Pages

Sunday, April 14, 2013

Several Old Safety and Security Magazines I helped produce in 90's

 EDITORS NOTE :   These are copy's of the Safety & Security Magazine myself and others help put on the Internet on a monthly basis for a couple years  in 1990's before high speed internet when most connections where dial up Via old analog land lines on  2400 baud then 36000 baud and finally 56K baud modems
DSL was just starting and limited where available and   Cable Modems, FIOS etc where not yet available    it arrived via CompuServe, Prodigy  AOL or BBS  and had to be unzipped using a program like PK Zip  to be read  . If you where fortunate to have high speed internet you had an ISDN or T1 line or 36K serial line at your business or library you where using.


PLEASE NOTE MANY PHONE NUMBERS, EMAILS  AND ADDRESSES ETC. ARE NO LONGER ACTIVE OR AVAILABLE  Most have retired and moved and unfortunately we lost Ron Nelson to the lord a few years ago  THIS IS FOR HISTORIC RESEARCH ONLY

BUT PLEASE ENJOY THE CONTENT AND HOW THINGS HAVE CHANGE
THE WORDS I TOLD YOU SO COME TO MIND IN MANY OF THE ARTICLES YOU WILL READ.


From 71552.1031@CompuServe.COM  Mon Oct 28 21:24:21 1996
Return-Path: 71552.1031@CompuServe.COM
Received: from dub-img-4.compuserve.com (dub-img-4.compuserve.com [149.174.206.134]) by emin22.mail.aol.com (8.6.12/8.6.12) with ESMTP id VAA05759 for <NMarkow125@aol.com>; Mon, 28 Oct 1996 21:24:09 -0500
Received: by dub-img-4.compuserve.com (8.6.10/5.950515)
    id VAA28080; Mon, 28 Oct 1996 21:19:00 -0500
Date: 28 Oct 96 21:16:37 EST
From: "Allan B. Colombo" <71552.1031@CompuServe.COM>
To: Shawn Arbogast <sma1os@wizard.stark.k12.oh.us>
Cc: Nick Markowitz <NMarkow125@aol.com>,
        Laura Quarantiello/SL <73733.1653@CompuServe.COM>
Subject: November magazine, in ascii
Message-ID: <961029021636_71552.1031_EHL161-2@CompuServe.COM>



    +--------------+ +--------------------------+ +--------------+
    +---+          | |    Safety & Security     | |          +---+
        +--+       | |         Magazine         | |       +--+
           +--+    | |                          | |    +--+
              +--+ | |   Carroll Publications   | | +--+
                 +-+ +--------------------------+ +-+



    ===============================================================
    Volume 2, Issue 11  (c)1996 Carroll Publications  November 1996
    ===============================================================

        Each month you'll find helpful and informative articles
           on topics related to safety and security at home,
                 at work, and while traveling, in the
               Safety & Security [electronic] Magazine.


                         +-------------------+
                         | Table of Contents |
                         +-------------------+


   I. Editor's Say: On the Victimization of Seniors
  II. Personal Protection: Crime Prevention for Seniors
 III. Food Safety: Let's Talk Turkey
  IV. In the News: Neither Rain nor Sleet nor Threat of Crime...,
         Passenger-Side Air Bags, Big Business in Fake IDs, Plastic
         Vent Pipe Can Catch Fire, Is Violent Crime Falling, NFPA
         Launches Community Fire Safety Spots
   V. The Mail: Police Radar Link To Cancer, Safety & Security
         Magazine, Telephone Taps, Prevent Identity Impersonation, Gun
         Ownership and Personal Safety
  VI. Scams: High-Tech Con Games
 VII. Alarm Systems: False Alarm Prevention
VIII. Law Enforcement: The Creation of the National DNA Index System
  IX. S&S Update: Stop Bathroom Stall Thieves
  XI. Editor's Last Say: How to view past crime prevention stories
   X. Endnotes: E-mail addresses, View on the Web, Bulletin Boards,
                   and Disclaimer.

              --------------------**--------------------
                                  I.
                             Editor's Say:

                     The Victimization of Seniors
                          and Other Readings


  Today, 13% of the U.S. population is over 60 years old. By the year
2020, the number of elderly in the United States is expected to reach
52 million, or one in every five people. The number of people in the
65-to-74 age group is decreasing as the number of people over 75
increases, says Eleanor Chelimsky, Assistant Comptroller General,
Program Evaluation and Methodology Division of the U.S. General
Accounting Office. These numbers are significant because people
inherently become more prone to violence and chronic disease as they
get older.

  Recently, a series of violent attacks against elderly women in Fort
Collins, CO, perpetrated by a 20-to-30 year-old man, forced 20,000
senior adults who live there to rethink the way they live. Up until
recently, most of them rarely locked their doors, and I am sure that
most of them now have changed how they answer the door.

  In each of the rapes and assaults that have recently taken place in
Ft. Collins, the assailant had gained access to the victim's home by
talking his way inside. In several cases he was even bold enough to
park his vehicle in the victim's driveway.

  The first incident took place in February, 1996. It involved the
rape of an 85-year-old woman. In late June and early July two more 70-
year-old women were assaulted in their homes, this time the assailant
did not rape them. Then, in late July, two more elderly women were
attacked.

  To help the elderly citizens of Fort Collins protect themselves,
Fort Collins' police are busy conducting crime prevention/safety
seminars. Hopefully these seminars will educate Fort Collins' citizens
well enough in basic crime prevention that there will be no more
repeat offenses.

Take The Time To Learn
Basic Crime Prevention

  No one, least of all the elderly, should suffer the violence of
rape, assault or murder. In previous issues of the Safety & Security
[electronic] Magazine, the staff have written numerous articles
designed to help you avoid becoming a victim in your own home. In
"Identify Your Callers," in the July, 1996 issue, I discussed how to
verify the identity of your callers without opening your door. The
value of having a through-the-door peep hole lens, video/intercom
system, or a window, positioned in the right spot, were also pointed
out.

  This month, Laura Quarantiello, Contributing Writer, offers
additional insights on how you can avoid being victimized. Ron Nelson
also offers numerous tips on how to cook safe this Thanksgiving in his
story, "Let's Talk Turkey." In addition, he provides helpful
information on how you can prevent false alarms. Nick Markowitz also
offers some interesting insights into popular scams.  

Other Readings
This Month

  In our Food-Safety corner this month, Ron Nelson, Co-Editor, talks
turkey. In his story, "Let's Talk Turkey," he offers sound advice on
how to safely prepare and cook this year's Thanksgiving bird. There
really is a difference in how you prepare a fresh bird to that of a
frozen bird. He covers all the bases from the preliminary preparations
to serving the big bird on your best silver.

  Nelson also offers false-alarm helps in his story "False Alarm
Prevention." This is a must-read for those who have an electronic
alarm system that experience a false alarm now and then. Because
"false alarms" are probably the single most challenging problem that
law enforcement agencies face today, the ideas and information that
Nelson presents in this article will help you eliminate your own false
alarm woes. After you have read this article, Ron Nelson, as any of
the authors, can always be reached via E-mail for further information
and answers to your questions (see End Note for the authors' E-mail
addresses).

  Nick Markowitz, Contributing Writer, also offers sound advice on how
to avoid high-tech crimes. From credit card application fraud to
satellite communications trickery, he presents a number of current-
running scams to be aware of. Do not miss this very-important story on
scam artists.

  In addition, in "The Creation of the National DNA Index System," you
will learn about the Justice Department's efforts to establish a
national DNA database (NDIS) that will include the DNA prints,
picture, and criminal records of more than 250,000 felons nationwide.
The NDIS is expected to greatly speed up the time it takes to
establish positive DNA matches of known convicted felons. 

  And, do not forget our two most-recent departments: "In The News"
and "S&S Update."  --Al Colombo
   
              --------------------**--------------------
                                  II.
                         Personal Protection:

                     Crime Prevention for Seniors


Laura Quarantiello

  Victims are always targets first, and to a criminal looking to score
some quick cash or goods, the best targets are those who appear to
present the least resistance. Senior citizens often fit the victim
profile simply because they are perceived as weak and helpless, and
therefore open to all types of victimization. This stereotype of the
defenseless senior has done more to put the fear of crime into elderly
Americans than the actual percentage of occurrences warrant.[1]
Nevertheless, whether you are a senior citizen yourself or you know
one, there are several important steps that can be taken to close gaps
that make seniors vulnerable.

  Since seniors often live alone, the homefront becomes a potential
weak point. Salesmen, gardeners and repairmen all become possible
threats. Never admit any of these people into your home. If at all
possible, do not even open the door to them when you are alone. If you
have scheduled a visit, be sure to have a friend or relative come by
to be with you during this time. Criminals have been known to use
repair ruses to case homes and to carry out attacks or thefts. If you
are a senior alone and are concerned about a persistent salesmen,
unexpected repairman or other visitor, do not hesitate to call the
police.

  Seniors are particularly vulnerable to telephone fraud. Make it a
point never to buy anything from anyone over the phone. And, as a
general rule, never give out any personal information to anyone you do
not know over the phone. Especially do not tell anyone who calls that
you are alone. An answering machine can be your best friend in
combatting phone related crimes. Most salespeople will not leave
messages, freeing you from having to talk to them, and criminals will
not have a chance to get information from you. When you record an
answering machine message, say "We're not available to take your call
at the moment."  Do not say "I" and do not say that you are not home. 
Give the impression that you live with someone and that you are
screening calls.

