your
local fire department or ambulance if the symptoms are severe. You may
also notify your local gas company or HVAC contractor.
Types of CO detectors
There are 2 basic types of CO detectors, Biomimetic and Taguchi.
Biomimetic units, also called gel cell or litmus, utilize a
semipermeable gel that changes color when exposed to CO. This gel
absorbs CO at the same rate as human hemoglobin, and its color is
directly related to the amount of CO absorbed. The detector has a
light beam which shines through the gel and senses the change in
color, activating the device. These units require that the sensor pack
be replaced every 2 years and are also known to be sensitive to
cooking or other fumes.
Taguchi units, also called tin oxide or figaro, utilize a specially
doped semiconductor that changes its resistance when exposed to CO.
The detector senses this change and activates the unit. A new
technology for detecting CO is called non-dispersive infrared. This
type of detector is still under development but promises to be a much
better and reliable method to detect CO.
Installation of detectors
Due to its lighter than air composition CO detectors should be
located near the top of a wall or on a ceiling. Do not mount it
directly in a corner since the normal movement of air causes a dead
spot in that area.
In addition do not locate it within 5 feet of a CO producing source,
such as furnace, since false alarms may occur. Due to the unique
composition of CO, detectors are specifically designed to react only
to its presence and are not combined with other types of gas
detection.
Power and connection to security systems
The detectors currently available may be powered by batteries, 110
vac, 12 vdc, or 110 vac with battery backup. Units may also be
purchased that have a relay output for connection to any security
system control or wireless transmitter.
If you will be connecting your detectors to a security system, they
must be installed on dedicated 24 hour zones to insure proper reaction
to an activation. As always, make sure that you completely read the
detector instructions that are packed with each unit, and follow all
of the manufacturers directions.
What to do if your detector activates
If your CO detector activates you should leave the location
immediately and check to make sure everyone got out. Call your local
fire department, your local gas company or HVAC contractor. You can
open the windows to ventilate the area and clean out the CO buildup.
Do not take any chances, it is much better to call for assistance
than to become another statistic. It is also possible for CO poisoning
to occur from faulty exhaust pipes on automobiles or trucks. If you
begin to experience headaches or nausea while driving or riding in an
automobile or truck, you should open the windows immediately and have
the exhaust system checked.
Monthly maintenance
Cleaning- You should clean the outside of the detector with a vacuum
or soft brush and make sure that no objects are blocking the unit or
restricting air flow around it.
Testing CO detectors- These units are designed to detect only Carbon
monoxide so they can not be checked for actual operation. If the unit
is equipped with a test button you should use it to test the unit. If
your detector is connected to a remote monitoring office please
remember to notify your security company prior to testing.
For additional information check your local library or you can
contact your gas supplier, utility company, local fire department, or
HVAC contractor.
+------------------------------------------------+
| Send your comments and questions to the author |
| of this story at safety.security@cancomm.com |
+------------------------------------------------+
----------*----------
IV.
In The News:
Cases of Drug-Resistant
Tuberculosis on Rise
As reported in the September, 1996 issue of Safety & Security, the
advance of drug-resistant TB is on the rise. Recently, a survey
conducted by researchers for the World Health Organization (WHO) and
the U.S. Centers for Disease Control and Prevention (CDC) confirmed
the existence of multi-drug resistant (MDR) TB in one third of the 35
countries who were queried. TB is caused by an airborne bacterium.
This new strain of TB is almost sure to spread to other countries.
This is of grave concern to the world health community because WHO's
research reveals that anyone infected with TB of any strain is likely
to infect 10 to 20 people every year.
The drug-resistant strain of TB is said to be the result of poor
medical practices, such as infected people that fail to take all of
the medication prescribed. This common, wide-spread practice permits
drug-resistant strains to occur. Also a problem, doctors often
prescribe the wrong medication, which essentially has the same effect.
Because the cost of treating MDR tuberculosis is about a hundred
times more expensive than traditional TB, a large portion of the
people who have it will not receive the correct treatment. Not only
will the assure the death of these people, but it will serve to
further spread these mutated strains.
WHO reports a 96% recovery rate among patients who use Directly
Observed Treatment Shortcourse (DOTS). DOTS entails the suprvision of
patients being treated by better assuring that they take the right
medication for the prescribed period of time. According to WHO,
because not everyone has access to DOTS, only 3 million of the 8
million cases of TB reported annually are curable. For additional
information on this strawin of TB, check out WHO's web site at:
http://www.who.ch/programmes/gtb/dritw/foreward.htm.
-----*-----
Corrections Privitization
in New York Not Likely
Dennis C. Vacco, Attorney General of New York says that in his legal
opinion, the privitization of prisons in New York State is not likely.
According to Corrections Journal, Pace Publications, May 21, 1997;
"senator Michael Nozzolio, chairman of the Senate's Crime Victims,
Crime, and Correction Committee, asked for the opinion after learning
of inquiries made by the Corrections Corporation of America, the
leading private corrections firm in the nation...."
Lack of proper training and limited powers were two of the issues
that Vacco mentioned in his legal opinion. He said that employees of
private corrections companies would not be sworn peace officers, but
rather private citizens. This means that their right to use force
against prisoners would be greatly limited by New York law. Because of
this, private correctional employees might not be legally able to
apply the necessary force required to stop a prison riot or ward off
an escape--not without serious legal consequences. Not only that, but
prisoners that try to escape from a privately run correctional
facility could not be legally charged with Escape or Attempted Escape
according to New York law.
Editor's Note: For more information on correctional issues or their
semi-monthly publication "Corrections Journal," ISSN 1089-2575,
contact Pace Publications, 443 Park Ave. South, New York, NY 10016;
phone 212-685-5450; or by fax 212-679-4701. --Al Colombo
-----*-----
Call For Encryption Algorithms
for Advanced Encryption Standard
Security product manufactures, voluntary standards organizations and
others are invited to submit their encryption algorithms for
inspection and evaluation. The algorithm selected could become the
basis of an Advanced Encryption Standard (AES). According to a notice
published in the 12 Sept. 1997 Federal Register, the AES will specify
an unclassified, publicaly-disclosed encryption algorithm that will be
made available, royalty free, to anyone in the entire world for
protecting information.
Candidate algorithm submission packages must be received no later
than 15 June 1998. Submissions received prior to 15 April 1998 (tax
day :-) will be reviewed for completeness by NIST and their submitters
notified of any deficiencies by 15 May 1998. This should allow time
for corrections before the 15 June deadline.
Editor's Note: For more information on the AES program, contact
Technology Lab, Attn: AES Nominations, A231 Technology Bldg., NIST,
Gaithersburg, MD 20899; call 301-975-3696; fax 301-948-1233; or E-
mail aesquest@nist.gov. You can also visit the AES web site at:
http://csrc.nist.gov/encryption/aes/aes_9709.htm. --Al Colombo
-----*-----
NIST Reports on New DNA
Sequencing Technologies
National Institute of Standards (NIST) reported a new DNA sequencing
technology, developed by GeneTrace Systems Inc., Menlo Park, CA, that
is hundreds of times faster than current methods and at a fraction of
the cost. It is expected that this research will lead to a set of
highly-effective drugs that will make the diagnosis of diseases and
the identification of people, as part of a forensic exercise or
paternity test much faster.
Co-funded by both NIST and Technology's Advanced Technology Program,
the company developed the technology needed to apply fast and accurate
mass-spectrometry techniques to the identification of DNA fragments.
The system is able to identify the sequence of base chemicals in a
given DNA strand in as little as five seconds, rather than the three
hours required for conventional DNA separation today.
GeneTrace reduced labor costs by using a robotics system for initial
sample handling. The process combines DNA probing, sequencing and
sizing reactions with mass spectrometry. Eight patents on this new
process are now pending. The company expects this technology to lead
to genetic screening tests for as little as a few dollars, compared
to the $300 to $5,000 now required. Several companies are now using
GeneTrace's technology for pilot projects that focus on gene discovery
and expression, genotyping and other topics.