  On the street, senior citizens can become quick targets. It is not
unusual for older citizens to wait at bus stops or walk carrying
packages. Always be alert to your surroundings and keep a distance of
several feet between you and anyone else that stands at a bus stop. 
Be especially careful of groups of people approaching or of vehicles
that may slow down near you. Stand away from the curb and in an area
visible to passing traffic. When carrying packages, never carry so
many that you fail to have one hand free. When you are burdened with
bundles, you are particularly vulnerable to assault.

  Crime affects us all, regardless of age. A twenty-year-old can be
just as vulnerable as an 80-year-old. Why does a criminal pick one
person over another? It is the age-old predator's tactic of selecting
the weakest member of the herd for attack. Criminals often look for
those who appear sick, weak, confused, distracted, non-attentive, or
pre-occupied. These are prime attributes for a target and they give
the criminal what he most wants: an easy hit. Seniors, like all of us,
must learn to present an aura of awareness, of readiness for action.
This applies to personal safety and to other forms of crime
prevention, too. The steps you take to protect your home, vehicle and
property tells a criminal whether you are a victim just waiting to be
victimized or a hard target.

  Senior citizens do not have to fear crime if they take proactive
steps against it. All seniors should contact their local police
department and request a home security check. A law enforcement
officer or crime prevention specialist will come out and do a site
survey of your home, telling you where your weak points are and
showing you how to better protect yourself from crime. Seniors should
also take advantage of any personal safety classes offered in their
area. Victims are always targets first... learn how to become a bad
target.
    
                                Endnote

 [1] Bureau of Justice Statistics' "Sourcebook of Criminal Justice
     Statistics 1994", lists the estimated rate (per 1,000 persons in
     each age group) of personal victimization for all personal crimes
     at 18.3% for persons age 50-64 and 7.8% for persons age 65 and
     older. In comparison, persons age 12-15 have the highest rate of
     victimization at 125.2%.

+--------------------------------------------------------------------+
| Laura Quarantiello is the author of  the new book "Cyber Crime:    |
| How You Can Protect Yourself from Computer Criminals" (LimeLight   |
| Books, distributors order line 1-800-507-BOOK). She has been       |
| published in numerous law enforcement publications and is on the   |
| board of the Law Enforcement Communication Network. Quarantiello   |
| also co-hosts a weekly informal crime prevention conference every  |
| Monday night on CompuServe's Crime Forum(GO TWCRIME). --Al Colombo |
+--------------------------------------------------------------------+

              --------------------**--------------------
                                 III.
                             Food Safety:

                           Let's Talk Turkey

Ron Nelson

  With the holiday season soon upon us, most of us are looking forward
to the traditional turkey dinner with all the fixings; but, unless you
exercise care, that turkey can cause serious illness. Follow the    
following directions and safeguard your turkey day.

To Prepare Frozen Turkey-

o If you buy a frozen turkey, be sure to select one that is solidly
  frozen--showing no signs of thawing; and make your selection just
  before going to the check out counter.

o As soon as you arrive home, place it immediately in your freezer
  where it will keep for up to 1 year if stored at a temperature of 0
  degrees F. or below.
 
o DO NOT LEAVE THE TURKEY ON THE COUNTER TO DEFROST. This can cause
  bacteria to grow to dangerous levels; bacteria that can cause
  illness. To properly thaw your turkey, place it in a pan inside the
  refrigerator and let it defrost there. An 8- to 12-pound whole
  turkey will take approximately 1 to 2 days. A 20- to 24-pound bird
  can take 4 to 5 days to thaw.

To Prepare Fresh Turkey-

o If fresh turkey is your choice, then you should buy it one or two
  days before you plan to cook it.
 
o Be sure to check the sell-by date on the turkey to make sure it is
  still fresh.

How to Cook Mr. Turkey

o When you are ready to begin cooking, remove the turkey from its
  wrapper and remove the neck and giblets, if any, from the cavity,
 
o Be careful to wash both the inside and outside of the turkey with
  cold water and drain. To minimize the spread of bacteria, be sure
  to wash your hands, utensils, cutting board, counter, sink and any
  surface that has come into contact with the turkey.
 
Now the Stuffing

o Do not use the same dish rags and towels that was used during the
  clean-up operation for anything else until they have been washed.
  This will prevent the spread of any bacteria remaining.
 
o Now prepare your favorite stuffing and place the turkey in the oven
  and cook it until the meat thermometer, inserted into the thickest
  area of the bird, reads 185 F. Cooking time will vary depending on
  the oven, whether the turkey is stuffed, and the cooking technique
  used. But you can expect an 8- to 12-pound, stuffed bird to take 3-
  1/2 to 4-1/2 hours and 6-1/2 to 7 hours for a 20- to 24-pound,
  stuffed turkey.
 
o When done cooking, place the bird on the counter, loosely covered,
  for about 20 minutes to ease carving.

Now enjoy Mr. Turkey!

 +-------------------------------------------------------------------+
 | Editor's Note:  For additional information try the following web  |
 |    sites: US Consumer catalog- pueblo.gsa.gov/catalog.htm         |
 |           Butterball home page- butterball.com                    |
 |           Honey Suckle home page- honeysucklewhite.com            |
 |    Also, if you have access to CompuServe, download the file      |
 |    Talkturk.txt. This file contains the complete text of the USDA |
 |    Home and Garden Bulletin, No. 243, "Talking Turkey," written   |
 |    by Laura Fox. Happy Holidays to everyone! --Ron Nelson         |
 +-------------------------------------------------------------------+

              --------------------**--------------------
                                  IV.
                             In The News:

Neither Rain nor Sleet
nor Threat of Crime...

  Postal Service carriers from New Orleans to Los Angeles are
facing more than just barking dogs on their appointed rounds these
days. On the first and third of each month, when Social Security and
welfare checks are delivered, carriers don flak jackets and clip
pepper spray to their belts in anticipation of attack as they travel
door to door in crime-infested neighborhoods. Postal carriers are the
new targets of criminals looking to get their hands on checks, which
they cash using false identification. 

  Los Angeles Postal Inspector Pamela Prince told USA TODAY that "our
carriers have been pistol-whipped, knocked unconscious, beaten with a
pipe, stabbed, sprayed with pepper spray and had their hands tied
behind their backs."


    +--------------+ +--------------------------+ +--------------+
    +---+          | |    Safety & Security     | |          +---+
        +--+       | |         Magazine         | |       +--+
           +--+    | |                          | |    +--+
              +--+ | |   Carroll Publications   | | +--+
                 +-+ +--------------------------+ +-+



    ==============================================================
    Volume 2, Issue 10  (c)1996 Carroll Publications  October 1996
    ==============================================================

       Each month you will find helpful and informative articles
           on topics related to safety and security at home,
                 at work, and while traveling, in the
               Safety & Security [electronic] Magazine.


                         +-------------------+
                         | Table of Contents |
                         +-------------------+


   I. Editor's Say: On Personal Privacy
  II. Identity Fraud: Prevent Identity Impersonation
 III. Alarm Systems: The Mysterious World of Passive Infrared
                   Detectors (PIRs)
  IV. In The News: GPS Fails Hiker, Thief Sues Careless Gun Owner,
                   Court to Rule on Brady, Criminal Justice 1997
                   Appropriations.
   V. The Mail: Terrorism Correction, Reader liked "terrorism" and
                   "roving wiretap" articles, Comments on gun-carry
                   laws.
  VI. Child Safety & Regulation: Refrigerator Disposal Safety
 VII. Gun Legislation: Two Years With Brady
VIII. Fire Prevention: Home Fire Protection, Part 2
  IX. S&S Update: Partial Victory for Officer in Radar-Cancer Claim,
                   Meter-Reader Bill Passes Senate Committee
   X. Editor's Last Say: Come visit our new homepage!
  XI. Endnotes: E-mail addresses, View on the Web, Bulletin Boards,
                   and Disclaimer.

              --------------------**--------------------
                                  I.
                             Editor's Say:

                                  On
                           Personal Privacy


               -----------------------------------------
                 Privacy and personal safety are close
                 cousins. One depends upon the other.
               -----------------------------------------


  Just the other day I was searching the Internet's World Wide Web for
the home page of a nearby city. I found the home page easily enough,
but I also found a link that I was not expecting: a link to city
business licenses. A simple mouse click and across my screen scrolled
an alphabetized list of business license information, searchable by
business name, owner name, address, street or phone number. What is so
shocking about online accessible business licenses? The fact that the
home addresses of the owners were listed, too.

     Now, you can tell me that these licenses are public record,
available for viewing at city hall by anyone. You can also tell me
that this has been the case for many years. But what you cannot tell
me is why information like this needs to be "broadcast" on the
Internet for access by anyone, anywhere, anytime. I can be in Newark
or Namibia and just by pointing my Internet browser to the appropriate
spot, I can search business licenses thousands of miles away. No need
to fly to your town and visit city hall, no need to make a formal
request. Just point and click and if you have got a business license,
I have got access to your home address.