In an entirely different effort, NIST recently reported the
existence of a new DNA chip technology that has the potential of
revolutionizing the sequencing of DNA, genetic disease diagnosis,
detection of pathogens in food and water, forensics and personal
identification and other applications. The NIST DNA chip is made of
one layer of single-stranded DNA molecules, which self-assemble on
gold. This forms a well organized monolayer. The surface-tethered DNA
can then bind complementary small fragments of single-stranded DNA
from solution. Such DNA sensors could be used for analysis of blood or
urine samples from a patient, or in water or food. In theory, NIST
claims that DNA chip sensors could also be developed to check for many
types of bacteria and viruses.
Editor's Note: For more information on the GeneTrace's DNA Sequencing
method, contact Michael Baum, NIST, at 301-975-2763. For additional
information on the NIST DNA chip method, contact Linda Joy, NIST,
at 301-975-4403 or linda.joy@nist.gov. --Al Colombo
-----*-----
Sun Research Reveals
Problems Ahead
It was recently reported by National Public Radio (NPR) that since
1991, scientists have known that our sun is emitting two additional
spectral bands of radiation. According to public radio, so certain are
these findings that our sun was officially reclassified from its
original "stable star" category to "variable-output."
What is the significance of this recent finding to us on planet
earth? According to NPR, this increase in energy output is thought by
some scientists to be cause of El Nino, which, according to
scientists, is not showing any sign of abatement at this time. It is
expected that El Nino will continue to cause adverse weather patterns
across the globe. Experts say it has already affected agricultural
output in developing countries, such as Australia and Brazil. Its
affects are expected to reach output in developed countries as well.
-----*-----
Auto-Dial Messaging for
ProActive Policing
Police departments, like the Baltimore County, MD, police
department, are taking a proactive stance to policing using an auto-
dialer message system, manufactured by VoieWorld, Scottsdale, AZ. The
system, which costs about $5,000, enables police officials to
automatically send voice messages over the telephone network to
hundreds or thousands of residents, warning them of crime trends,
specific crime problems, and other situations.
"We can very quickly identify all of the households in a community
that's experiencing a crime problem. We enter the phone numbers
automatically thorugh a computer to the auto-dialing system, and
within minutes, we can deliver our message to people, alerting them to
the problem and giving them suggetions as to what they can do to
reduce their chances of being victimized," said Philip Canter, Chief
Statistician, Baltimore County, MD, police department (Law Enforcement
News, John Jay College of Criminal Justice, New York, NY, 15 October
1997 issue).
According to Canter, his department is able to discern a difference
in crime statistics in Baltimore County because of this auto-dialing
system. In fact, the same system was used by Los Angeles Police
Department to warn police officers in LA County after the verdict in
the 1992 state trial of LAPD officers who were charged in the beating
of Rodney King.
-----*-----
Supreme Court on
Religious Freedom
The Supreme Court recently ruled (City of Boerne versus Flores) that
the Religious Freedom Restoration Act of 1993 is unconstitutional and
that by passing this act, Congress overstepped its Constitutional
authority and interfered with state soverignty.
-----*-----
The Great Chicago Fire
Change in Story?
If Richard F. Bales, a title insurance lawyer in the employ of
Chicago Title Insurance Co., is right, Mrs. O'Leary's cow may not have
tipped over the kerosene lantern that was alleged to have caused the
great Chicago Fire of 1871. According to records, the fire that killed
300 and made homeless more than 100,000 started in Mrs. O'Leary's
barn. The popular story has it that her cow kicked over the lantern as
she was being milked.
According to Bales, the fire may have started in O'leary's barn, but
Mrs. O'Leary may not have been the culprit. One of the problems with
the original investigation, says Bales, was that no one had adequately
mapped out the area. Because he has ready access to the property
records kept by Chicago Title, he was able to detect possible
discrempencies in a Peg Leg Sullivan's story.
"[Bales] was struck that Peg Leg Sullivan seemed to have a lot to
say. Sullivan said he had been in front of another neighbor's house
and had seen the fire break out in the O'Leary's barn. But Bales
discovered that the title records showed that at least one house,
maybe two, plus an 8-foot-high fence would have blocked Sullivan's
view," says Pam Belluck, author of MRS. O'LEARY'S COW MAY HAVE BEEN
FRAMED, published by The New York Times.
At the time, Sullivan told authorities that he ran to Mrs. O'Leary's
barn to save the animals, then ran out of the barn to get help. All of
this he did on his wooden peg leg, says Bales. Records also revealed
that Sullivan told authorities that he visited the barn every evening
to feed a cow that his mother kept there. All of this, says Bates,
throws a serious doubt on the popular story that claims that Mrs.