  What is wrong with this, you ask? Well, if you are like many people,
your address may be unlisted and your phone number, too. You probably
feel pretty safe, knowing that no one can get this information unless
you specifically give it out. But what about that business license?
Did you know that your home address appears there and did you know
that it is available through the Internet, to anyone, anywhere? The
world just grew a little smaller, didn't it?

  The age of information and technology is a fascinating and exciting
time to be living in, there is no doubt about that. But it is also a
time where our privacy has become a tenuous thing. The technology
explosion and the free flow of information have opened up pipelines of
access, making private information about you easier to discover.

  Did you know that CD-ROM's containing the data from telephone books
nationwide are hot sellers at computer stores? Did you know that the
46-MHz., cordless telephone that gives you so much freedom to roam
around the house can be overheard by a scanner radio available for
less than $100 at any electronics store, or that the cellular phone in
your car can also be overheard easily in the same manner? And you were
more worried about possible government wiretaps. The reality is, our
safety and security are affected today, right this minute, by privacy
concerns far more likely than anything the government may rule into
being.

  The protection of our individual personal privacy usually is not
high on the list of crime concerns for the average person. We are more
concerned with violent crimes like robbery, assault, rape and related
offenses. After all, these are the crimes that make the headlines; the
headlines that frighten us and push us to bar our doors, purchase
handguns and live in a state of fear, waiting for our number to come
up.

  For many, privacy is secondary because it just is not scary enough.
Unfortunately, however, we do need to add privacy to our list, because
the information about you that a criminal can lay his hands on may
increase the odds that you will fall victim to crime. Of course, there
is no way to completely sanitize your life, unless you become a hermit
living in the desert, but there are ways to reduce the outflow of
personal information. Here is are some steps you can take today to
make your life safer:
   
1) Obtain a post office box and use that address, if possible, for any
   correspondence. Driver's licenses, business and professional
   licenses, bills, etc., should all depict a post office box.

2) Remove your name (even if it is just a last name) from your
   mailbox. Display only the address. Do the same for any letters you
   write. If you cannot use your P.O. Box, at least leave your name
   off the return address. Do not make it easy for the bad guys to
   target you.

3) Obtain an unlisted telephone number, or have your address removed
   from your phone book listing. Use your first and middle initials
   along with your last name.

4) Refuse to acknowledge who you are to phone solicitors. When someone
   calls asking for you, immediately ask who is calling. Divulge
   nothing unless you are absolutely sure of who is on the other end.

5) Never use a conventional cordless telephone. If you must have the
   convenience of a cordless telephone, purchase a 900-MHz., digital,
   spread-spectrum model. These cannot be easily overheard. The same
   goes for cellular telephones. Until digital cell phones come into
   widespread use, be very careful what you say and always remember
   that a cell phone is a radio transmitter that anyone can intercept.
   Never give out personal information over them, ever! Wait until you
   can find and use a wire-connected phone (one whose handset is
   hardwired to the base, with the base hardwired to the wall.)

  These tips are by no means complete, so always be on the look out
for ways in which your personal privacy can be affected. For instance,
I was waiting in line at the video store the other day and the
conversation between the customer ahead of me and the clerk went
something like this:

   Clerk: You're Jane Doe?
Customer: Yes.
   Clerk: And you live at 1234 State Place?
Customer: Yes.

  Okay, so the clerk was just confirming that the person in front of
them was the same person who held a video store membership.
Regardless, I now had this lady's name and address. What can I do with
it? I do not know, I am not a criminal. All the customer had to do was
silently show the clerk her driver's license. That would have
confirmed the information without the entire store finding out her
personal information.

My point is, we protect ourselves in many ways every day, but we
seldom spend much time or thought protecting our privacy. But, privacy
and personal safety are close cousins. One depends upon the other.
Look around you, what can you do today to ensure your personal
privacy?   --Laura Quarantiello

              --------------------**--------------------
                                  II.
                            Identity Fraud

                                Prevent
                        Identity Impersonation


Al Colombo

  Arnold and Rose recently received a credit card bill for more than
$5,000. Shortly thereafter, a second bill arrived from another credit
card company in excess of $3,500. Yet, Arnold and Rose live a modest
life in a rural community in a small home. Arnold claims that neither
he or his wife made any of the purchases on either of the credit
statements. This family was victimized by an "identity thief."

  An "identity thief" is someone who assumes the identity of another
individual. Many times they do this in order to obtain credit through
someone else's name so they can make purchases without paying for
them. In this case, the "identity thief" used Arnold's name, place of
employment, and social security number to obtain two credit cards
without Arnold's knowledge.

  Identity fraud is fast becoming one of the most serious crimes of
this decade. In fact, according to Eunice Moscoso, Cox News Service
Journalist, Trans Union, one of many U.S credit reporting agencies,
recently reported that more than 1,400 people contact their fraud
division each day concerning credit theft.

  The manner in which these criminals obtain credit in other peoples'
names is not all that complicated or difficult. This is because of the
interchange of data that exits between many of today's databases.
Often, by simply obtaining a social security number or a license plate
number, an "identity thief" is able to assume someone's identity. Once
one or both of these facts are known, the perpetrator can obtain
almost anything else they need to submit a credit application.


How to Protect
Your Identity

  There are several things that people can do to safeguard their
identity and existing sources of credit. The most important first step
is to treat your social security number as if it is privileged
information. Guard it and keep it secret from as many people as
possible for this is a major piece of the identity-fraud puzzle that
someone needs to know when they intend to impersonate someone else.

  Protecting your social security number is not always easy to do,
considering the fact that sales clerks commonly request it before they
will allow you to pay for a purchase with a check. In this case, tell
them that you would rather keep your social security number private.
Ask them what other kind of identification that you can provide that
will serve the same purpose.

  Store clerks will also ask to see your drivers license. Be aware
that your social security number is often a matter of public record in
this regard. In some states, it is even included on the face of the
drivers license. If this is the case in the state where you reside,
consider holding your drivers license for them, placing your thumb
over the spot where your social security number is printed. Again,
indicate to them that you are serious about safe guarding your social
security number.

  To further protect your social security number, when you renew your
drivers license, ask the state attendant whether your social security
number is optional where you live. In many states, like Ohio, giving
this information is entirely up to the applicant and may not be
necessary for issuance. In this case, your social security number will
remain safe because it is not a matter of public record with the DMV
(Department of Motor Vehicles). In addition, it will no longer appear
on the face of your drivers license.

  You should also, like so many people are doing these days, refrain
from having your social security number printed on the front of your
bank checks. Remember, you should do everything in your power to avoid
giving anyone your social security number. This is privileged
information that not everyone should be allowed to have.

Protecting Existing
Credit Information

  Some identify impersonators do not have to go to great extremes to
establish the identity of their victims. This is especially true when
the victim carelessly allows valuable personal information to lay
about for someone to see. Nowhere is this as true as it is in retail
stores. Here, clerks carelessly dispose of carbon credit transaction
slips by throwing them in the trash. Consumers share in the blame for
this kind of crime because they do not ask the clerks for their carbon
copy before leaving.

  Armed with the credit information displayed on a carbon credit
transaction slip, which can be obtained from the trash bin out back
of the retail store, all the criminal has to do is solicit the credit
card company for a new card, under the pretenses that the original
card was lost.

  ATM (automatic teller machine) receipts are no less important and
should be retained after a transaction has taken place. The
information contained on these slips of paper can be used by
knowledgeable thieves to electronically steal funds from existing
savings and checking accounts. The same information can help the
criminal perform debit purchases as well. This is especially true of
high-tech thieves who have their own magnetic card-making equipment.

  Likewise dangerous are the pre-approved credit card offers that
people receive in the mail. If you are not interested in one of these
offers, do not throw it in the trash without first cutting the card up
into little pieces. If you have a fireplace in your home, a sealed
fireplace preferably, you might even consider burning these slivers of
paper and plastic so there is no possible way for them to fall into
the wrong hands.

Avoid Over-The-Phone
Credit Transactions

  People with existing credit should also avoid making purchases over
the telephone where they have to give their credit card number and
social security number over the telephone. In most cases of over-the-
phone credit fraud, it is the mail order clerk on the other end of the
telephone that will misuse the information imparted in this manner.
This not only relies on the honesty of the mail order clerk, but It is
quite possible for a criminal to "bug" the telephone of an intended
victim to obtain important facts about them. In most cases they do
this by connecting a telephone tap to their telephone line with a
self-starting/stopping tape recorder that records everything that
is said on that telephone line.

  In this case, the telephone "bug" intercepts each conversation,
initiating the operation of a tape recorder attached to the bug.
Although bugging can be done at the premises, and routinely is, the
safest way for this to be done is to attach this equipment to the
suspect telephone line at another location along the wire path. A
typical telephone line will appear at many outside connection boxes
along the way to the victim's home or business. In most cases, the
criminal is able to plant the bug and a miniature, slow-speed tape
recorder inside a telephone cabinet at the premises or inside a phone
connection pedestal, away from the eyes of the intended victim.