O'Leary's cow started the fire.
+----------------------------------------------------------+
| You can send your comments and questions regarding these |
| stories by sending them to safety.security@cancomm.com |
+----------------------------------------------------------+
----------*----------
V.
Mail:
From: GM
Network: worldnet.att.net
Date:
Subj: domestic violence; April, 1997 issue
The article in your April S&S Magazine, which covered the Domestic
Violence Offender Gun Ban, sponsored by Senator Frank Lautenberg (D-
NJ), shows another prime example of the twisted thinking and
conflicting statistics fostered by the Clinton administration and his
left-wing comrades in Washington.
I remember, as part of Clinton's policy on crime, he was going to put
"100,000" more cops on the street. That figure in reality has become
approximately 18,000 to 25,000 additional police officers so far.
Now... enter the Domestic Violence Offender law, and we lose 60,000
police officers. That gives us a NEGATIVE gain of from 35,000 to
42,000. I guess that's what comes from outcome-based education.
Just because you are living in a rural area, and maybe only own a
double-barrel shotgun, don't turn your back on the city folks who
have had their handguns taken away! Mr. farmer, YOU could be next!
A story on the American Freedom Network this week told of a new
"Anti-Gang" crime bill that would disqualify you from ever owning a
firearm if you so much as had a shoplifting charge against you when
you were in grade school!
Come on people... WAKE UP! The government has slowly and
methodically picked away at our society by eliminating our 2nd
Amendment rights one class at a time, and one weapon at a time.
-----*-----
From: John Rich
Network: CompuServe
Date: September 15, 1997
Subj: Evaluation of Pepper Spray
Source: NIJ Research in Brief, U.S. Department of Justice Office of
Justice Programs, National Institute of Justice. You can find the full
report at: www.ncjrs.org/txtfiles/162358.txt
Key Findings:
o OC spray successfully incapacitated humans in 156 out of 174 (90
percent) confrontations.
o In 18 encounters, subjects were not fully "subdued " by OC; in 7 of
these incidents, subjects exhibited bizarre behavior and appeared
to be on drugs or mentally troubled, thus suggesting that such
individuals may not yield to OC's effects.
o While assaults on officers were declining prior to implementation
of the OC spray program, the rate of decline increased after OC was
introduced.
o Twenty-one officers received minor injuries when they used the
spray, but none reported lost work days.
o Similarly, only 14 suspects received injuries, none of which
required hospital treatment.
o Use-of-force complaints decreased by 53 percent in the study period
despite decreased manpower and increased demand for services. No
complaints addressed the use of OC.
o Although training instructions stated that sprays were maximally
effective from a distance of 4 to 6 feet, many officers applied the
aerosol to humans from distances of less than 3 feet, which may
have diminished the spray's effectiveness.
o Overall, study findings showed that a well-developed OC-spray
program can provide operational benefits to police.
Interesting triva about pepper spray:
As early as 2300 B.C., Chinese armies dispersed enemy forces by
using "stink pots" -- red pepper burned in hot oil that produced
irritating and suffocating smoke -- in massive frontal assaults.
Editor's Note: Thanks to John Rich for the OC update. --Al Colombo
-----*-----
From: Russ
Network: aol.com
Date: October 6, 1997
Subj: Thank you.....
Al,
What a great service you are providing. I am buying my first home and
want to install my own security system. How do I get in touch with the
International Association of Retired Police Chiefs for a kit to mark
my personal belongings and obtain window stickers stating same?
One more thing, I have read most of the info that you have published
re: home security, but I have not been able to find a dealer or
catalogue from which to purchase the necessary components to make my
own customized alarm system.
Once again, the information I have received thus far has been of great
help to me of which I am most appreciative.
Thank you, Russ
-----*-----
From: Will
Network: bkstr.ucsb.edu
Date: October 17, 1997
Subj: Link to our site
If you would like could you add a link to our web site at the UC Santa
Barbara Asset Protection. We have a lot of loss prevention info and
report forms at the site. We also have a live video feed so people
visiting our site can see who or what we are watching.
Thank you.