  If you suspect that your telephone is tapped outside your home or
business, call the telephone company and they will check your outside
wiring. If you suspect that the tap/bug is located on the inside,
there is no way other way to find it other than hiring a professional
counter-surveillance expert to debug your telephones. Although a
visual check can reveal the existence of a phone bug, it usually
requires a trained eye to know what to look for.

              --------------------**--------------------
                                 III.
                            Alarm Systems:

                    The Mysterious World of Passive
                       Infrared Detectors (PIRs)

Ron Nelson

  PIRs are the most common motion detector used by security companies
today for interior use. But what is a PIR, how does it work, and
should they be part of your security system? Good questions, read on
for the inside scoop on PIRs.

  PIR detectors are electronic devices that detect an intruder by
sensing his body heat when he enters or moves around the area of
protection. The device consists of a mirror or lens that can focus the
energy, a thermal sensor to detect the energy, and associated
electronics to analyze the information. The area that a unit can
protect is usually given in feet representing the length and width of
its pattern, such as 35 X 35 feet. or 150 X 8 feet.

  The mirror/lens divides the area of coverage into multiple zones of
detection. This can be visualized by holding your hand out and
spreading your fingers. Each finger represents one optic zone of the
detector. An actual PIR detector actually uses much more than 5 zones
of detection, and some models can detect motion up to 200 feet from
the unit. The PIR can only detect motion within one of its zones and
is most sensitive to motion across the zones since this is what causes
the greatest change in energy.

  Many manufacturers make a selection of lens or mirrors for the
detector so that the area of coverage can be changed by simply
replacing the optics. This is particularly helpful if you decide to
get a pet after your security system has been installed. Another
feature of the mirror/lens is that you can mask, block out, any
segment that may cause a problem by covering it with the tape supplied
by the manufacturer. For example, if there is a radiator within one of
the protected zones, you can place the tape on that segment and by
doing so prevent it from causing a false alarm.

  The thermal sensor used in today's PIRs is actually two or four
sensors in a single unit. The two-element device, which is commonly
called a Dual PIR, divides each zone into two distinct, side-by-side
detection areas. A person moving will first activate one of these
sensors and then the other. This allows the PIR to reject alarms that
originate from heated surfaces or even RF interference, since motion
is detected simultaneously by both elements.

  A four-element device, which is commonly called a Quad PIR, further
divides the zones into an upper and lower area. This allows the unit
to compare the signals received, further reducing the possibility of
false alarms.

  PIRs incorporate additional features that help to minimize false
alarms, such as white-light filters and pulse-count circuits. The
white-light filters, for example, prevent the device from falsing
(false alarming) when exposed to a source of direct light where the
pulse-count circuit tells the unit not to activate unless it detects
motion multiple times in rapid succession.

  Some PIRs have a special Pet Alley lens that prevents them from
detecting motion near the floor. This option can allow your pet to
roam the area when the system is on, as long as it does not jump or
climb on something inside the detection area.

  Proper PIR placement is essential for good protection and false
alarm-free operation. Consider the following guidelines when using PIR
detectors:

o Match the PIR to the area. Using a unit that has a 100-foot range in
  a twenty foot room can cause false alarms.

o Do not mount the unit facing windows or any source of rapidly-
  changing heat or cold air.

o Seal all openings into the unit to prevent insects and drafts from
  entering the unit and causing false alarms.

o Mount the unit so that an intruder will have to walk across the
  detection pattern, rather than towards the detector.

o If using a Pet Alley lens, carefully examine the room to ensure that
  the pet cannot climb high enough to activate the unit.

o Be careful with mylar balloons and other hanging objects. A PIR is
  capable of detecting them when they are within the detection area
  and if they can move when the air is turbulent.

o Mask any zones that may cause false alarms.

o Last but certainly not least carefully walk test each unit to
  accurately determine the area of coverage.

              --------------------**--------------------
                                  IV.
                             In The News:


Global Positioning
System Fails Hiker

  The Global Positioning System (GPS) failed Michael Rego of Hooksett,
N.H., August 24th as he hiked up a mountainside in New Hampshire.
Rego, who carried a cellular telephone and GPS positioning unit,
became lost after his GPS unit failed. The problem was his, however,
and not the GPS unit or the GPS network--for the batteries went dead
and he failed to bring fresh sets along with him.

  Without a fresh set of batteries, all Rego could do was dial up
mother on his cellular telephone and ask for help. But, soon after
that, according to newspaper accounts, the batteries in Rego's
cellular telephone went dead. Not having an extra set of batteries
for his cellular, he was forced to use his nose to hike his way out of
the wilds. He used the position of the newday's sun, managing to hike
his way back to civilization on August, 25th.

  The GPS satellite network is commonly used to establish the
longitude and latitude of people, places and things. It is used by
surveyors, U.S. Coast Guard, Army Corps of Engineers, U.S. military,
civilian groups and a host of others. At the center of this technology
are 24 earth-orbiting satellites that belong to the U.S. Department of
Defense (DOD).

  At first, use of the GPS was restricted to only military personnel.
It's primary use was to establish the position of fighting troops and
war machines--anywhere on the face of the earth, in the water, or in
the air. After the introduction of an enhanced version of GPS, called
the Differential Global Positioning System (DGPS), a committee was
assembled to study the possibility of making GPS technology available
to civilians.

  Because of the recommendations of this committee, civilian access to
the GPS was finally made possible. Now, ordinary citizens can use the
GPS to track wild animals; identify and locate civilian aircraft; find
lost or stolen vehicles; keep tabs on company vehicles (including
speed); determine their own location when hiking; find their way
through urban, suburban and rural streets; and study the moanings and
groanings inside the crust of the earth. DGPS brought the accuracy of
the GPS up from 100 meters to mere millimeters.

  The moral of this story is: be sure to take extra batteries with you
when you go hiking with a GPS tracking device and a mobile cellular
telephone.

                         ----------*----------
                                            
Judge Rules That Thieves Can
Sue Careless Gun Owners Too

  An eleven-year-old boy was accidentally shot and killed by a fourteen-
year-old high on marijuana after they and two other youths stole a
.22-cal. handgun from a pickup truck. According to Law Enforcement
News, John Jay College of Criminal Justice, New York, NY, the
fourteen-year-old was eventually convicted of negligent homicide.

  The mother of the 11-year-old youth who died subsequently sued the
four youths and the adult owner of the pickup truck and stolen
firearm. She maintained that everyone shared in the responsibility of
her son's death. The Montanna Supreme Court, however, did not agree
with her, ruling in favor of the owner of the stolen firearm.

  "While agreeing with [the boy's mother] that [the gun owner] had a
duty to the public to safeguard his firearm, the court's majority said
he was not to blame for [the boy's] death. [The firearm owner] could
not have foreseen that his truck would be burglarized, or that a boy
smoking marijuana would handle a loaded weapon found in the vehicle,
the Justices said" (Law Enforcement News, June 30, 1996).

  Although the owner of the stolen firearm was relieved of any
responsibility for the youth's death, the fact that the Montanna
Supreme Court allowed the mother of the victim to sue the owner of the
stolen gun means that thieves who are injured by carelessly stored or
even stolen firearms can sue their owners. The Justices said that
"under state law, the owner of a firearm whose use or storage of a
weapon leads to [the] injury [of another person] has long been liable
to a civil suit" (Law Enforcement News). 

                         ----------*----------

Court To Rule On Brady
Background Checks

  The court intends to rule in its next term on the legality of the
provision of the 1993 Brady Handgun Violence Prevention Act that
requires state and local law enforcement agencies to conduct
background checks. Law enforcement agencies are changeling the
constitutionality of this provision citing a clause in the Tenth
Amendment that infers that this provision of the Brady Act infringes
on the powers reserved for the states (see "Two Years With Brady" in
this issue).

  "The federal appellate courts have come to different conclusion
regarding the constitutionality of the provisions" (Justice Bulletin,
National Criminal Justice Association, Washington, D.C., July issue,
page 13).


                         ----------*----------

Criminal Justice
1997 Appropriations

  The House approved their fiscal 1997 spending bill on July 25th.,
providing nearly the same funds as the 1996 budget for criminal
justice grants. Although, at the writing of this article, the Senate
has yet to approve a final draft, the House version calls for $1.4
Million for Community Oriented Policing (COPS), $571 Million for the
Local Law Enforcement Block Grant Program, $680 Million for prison
construction grants, $500 Million for reimbursement to the states for
incarceration of criminal aliens, $145 Million for programs
administered by the Justice Department's Office of Juvenile Justice
and Delinquency Prevention (OJJDP), and $60 Million for the Byrne
discretionary program.

  The Senate version calls for a $10 Million increase in OJJDP
funding, but the agency that administers the money may have to
discontinue their current emphasis on non-institutional alternatives
for juvenile offenders. In its place, Senate would require programs
designed to prevent juvenile violence.

  According to the National Criminal Justice Association, Washington,
D.C., although S.1991, the Anti-Gang and Youth Violence Control Act of
1996, will receive the same level of funding, it is receiving very
little attention from either party in Congress. S.1991 was introduced
by Senator Joseph R. Biden Jr. (D-Del.) on behalf of the Clinton
Administration.    

              --------------------**--------------------
                                  V.
                               The Mail:

From: Ed Best, CompuServe
Subject: Terrorism, Should We Be Afraid
Issue: September, 1996

In your article: Terrorism: Should We Be Afraid, you referred to the
TWA Flight 800 and the pipe bomb explosion in Olympic Park, Atlanta as
"sites of terrorist attacks that have occurred...."  I do not
think TWA 800 or the Olympic Park Bombing have been determined to be
terrorist attacks.

I read and enjoy your magazine as I am involved in the industrial side
of safety. I have mentioned your magazine to other colleagues as a
source of good information. It is disturbing to see misinformation
being printed as your credibility is at stake, as well as mine now for
my recommendation of your magazine. When I put out information, I try
to get as many people as are willing to review it, for accuracy etc.
I am suprised your counterparts missed this also. A statement of
correction in the next issue, would be in order.

                         ----------*----------

From: Will Saylor, CompuServe
Subject: Terrorism: Should We Be Afraid
         Personal Privacy: Is Anyone Listening
Issue: September, 1996

I just reviewed the September Safety & Security Magazine. I am
impressed with Laura Quarantiello's terrorism (Terrorism: Should We Be
Afraid) and Ron Nelson's article on roving wiretap technology
(Personal Privacy: Is Anyone Listening) stories. I am Particularly
impressed with Laura's style of writing and research of topics at
hand. Overall, thought both pieces were very well researched and
balanced.

                         ----------*----------

From: Leonard Topley, P.I., CompuServe
Subject: Gun Carry Laws, The Mail
Issue: September, 1996

The police officer who, in your last issue (The Mail, September 1996),
said that as a LEO (law enforcement officer) has no problem with law
abiding citizens and that everywhere carry laws have been passed
violent crime has decreased significantly is correct.

Legal guns are not the problem. The incidents of "drunks" with guns is
a myth. Remember also the police have no legal obligation to protect
you or your family.

                         ----------*----------

From: Lloyd, CompuServe
Subject: Gun Carry Laws, The Mail
Issue: September, 1996

In Arizona, we passed a concealed carry (CC) law about 2-3 years ago.
I do not know the current figures but the last I heard, there were
30,000 to 50,000 CC permits issued. To date, there have been NO
incidents of anyone with a CC permit committing an illegal act with
their weapon. There has only been ONE incidence where a weapon owned
by a person with a CC permit was used in an illegal act: a woman with
a mental problem in a hospital grabbed the gun from her husband's pack
and shot a few rounds. Luckily she injured no one.

I do not know what the law requires in other states, but in Arizona,
to get a CC permit, you have to take (and pass) firearms classes. I
think 12 to 16 are required. And these classes are *real* classes and
you can easily flunk if you do not pay attention and do your homework.
Naturally, a background check is required to get the CC permit. I
believe the classes are $150 to $250 and a the permit costs $50.

Will there be an incident regarding one of these CC people one of
these days? I am sure there will be. Is that risk enough to make me
want to stop 99.9% of the others from carrying (legally) a concealed
weapon?  No.

                         ----------*----------


From: Dennis Novak, Compuserve
Subject: Gun Carry Laws, The Mail,
Issue: September, 1996

This seems to be the opinion of most of the officers on the line,
actually dealing with criminals (re: carrying licensed firearms).

If you are armed and confront the police, remember that they have no
idea whether you are a good guy or not, despite your white hat. Be
calm, careful, and do not startle anyone. If appropriate, let the cop
on the scene know you are armed. If you are calling in a help call, be
sure and let the officer know you are armed. He will be more careful
to avoid surprising you when he responds.


Editor's Note: E-mail is always welcome on the articles contained in
     the Safety & Security [electronic] Magazine. Direct them to
     Al Colombo at safety.security@cancomm.com.  --Al Colombo

              --------------------**--------------------
                                  VI.
                           Child Safety and
                             Regulations:

                     Refrigerator Disposal Safety

Nick Markowitz

  It happened again. Two young brothers, playing in a wooded area,
suffocated when they became trapped inside an improperly-disposed-of
refrigerator. Once the door slammed shut, there was virtually no way
for them to open the door. So, how could the owner of this
refrigerator have avoided these two needless deaths?

  The primary way to avoid a tragedy, as well as legal action, when
disposing of a refrigerator, is to inquire of your city and state
government as to what they expect you to do. With that said, here are
some general guide lines that will help you avoid problems.

  Before disposing of an old refrigerator, either remove the door(s)   
completely or chain and padlock it closed. You can also block it   
open or permanently close it in a matter that children cannot   
open it. Removing the door, however, is the preferred method.

  If you come across an improperly-disposed-of refrigerator while   
walking along a street or rural pathway, call the local police and
inform them of the hazard.

Refrigerant Disposal

  New Federal disposal rules require that the refrigerant in the
refrigerator or air conditioner unit, whether it is in a residential   
or commercial setting, be removed and reclaimed by an approved,   
licensed service technician. Failure to remove the refrigerant can   
result in a fine by the EPA (Environmental Protection Agency) of   
$25,000 and 10 years in prison. The EPA offers a reward, up to   
$10,000, to anyone who informs them of an improperly disposed-of
refrigerator and refrigerant.

  The EPA rule was brought about because it is believed that the
release of refrigerant gas, mainly freon-12, also known as cfc
(chloroflorocarbons), breaks down in the atmosphere after being
carried up to the atmosphere by tornadoes and other weather anomalies.
Once in the upper atmosphere it turns into flouric acid, an extremely
dangerous compound that is believed to destroy ozone in the
atmosphere.

  The overall affect of this chemical action is the distruction of the
earth's ozone layer. It is the ozone layer that filters out harmful
Ultraviolet (UV) rays that can cause skin cancer. Because of this the
EPA has set forth stringent rules on how freon is to be handled and
transported. Only licensed technicians are permitted to handle freon.
Individuals who are not licensed are no longer allowed to administer
freon in automobiles. Unlicensed individuals are also not to purchase
or possess freon containers.

  Special programs have been set up to handle this problem in many
communities were they pick them up in mass and recycled them at a
central location. If your community does not have such a program, you
must call and pay for a licensed freon technician to remove the gas at
a cost of about $10 to $35 a unit.

  Once the gas is removed, the technician then affixes a sticker to
the appliance verifying that the gas has been removed. He then will
take the gas he has accumulated in his recovery tank to a supply
house who forwards it to another location where it is recycled for
reused.

  Even if you are sure that the refrigerator you are getting rid of is
empty of freon you must still have a licensed technician verify that
it is. Otherwise, the rubbish company who's job it is to dispose of it
will not be able to do so; and if they do, they face severe penalties.

  Of course, the unfortunate part to all this is that it has made the
cost of servicing freon-based equipment expensive. This is because the
freon substitutes, which are safer than cfc, are less efficient. In
fact, experts say that they actually add to the global warming problem
because it takes more fossil fuel to generate the electricity
necessary to operate these appliances.

  The jury is still out on the whole matter and many articles pro and
con have been published. But regardless of the outcome, the fact is
that you, as the owner of a refrigerator or air conditioner, have to
follow the rules now set forth by the EPA, or you will surely pay the
consequences if you are caught.

              --------------------**--------------------
                                 VII.
                           Gun Legislation:

                         Two Years With Brady


                --------------------------------------
                  Is gun control really effective at
                    reducing gun-related violence?
                --------------------------------------


By Al Colombo

  The "Brady Bill" officially became the "Brady Handgun Violence
Control Act" on February 28, 1995. The Brady Act is intended to
prevent known offenders from obtaining guns through legal means.

  There are those in the law enforcement community who believe that
the federal government has no jurisdiction, according to the Tenth
Amendment, in this regard, and that mandating state and local law
enforcement agencies to conduct background checks of handgun
applicants is wrong. The primary reason for the opposition is a lack
of manpower and finances to properly execute this provision.

  The U.S. Supreme Court, for example, ruled in 1992 (New York vs.
United States) that the background-check requirement in the Brady Act
imposed an unreasonable burden on state and local law enforcement
agencies. This ruling also upheld the premise that this provision of
the Brady Act also violated the Tenth Amendment by interfering with
the duty of the Sheriff, as defined by the state of New York.

  Then, just recently, two conflicting court decisions came down from
the U.S. Court of Appeals for the Second Circuit and the U.S. Court of
Appeals for the Fifth Circuit on this Brady Act provision. On the one
hand, the Second Circuit Court ruled that the Brady background-check
provision does not violate the Tenth Amendment of the U.S.
Constitution, and on the other hand, the Fifth Circuit Court ruled
that it does.

  In the first case, Frank vs. United States, the Sheriff of Orange
County, Vt. and the CLEO (Chief Law Enforcement Officer), per the
Brady Act, challenged the constitutionality of the provision. Their
main argument was that it imposes a tremendous financial burden on the
state and its various local governments. The Second Circuit Court
based its decision on the fact that background checks fall within the
current scope of the duties of the current agencies involved.[1]

  The U.S. Court of Appeals for the Fifth Circuit, on the other hand,
ruled that the Brady Act provision that mandates background checks is
unconstitutional on the grounds that it "commandeers the legislative
processes of the states by directly compelling them to enact and
enforce a federal regulatory program," which, according to the Tenth
Amendment, is not permitted.[1] In Koog vs. United States, the elected
Sheriffs of Val Verde County, Texas, and Forrest County, Miss., sought
"declamatory and injunctive relief from the background check provision
of the Brady Act."  Their motion was made on the grounds that this
Brady Act provision violates the Tenth Amendment.[1]

Why Opposition To Brady

  Many of the law enforcement agencies affected by the Brady Act have
vigorously opposed it because they are small with limited resources.
Thus, conducting background checks puts an enormous financial burden
on these departments by way of manpower and financial resources. In
addition, Brady's federal mandate provides no funds with which to
help these agencies finance these checks.