Will Wood, AP Director UCSB AP web site-
http://www.bookstore.ucsb.edu/lp/lp.html
-----*-----
From: William Plante
Network: home.com
Date: October 13, 1997
Subj: Feedback on e-zine
Hi!
I am a security consultant based in the Phoenix, AZ area and originally
from Canada. I was browsing the web when I hit your home page.
Wow, neat e-zine. You obviously dedicate a great deal of time and energy
to maintain this service - you should be highly commended for your
efforts.
Thanks.
William Plante
Principal Consultant
Corinthian Consulting, LLC
+---------------------------------------------------------------+
| You can send your comments and questions for inclusion in |
| the mail section by sending it to safety.security@cancomm.com |
+---------------------------------------------------------------+
----------*----------
VI.
Question & Answer:
Identity Fraud Concerns
-----------------------------------------
"Question & Answer," a new
department for difficult questions.
-----------------------------------------
Expert: John Bailey, CPS; Las Vegas, NV
Biography: Bailey specializes in wholesale database and other
information services. Nation-wide investigative referral
service, executive protection and privacy, tactical and
custom mission-specific training programs, and software for
investigators. E-mail: Task_force@compuserve.com
-----------------------
READER'S QUESTION -- In the early hours of Sunday morning my home was
burglarized. The thief's only loot was my fiance's purse. It
contained almost no cash but did include her "identity." It
included her Social Security Card, Driver's License, credit cards
and other things of minor value.
I read in an article that with the information that the thief got
he/she can create a new "identity." I also read that that there
was a way to advise the credit agencies that under no circumstances
should they allow anyone to receive credit using this ID.
I have three questions about all of this:
1) -- How does one go about this?
2) -- When she needs to, how does she get access to her own
credit?
3) -- I noticed that when you apply for credit it is noted on
the bottom who has attempted access of your credit
history. Is it wise to get a copy of your credit
history every month for a while after a situation like
this to see if anyone is attempting access? And if so,
how?
BAILEY'S ANSWER -- You did not mention whether you were home or not.
If you were, count yourself lucky that you did not have to cope
with the worse. This is pretty typical of a "cat" burglar job,
where they take the easiest item(s) and leave without taking the
risk of searching for more loot. Without knowing more details, it
is hard to draw conclusions about the probable perps. If, for
instance, the purse was visible from the outside of the house, and
the window was open, any neighborhood kid could have done it on a
dare, and everything but the cash probably went into a nearby
dumpster or ditch.
I want to comment on the notion that a person's identity is
contained on pieces of paper and plastic. This reminds me of the
way certain native peoples fear that photographs steal their souls.
The media has worked hard to maximize the emotional impact of this
issue to make it more newsworthy. They have inadvertently also
maximized the emotional impact of ID theft on the victims by
promoting the concept that a human being's identity held captive by
ink on paper. Tell your fiancee that you still know who she is -
Her "identity" is intact. All that has been taken are some papers
that have no intrinsic value. Help to minimize the impact of this
issue.
Make sure that no keys were taken. Change locks if necessary. And,
an all-around security review is definitely in order for emotional
reasons as well as practical ones. It is possible that your
perpetrater is more than a thief, so advise your intended
concerning physical security, etc. The two best tools for this are
awareness and physical barriers.
The remainder of your letter asked about the thief potentially
using your fiancee's papers to create a new identity. I have worked
some of these fascinating cases assisting the Secret Service, the
Postal Service, NYCPD and other agencies. Fraud is a growth
industry, and we can count on seeing more of it and endless new
incarnations as communications and banking technologies evolve.
You asked specifically about "advising the credit agencies" to keep
the thief from obtaining credit in your fiancee's name. This theft
is not the typical way in which a fraudster would go about
obtaining information. It is too dangerous, and pays too little.
However, the thief may sell the ID to someone else who is smarter.
So, some fraud crimes may arise from the original theft.
The credit bureaus are not particularly interested in every stolen
purse. And, they have no control over who receives credit. You also
do not want to muck up her credit file over this. Nevermind about
the credit bureaus. They protect the banks, that frankly do not
care about one instance of fraud. Let us concentrate on protecting
you and yours instead.