  Early on in the debate, U.S. District Judge John Roll struck down
that part of the Brady Law that requires law enforcement agencies to
conduct background checks in Tucson, Arizona.

  "Roll issued a permanent injunction against the provision of the law
that requires local authorities to conduct background checks of
buyers. The Justice Department is considering an appeal" (Law
Enforcement News, June 30, 1994).[2]

  This ruling came about after Sheriff Richard Mack, Graham County,
Arizona, filed a lawsuit, stating that the Brady Law was
unconstitutional in the first place and that the background-checks
provision would over tax the finances of his small department.[2]

  In an effort to curb the effects of the Brady Law, the officials of
Santa Rosa County, Florida, established a county-wide militia in which
every able-bodied man, woman, and child is a member. "They say militia
members will be exempt from the law under a provision of the Second
Amendment which reads, 'A well regulated Militia, being necessary to
the security of a free State, the right of the people to keep and bear
Arms, shall not be infringed'."[2] Pennsylvania enacted a similar law
some years ago.

  Governor Walter J. Hickel, Alaska, also signed into law a bill that
allows the residents of Alaska to carry a concealed weapon. "...he
acted because of concerns expressed by citizens on their need to
protect themselves against criminals. Under the law, Alaskans will
have to obtain a permit from the State Police to carry a concealed
handgun legally. They must be at least 21 years old, pass a criminal
background check and a gun-safety course and pay a $125 fee."[2]

How Effective Is
The Brady Act?

  The Brady Act prevents known criminals from obtaining handguns by
imposing a five-day waiting period. During this five days, the state
or local law enforcement agency in that jurisdiction must conduct a
background check on the applicant.[3] If the applicant proves to be a
previously-convicted felon, their application for the purchase of a
firearm is rejected.

  The Brady Act is one of many legislated efforts designed to control
the sale and possession of firearms. As a condition of parole, for
example, past offenders are not permitted to own, carry or buy
firearms. The issue of gun ownership in general is at question as a
powerful lobby, usually referred to as the "anti-gunners," continue to
chip away at the right of U.S. citizens to own guns. This movement is
most often driven by liberal politicians and usually well-meaning
citizen groups. On the opposing side of the anti-gun-ownership issue
are the avid hunters and the NRA (National Rifle Association), which
is doing everything it can as an organization to preserve our Second
Amendment rights.

  Despite the Brady Act and numerous other programs, federal weapon
offenses have increased by 175% between 1982 and 1992. In addition,
most of the felons convicted in federal court of a firearm-related
offense have already served time in a correctional facility. Of those
convicted of a firearms-related offense, 47% were already prohibited
in some way from owning or possessing a firearm.[4]

  Is gun control really working? President Clinton recently pointed
out that, thus far, more than 60,000 known criminals have been
prevented from obtaining a handgun because of this law. Critics also
point out that many of the "criminals" referred to in this 60,000-
plus number includes those guilty of minor offenses, such as traffic
violations and unpaid parking fines. Perhaps more time is needed
before an accurate assessment of the effectiveness of the Brady Act
can be honestly performed.


                             Bibliography

[1] Two Courts At Odds Over Brady Act Constitutionality, Justice
    Bulletin, National Criminal Justice Association, Washington, D.C.,
    June, 1996.

[2] Coast-to-coast activity on gun laws, Law Enforcement News,
    published by John Jay College of Criminal Justice, June 30, 1994,
    pg. 7.

[3] Gun Control: The Brady Law's Impact, Richard Lacayo, published by
    Time, February 20, 1995, pg. 47.

[4] Federal Firearms-Related Offenses, Ken Carlson and Tanutda
    Pittayathikhun, Abt Associates Inc., published by the U.S.
    Department of Justice, Office of Justice Programs, Bureau of
    Justice Statistics, Washington, D.C., June 1995, NCJ-148950.

              --------------------**--------------------
                                 VIII.
                           Fire Prevention:

                         Home Fire Protection
                                Part 2
 
                ---------------------------------------
               The 1996 NFPA National Fire Safety Survey
                ---------------------------------------
 

Al Colombo

  When it comes to the threat of fire, people generally feel safer in
their homes. Yet, this is exactly where they are most likely to die
because of a fire. In a recent report, published by the National Fire
Protection Association (NFPA), Quincy, Mass., 53% of people queried
said that they feel safer in their own home than they do elsewhere.
The same report also revealed that 78% to 80% of all fire deaths occur
in the home.

  "People are most at risk from fire in their homes and cars, but they
feel safest at home. They are least likely to feel safe in a hotel,
but hotels are among the safest places to be, based on a comparison of
fire deaths to time of exposure" (1996 NFPA National Fire Safety
Survey, National Fire Protection Association, Quincy, Mass.).

                   Where People Feel Safe From Fire
          +=============+===============+===================+
          |  Location   |   Percentage |  No. Fire Deaths   |
          +=============+===============+===================+
          |   Home      |      53%      |     78%-80%       |
          |             |               |                   |
          |   School    |      19%      |      0%-0.2%      |
          |             |               |                   |
          |   Workplace |      14%      |      2%-4%        |
          |             |               |                   |
          |   Shopping  |       6%      |   Not Available   |
          |     Mall    |               |                   |
          |             |               |                   |
          |   Car       |       5%      |     10%-12%       |
          |             |               |                   |
          |   Hotel     |       3%      |      0%-0.5%      |
          +-------------+---------------+-------------------+
          |     1996 NFPA National Fire Safety Survey       |
          +-------------------------------------------------+

  Right or wrong, people instinctively feel safer when they are at
home. One reason, and probably the most common, is that this is where
they spend 55% to 75% of their time. At home is also where they can let
their hair down. The "Home" is the proverbial oasis of solitude and
quietness where people feel insulated and safe from the world and all
the dangers that lurk there. In summary, it is where people go to get
away from it all.
 
  Currently, according to the NFPA survey report, the most common fire
safety precaution used by people in their homes is that of smoke
detectors (93%). Others include fire extinguishers (72%), yearly
furnace inspections (63%), and monthly smoke detector tests (55%).
Although fire extinguishers are one of the most common fire safety
devices now in home use, NFPA points out that their research revealed
that most homeowners do not really know how and when to use them.

                     Common Fire-Safety Equipment
                             in U.S. Homes
                    +===============================+
                    |   Device or     | Percentage  |
                    |   Practice      |             |
                    +===============================+
                    | Smoke Detectors |    93%      |
                    |                 |             |
                    | Fire            |    72%      |
                    | Extinguishers   |             |
                    |                 |             |
                    | Annual furnace  |    63%      |
                    | Inspections     |             |
                    |                 |             |
                    | Monthly Smoke   |    55%      |
                    | Detector Tests  |             |
                    |                 |             |
                    | Annual Chimney  |    44%      |
                    | Inspections     |             |
                    |                 |             |
                    | Practiced       |    36%      |
                    | Escape Plan     |             |
                    |                 |             |
                    | Escape Ladder   |    16%      |
                    |                 |             |
                    | Automatic Fire  |     4%      |
                    | Sprinklers      |             |
                    +-----------------+-------------+
                    |    1996 NFPA National Fire    |
                    |          Safety Survey        |
                    +-------------------------------+

  "Slowly but surely," NFPA says, "automatic fire sprinklers for the
home are catching on, particularly in rental properties in the western
U.S." However, for early warning of fire, the smoke detector has
proven itself time and again as a life saver. Homeowners are still better
off adequately protecting their homes with multiple smoke detectors.

  Because so many people now have at least one smoke detector in their
homes, the number of annual fire deaths has drastically decreased.
Perhaps because of this, NFPA's survey revealed that 88% of the people
queried believe that it would be their smoke detector that would wake
them up in a fire. The next likely method is that of the actual smell
of smoke (4%).

                        What Would Wake People
                          in a Fire Situation
                    +===============================+
                    | Item To Awaken  | Percentage  |
                    |    People       |             |
                    +===============================+
                    | Smoke Detectors |    88%      |
                    |                 |             |
                    | The Smell of    |     4%      |
                    | Smoke           |             |
                    |                 |             |
                    | A Pet           |     3%      |
                    |                 |             |
                    | Noise           |     2%      |
                    |                 |             |
                    | Heat            |     1%      |
                    |                 |             |
                    | Nothing         |     1%      |
                    |                 |             |
                    | Other           |     1%      |
                    +-----------------+-------------+
                    |    1996 NFPA National Fire    |
                    |          Safety Survey        |
                    +-------------------------------+

  "The other items mentioned will do little to wake people threatened
by fire. The odor of smoke may be powerful to someone who is already
awake, but the sense of smell is weaker during sleep," NFPA says.
"Furthermore, the first effect of gases from fire is to deepen sleep,
not to wake people up."