Fraud schemes vary. The most common attack would involve obtaining
credit in your fiancee's name and absconding with merchandise or
cash advances on a card. There is not much you can do about this,
even if her purse were not stolen. It is a very common crime. The
good news is that you are not liable for the bills, and it
should not cost much more than some aggrevation with the banks.
This type of crime has become common and banks are now easier for
consumers to deal with about it.
Of more concern are frauds that could target your lady's own bank
account through the use of various check or transaction schemes. In
the wake of this theft, the lenders for stolen cards will usually
close those accounts and issue new cards with new account numbers.
Have your fiancee call all of her credit card lenders - not just
the ones whose cards were stolen. Have them note the accounts.
Specifically, tell them that no change of address is planned, and
that any changes in address should alert them. Have the accounts
noted that no extra cards should be issued to "husband" or other
family members. Have her establish some security protocol with
them, using a security code OTHER than SSN, or mother's maiden
name. Your fiancee can contact her bank(s). She can ask them about
security protocols to curtail fraud, and she can establish
procedures (passcode) for the release of account information. If
banking information was in the purse, she can consider closing the
account and opening a new one, or even changing banks.
General security against all kinds of identity theft should
include, as in this case, physical security of documents. That
includes security of your trash. Many fraudsters obtain the
foundation of their information by picking through garbage. Some
people throw away the most interesting things. In my investigative
career, I have found everything from interoffice memos about
illegal toxic dumping, to copies of CEO's personal 1040 forms and
attachments. A good fraudster can use a single sales receipt, a
bank deposit slip, or a check carbon to steal from you or your
bank. Use a good quality shredder, or use these kinds of things to
prime your fireplace this winter.
Other security precautions include refusing to give your SSN,
telephone number, address, or even your name to people who do not
really NEED to have it. Refuse to sign release forms that allow
information to pass hands.
Ask people who will have access to the information you provide. Ask
them to tell you this IN WRITING. "Do not talk to strangers" - even
on the phone. Several fraud schemes involve coaching credit card
numbers out of people over the phone. Never order merchandise by
phone if the sales person called you. They may make you a great
offer just to get your card number.
Checking your credit report periodically is probably a good thing -
to make sure the information is correct and current. Fraud moves
faster than you can detect or fight by monitoring these files,
(there are three different major files).
Fraud is here to stay. Although you can not entirely prevent it,
attention to your privacy and physical security can minimize your
"victim potential." Pay attention to the rules of the game so that
if you are victimized, at least you are not left holding the empty
bag.
+--------------------------------------------------------------+
| You can send your comments and questions to the author of |
| these stories by sending them to safety.security@cancomm.com |
+--------------------------------------------------------------+
----------*----------
VII.
Fire Safety:
Electric Heaters,
An Alternative to Kerosene
Nick Markowitz
1) Whenever possible, use an electric heater rather than a kerosene
type.
2) Keep electric space heaters away from combustibles, such as drapes
and clothing.
3) Never allow the use of an electric space heater when you are away
from home.
4) Make sure the electric outlet into which your electric space heater
is plugged is load capable.
5) When using electric space heaters, do not use extension cords. This
is an almost sure way to start a fire, especially when the
metallic conductors within it are too small and unable to safely
handle the electrical load of the heater.
6) Instead of blow torches and other open-flame devices when
thawing water pipes, use a hair dryer.
7) When there is a doubt, the best procedure of all is to call a
professional. He has the proper tools to safely and effectively
thaw out your pipes.
+--------------------------------------------------------+
| Send your comments and questions to the author of this |
| story. Send it to safety.security@cancomm.com |
+--------------------------------------------------------+
----------*----------
VIII.
Home Safety:
Earthquakes and Fires
Did you know fires often happen after strong earthquakes, causing
damage to homes and businesses? In fact, the Great San Francisco
earthquake that occurred on April 18, 1906 caused a lot of damage to
buildings, but the fires that burned unchecked for three days after
the earthquake destroyed the city.