  The truth of the matter is, people without smoke detectors usually
die from smoke inhalation, long before the heat of the fire actually
reaches them. The ordinary smoke detector is the best early-warning
means that people have that will awaken them when there is a fire. Be
sure to install at least one smoke detector on each floor of your home
and have at least one detector in each bedroom hallway.

  Another critical matter is how these smoke detectors are installed.
Many people fail to read the instruction booklet that came with their
detectors. Consequently, when they install them, they either do so too
close or not close enough to the corner of the wall and ceiling.
Although the most common range for the mounting distance of a smoke
detector is 8 to 12 inches from the corner of the wall and ceiling,
always read the installation booklet and use the recommended distance
given by the manufacturer.

      +---------------------------------------------------------+
      | Editor's Note: Watch for future articles on NFPA's fire |
      |    national survey, that will appear in the Safety &    |
      |    Security [electronic] Magazine.  --Al Colombo        |
      +---------------------------------------------------------+

              --------------------**--------------------
                                  IX.                  
                              S&S Update


Partial Victory for Officer
In Radar-Cancer Claim

  The Virginia Workers Compensation Commission, Norfolk, Va., recently
agreed to pay part of the medical expenses incurred by Frank Chappell,
a Portsmouth, Va. police officer, after he was disgnosed as having
testicular cancer. Chappell was repeatedly exposed over a 13-year
period to the low-level radiation of a traffic radar gun. As part of
this treatment, Chappell underwent the removal of his right testicle
in 1994.

  Seeking compensation for his medical bills, the Virginia Workers
Compensation Commission found reasonable evidence that Chappell's
cancer was the result of his daily exposure to a traffic radar gun,
which he held between his legs while sitting in his police car.

  According to Law Enforcement News, John Jay College of Criminal
Justice, New York, N.Y., his claim was originally refused because he
waited too long to file complaint. Chappell then filed an appeal with
the Commission, and in the mean time Portsmouth City agreed to pay the
portion of his medical expenses not covered by his health insurance.
In addition, they agreed to pay sick time for the days he lost during
his chemotherapy treatments, which were every day for more than four
months.

  Since the settlement, Chappell has filed an $11 Million civil suit
against the company who manufactured the radar unit he used everyday.

                         ----------*----------

Meter-Reader Bill
Passes Senate Committee

  Legislation pending in Pennsylvania may force utility companies to
conduct extensive criminal background checks, psychological screening
and drug testing on all prospective employees who intend to read
meters. The proposed legislation resulted after a Pennsylvania woman
was allegedly raped in her own home by a contract meter reader working
for Bermex Inc. Bermex provided meter readers to Peoples Gas Co. of
Pittsburgh under special contract.

  The bill passed the Senate Consumer Protection and Professional
Licensure Committee in late June. Before it can become law, however,
it must be heard in full chamber. The bill would require proof that
utility companies have conducted the appropriate background checks and
psychological testing. Union workers in the utility industry, however,
say that the bill falls short of protecting consumers because under
the provisions of this bill, utility companies can still hire contact
meter readers. 

              --------------------**--------------------
                                  X.
                          Editor's Last Say:

  Visit The Safety & Security [electronic] Magazine homepage on the
World Wide Web. From there you can access each of the editors' E-mail
addresses and subscribe to the magazine for E-mail delivery. Clicking
on a special link will also enable you to view the current issue of
the magazine, as well as back issues in a depository of past issues.

  Also, view additional safety-related articles, many of them written
by Al Colombo, Editor, on the "Home Safety" homepage. Both the "Safety
& Security Depository" and "Home Safety" homepages are contained on
the Osnaburg Wizard Web server; compliments of East Canton High
School, Stark County, East Canton, Ohio.

You can find us at: http://ourworld.compuserve.com/homepages/acolombo.

              --------------------**--------------------
                                  XI.
                               EndNotes:

                             S&S Magazine
                           E-mail Addresses
                                                                   
                           Allan B. Colombo
                                Editor
                    al.colombo@cancomm.com Internet

                              Ron Nelson
                               Co-Editor
                  72202.121@compuserve.com Internet.

                          Laura Quarantiello
                          Contributing Writer
                  73733.1653@compuserve.com Internet.

                            Nick Markowitz
                          Contributing Writer
                     nmarkow125@aol.com Internet.

                              -----+-----

                              On The Web:

                      Safety & Security Home Page
           http://ourworld.compuserve.com/homepages/acolombo

                     Safety & Security Depository
               http://wizard.stark.k12.oh.us/community

                              -----+-----

                           Bulletin Boards:

                    CompuServe Information Systems-
                   TWCRIME, AARP, TWDWELLINGS, SafetyNet

                    Canton Communications (CanComm)
                             Canton, Ohio
                         Online: 330-477-4504
                          Voice: 330-477-3080

                              -----+-----

                              Disclaimer

      The information and tips contained in the Safety & Security
        Magazine is meant for entertainment purposes only.  The
         authors cannot guarantee the personal safety and well
        being of those who read and use the information herein.


                     (c)1996 Carroll Publications
                      Safety & Security Magazine
                            P.O. Box 30076
                        East Canton, Ohio 44730
                          Phone: 330-488-1119 
                      safety.security@cancomm.com

From abc1os@wizard.stark.k12.oh.us  Thu Oct  9 20:36:58 1997
Return-Path: <abc1os@wizard.stark.k12.oh.us>
Received: from wizard.stark.k12.oh.us (wizard.stark.k12.oh.us [199.218.200.6])
      by mrin46.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
      with ESMTP id UAA13937 for <nmarkow125@aol.com>;
      Thu, 9 Oct 1997 20:36:07 -0400 (EDT)
Received: from LOCALNAME (208.132.38.153) by wizard.stark.k12.oh.us
 with SMTP (Eudora Internet Mail Server 1.2); Thu, 9 Oct 1997 20:34:26 +0100
X-Sender: abc1os@wizard.stark.k12.oh.us
X-Mailer: Windows Eudora Light Version 1.5.2
Mime-Version: 1.0
Content-Type: multipart/mixed; boundary="=====================_876450255==_"
To: 100336.675@compuserve.com, 72274.3147@compuserve.com,
        bshaffer@ix.netcom.com, 75667.1035@compuserve.com
From: Allan Colombo <abc1os@wizard.stark.k12.oh.us>
Subject: October issue, Safety & Security Mag
Cc: 100145.2747@compuserve.com, kken@vais.net, edualves@ism.com.br,
        nmarkow125@aol.com, 72274.3147@compuserve.com, minorj@timken.com,
        randy.mitchell@tpr.vnet.com, randy.mitchell@chrysalis.org,
        76606.1202@compuserve.com, nvestig84u@aol.com, sesecprdt@aol.com
X-Attachments: C:\PCWRITE\S&S\OCT97MAG.TXT;
Date: Thu, 9 Oct 1997 20:34:26 +0100
Message-ID: <1335693230-10872709@wizard.stark.k12.oh.us>

--=====================_876450255==_
Content-Type: text/plain; charset="us-ascii"

       Welcome to the Safety & Security Electronic Magazine Mailing List!

        The Safety & Security [electronic] Magazine is a monthly publication
that provides helpful tips and information on personal, home and workplace
safety and security. This monthly publication also includes Helpful travel-
related stories.

        There are three ways to receive the Safety & Security [electronic]
Magazine: download or view it on a BBS, download or view it on the World Wide
Web, or direct to your mailbox via E-mail.

        To subscribe, send a message to acolombo@compuserve.com with
one of the keywords, JOIN, ADD or SUBSCRIBE, in both the subject line and
body of the message text.

        To remove yourself from this mailing list, send a message to
acolombo@compuserve.com with one of the keywords, DELETE, UNSUBSCRIBE or
REMOVE, in both the subject line and body of the message text.

        If you have any problems subscribing or unsubscribing, please send an
e-mail message to safety.security@cancomm.com.

        This is a distribution mailing list only. Any messages sent to this
mailing list will not be distributed to all members. It will be sent to the
author of the S&S Magazine.

Al Colombo (safety.security@cancomm.com)


--=====================_876450255==_
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: attachment; filename="OCT97MAG.TXT"



 +-----------------+ +--------------------------+ +-----------------+
 +-+               | |                          | |               +-+
   +---+           | |    Safety & Security     | |           +---+
       +--+        | |       [electronic]       | |        +--+
          +--+     | |         Magazine         | |     +--+
             +--+  | |                          | |  +--+
                +--+ +--------------------------+ +--+

  

  ==================================================================
  Volume 3, Issue 11 (c)1997 Safety & Security Magazine October 1997
  ==================================================================

       Each month in the Safety & Security [electronic] Magazine
       you will find helpful and informative articles on topics
        related to property protection and personal safety and
            security at home, at work, and while traveling.
           