According to the National Fire Prevention Association (NFPA),
Quincy, Massachusetts, there are several steps that residents can take
now to reduce the risk of fire when an earthquake happens later.
o Have approved flexible gas fittings installed for gas appliances
such as water heaters, furnaces and stoves. Many gas lines break
at their weakest point, where they are fitted to an appliance. A
flexible fitting allows for movement during earthquakes without
breaking the line. Check with your gas utility company for more
information.
o Strap your water heater to wall studs using perforated metal tape
called "strap iron" or "plumber's tape." This will keep the water
heater from toppling over in an earthquake, and also protects a
large supply of drinking water you may need after the quake.
There are also many ways to avoid fires after an earthquake.
o Use a flashlight to inspect for damage. After an earthquake, more
people die in residential fires caused by using candles during a
power outage than from the actual earthquake itself.
o Avoid turning light switches on or off. A small spark inside the
switch can touch off a fire due to leaking gas.
o Sniff for leaking gas. If you smell gas, open windows if you can,
and get out of the building/house. Call the gas company and fire
department from someone else's home. If you do not smell gas, do
not turn the gas off. You will need it for cooking and heating.
For additional information on earthquake safety and protective
measures that you can take before a quake happens, call the American
Red Cross chapter in your area and/or the National Fire Prevention
Association (NFPA) at 617-770-3000, fax to 617-770-0700, or E-mail at
library@nfpa.org.
+---------------------------------------------------------+
| You can send your comments and questions regarding this |
| story by sending it to safety.security@cancomm.com |
+---------------------------------------------------------+
----------*----------
IX.
Editor's Last Say:
Is Your Garbage Worth Protecting?
There are those who believe that because everyone has the right to
public information that safeguards are not needed to protect it.
However, the other day, when I went to renew my vehicle plates, the
girl at the DMV handed me some folded papers and instructed me to take
my own waste paper home and dispose of it.
Thinking this a bit odd, I promptly asked her why couldn't she
dispose of it here, behind the counter. She told me something that I
already knew, but hadn't thought of at that moment. She said that
recently, on several occassions, people from the bureau had
encountered people going through their trash dumpsters. She said that
they were obviously looking for papers with peoples' Social Security
Numbers, names, and birthdays on them. When I asked if they had called
the police about it at the time, she said there was nothing they could
do about it, these materials were no longer theirs to protect once
they placed them in the garbage.
Do you think about the important kinds of information you frequently
dispose of in your trash can? Could someone be freely looking through
your garbage without your knowledge? --Al Colombo
+----------------------------------------------------+
| Send your comments and questions to the author of |
| this story. Send it to safety.security@cancomm.com |
+----------------------------------------------------+
----------*----------
X.
EndNotes:
S&S Magazine
E-mail Addresses
Allan B. Colombo
Editor
al.colombo@cancomm.com
http://web.raex.com/~colombo/
Ron Nelson
Co-Editor
ron@topservice.com
http://ourworld.compuserve.com/homepages/ren_productions/
Nick Markowitz
Contributing Writer
nmarkow125@aol.com
John Bailey
Contributing Writer
http://ourworld.compuserve.com/homepages/task_force/
task_force@compuserve.com
-----+-----
View On The Web:
Safety & Security Home Page
http://ourworld.compuserve.com/homepages/acolombo/
Safety & Security Depository
http://ourworld.compuserve.com/homepages/acolombo/backissu.htm
-----+-----
Bulletin Boards:
CompuServe Information Systems Forums:
TWCRIME, AARPFORUM, TWDWELL, EWCFORUM, SafetyNet
Canton Communications (CanComm)
Canton, Ohio
Online: 330-477-4504
Voice: 330-477-3080
-----+-----
Subscription Information:
To subscribe to the ASCii version of the Safety & Security
[electronic] Magazine, send an E-mail message with the word SUBSCRIBE
in the message text to ccmag-request@cancomm.com. To unsubscribe, send
an E-mail message to the same address with the word UNSUBSCRIBE in the
message text area to the same address.
-----+-----
Disclaimer
The information and tips contained in the Safety & Security
Magazine is meant for entertainment purposes only. The
authors cannot guarantee the personal safety and well
being of those who read and use the information herein.
Copyright(c)1997
Safety & Security Magazine
safety.security@cancomm.com
P.O. Box 30076
East Canton, Ohio 44730
Phone: 330-488-1119
Great to see this collection of Safety & Security Magazines on your blog, Nick. Thanks for sharing them. Al
ReplyDelete