                         +-------------------+
                         | Table of Contents |
                         +-------------------+


   I. Editor's Say: Crime Prevention Month; The Power of Prevention --
         Action Makes the Difference
  II. Personal Protection: Defend Yourself From Werewolves
 III. Basic Crime Prevention: Break The Crime Triangle
  IV. In The News: Police to Have Unlimited Access to Medical Records;
         Bank Secrecy Act; Sex Offenders and Civil Commitment;
         Police Find Fugitives Using Welfare Rolls
   V. Home Protection: Home Security Basics
  VI. Virus Protection: How To Protect Your Software; What You Don't
         Know About Viruses Can Hurt You, Part 3
 VII. Highway Safety: Road Rage, the New American Killer
VIII. Technology: GPS Ready For Mass Markets
IX. Editor's Last Say: Privacy Concerns
X. EndNotes: Staff, E-mail addresses, View On The Web, Bulletin
         Boards, Subscription Info, Disclaimer, Contact Info


                
                         ----------*----------
                                  I.
                             Editor's Say:

                        Crime Prevention Month



              -------------------------------------------
              This year's theme, The Power of Prevention:
                      Action Makes the Difference
              -------------------------------------------


  Whether you work in policing, corrections, military the public
sector, preventing crime in your neighborhood and home is extremely
important; not only for you personally, but for your family, friends
and neighbors as well. Unless everyone takes the time to get involved
by reporting suspicious persons and activities, our neighborhoods will
grow increasingly unsafe.

  Every October, the National Crime Prevention Council, Washington,
D.C., sponsors Crime Prevention Month. This year's theme, "The Power
of Prevention: Action Makes the Difference," proclaims what
communities all across the nation already know: crime prevention
is everybody's business. When everyone comes to the place where they
are willing to get involved, crime and fear will no longer dominate
our lives.

  Scattered throughout this issue are numerous crime prevention
stories, written by the staff of the Safety & Security magazine, the
Ohio Crime Prevention Association, Dublin, Ohio, and the National
Crime Prevention Council. With a little time and effort, your home
can be the safe castle that it was once ment to be.  --Al Colombo

     +----------------------------------------------------------+
     | Send your comments and questions to the author of this   |
     | editorial by sending it to: safety.security@cancomm.com  |
     +----------------------------------------------------------+

                         ----------*----------
                                  II.
                         Personal Protection: 

                    Defend Yourself From Werewolves



                    ------------------------------
                    There are predators out there.
                    ------------------------------



Michael E. Chesbro

  October is the month for Halloween, for ghouls, goblins,
werewolves...and "Crime Prevention Month." Many of us enjoy a good
monster movie around Halloween, and the chill runs through us as we
watch the werewolf hunt its victim. However, none of us expect to run
into one on the way home from the theater. After all, they are only
make believe...right?

  Actually, the author believes in werewolves because he has seen
them; and he has seen their victims. These werewolves are not those
found in monster movies; but rather they are found on the streets of
our cities and towns. They are the violent criminals who hunt down the
innocent on the street and in their homes.

  Werewolves hunt for people who have money, someone to rape, anyone
to beat until they are broken and bloody. Werewolves also kill simply
because someone has wondered into their "turf," or because they are of
a different race. Sometimes they kill for no apparent reason at all,
other than they are bored and need something entertaining to occupy
their wasted time.

  Remember the riots in Los Angeles where a violent minority group did
not agree with the verdict returned by a court and jury. Do not forget
the woman dragged from her car, beaten and thrown into the gutter
where she layed while people drove her car away with her infant child
in the back seat. Although the woman survived, her child was found
murdered and thrown into a trash dumpster! Violent crime is a real
concern in today's society. No one wakes up in the morning knowing
that he or she will be attacked later in the day; no one plans to be a
victim of violent crime--but violent crime's occur every day!

  Unfortunately, many people do not believe in the violent criminal who
stalks our streets. Like the werewolf in the movies, the violent
criminal just is not real. We may read in the morning newspaper that
someone was beaten and robbed last night. We may feel shocked to read
of the nurse who was raped in the hospital parking lot as she walked
to her car after working a late shift.

  We should also wonder about the fact that after the citizens in our
nation's capital were denied the right to own a firearm, and thus lost
their most effective means of self-defense, the murder rate in
Washington, DC rose 300 percent!!! Yet, too often, we read about these
crimes and then turn to the sports page, the better homes section, or
the comics and forget that the victims on the front page could have
been us. After all, we say, that happened in "the city;" we live in a
nice quite neighborhood, I do not have anything that anyone would want.

  Oh... I would just give them my purse (wallet) and call the
police..... I do not really carry much cash, and I can cancel the
credit cards with a quick telephone call. However, will your wallet or
purse be enough to satisfy the criminal who may decide to kill you
just because he does not like the way you look, or maybe he does not
want to leave any witnesses behind.

  In this article the author hopes to convince you that there is a real
threat of violent criminal attack, and to offer some options for
dealing with this threat. No one means of self-defense is right for
everyone. In some places, ill-conceived laws limit citizens' choice
in the self-defense methods available. In other cases. you may not be
prepared to commit to using a certain method of self-defense. 

  Generally, it may be said that the very best method of self-defense
is simply the knowledge or awareness that you could easily become the
target of a violent criminal. You should have a pre-planned and
practiced method of defending yourself ready if such an attack ever
occurs so you will not become a victim. With that in mind, let us
consider some of the possible self-defense methods available to you.

Firearms

  In the hands of a person who is competent in its use, a firearm is
by far the most effective tool for defense against a violent, life-
threatening criminal attack. Of all the firearms available, the
handgun is generally the most effective firearm for personal defense,
although the shotgun has its own unique advantages.

  When choosing a handgun for self-defense, choose a caliber that has
a proven ability to stop a violent attacker at close range with a
single, well-place shot. This being said, you must understand that no
handgun round can be guaranteed to stop a violent, determined
attacker in each and every case. 

  Of all the handgun calibers available, the .45 caliber ACP is
generally considered the most effective self-defense round. Other
effective calibers are the .357 Magnum, 10mm, and .40 caliber S&W. 
Using specialty ammunition 9mm Parabellum (Luger) and .38 Special can
also be effective. Calibers smaller than .38, or 9mm do not have
sufficient energy to be effective self-defense rounds. 

  A second, and very important consideration when choosing a handgun
for self-defense is to choose a handgun that you can easily carry
concealed. The most powerful handgun in the world will do you no good
if it is not available to you when it is needed. Many states (at least
those that recognize the rights of their citizens) provide for the
average citizen to receive a permit to carry a handgun for self-
defense. In states where you may lawfully carry a handgun, it pays to
choose one that may be easily carried, thus making it more likely that
you will have your handgun should you need it.

  Finally, if you choose to carry a handgun for self-defense you must
be competent in its use. This means regular practice on the shooting
range. Here is a brief, simple test you can perform at the shooting
range to gauge your self-defense shooting ability: 

1) Start with your handgun holstered and concealed as you would
   normally carry it on the street. 

2) From a distance of 7 yards (21 feet) you will fire at two 10 inch
   diameter targets. At the signal to fire, draw your handgun from its
   holster and fire two rounds at each target (a total of four
   rounds). 

3) Record your time from the start signal to your fourth shot. 

4) Repeat this drill three more times, for a total of four times and
   16 shots fired. For each shot on target give yourself 10 points
   (maximum 160 points, 16 x 10). Add your times (in seconds) for each
   of the four series you fired. Divide your total time in seconds
   into your total score from hits on your target (i.e. 150 points, 15
   out of 16 hits, in a total of 16 seconds gives you a final score of
   9.375). 

5) A score above 9.0 is Excellent, 7.5 to 9.0 is Good, 6.0 to 7.5
   Fair, and below 6.0 is Unsatisfactory. 

  This is intended only as a brief self-evaluation of your self-
defense shooting ability. There is much more involved in using a
handgun for self-defense than shooting drills on the range. Therefore,
the author strongly recommends that, if at all possible, you should
attend a school that teaches proper use of handguns in personal
defense.   

  For additional information about handguns in self-defense, contact
one of the following schools:    

     *  Chapman Academy, 4350 Academy Rd., Hallsville, MO  65255, Tel:
        800-847-0588
    
     *  Gunsite Training Center, Box 700, Paulden, AZ 86334, Tel: 520-
        636-4565

     *  Thunder Ranch, Inc., Box 53, Mountain Home, TX 78058, Tel:
        210-640-3138

     *  Wilson Combat, Box 578, Berryville, AR 72616, Tel:  1-800-955-
        4856

Pepper Spray

  Chemical self-defense sprays (commonly called "tear-gas" or "mace")
are available in three basic types: CN, CS, and OC (pepper spray). CN
and CS are chemical agents developed by the military as training and
riot control agents. OC (Oleoresin capsicum) is derived from cayenne
peppers.

  All of these substances, CN, CS, and OC, have the same intended
effect in self-defense: they cause tearing of the eyes, difficulty in
breathing, and pain. The objective in this case is to deter an
attacker. It is generally accepted that, in personal self-defense
situations, OC is more effective than CN or CS is deterring an
attacker. Therefore, we will focus on OC, or pepper spray, as it is
often called. 

  OC may be had in 1% solution, 5% solution, and 10% solution. There
is almost no difference, so far as the individual effect, of 1, 5 or
10 percent OC in its ability to incapacitate an attacker. The real
difference lies in duration of effect (i.e. how long it take the
individual sprayed with pepper spray to recover from its effects). In
a self-defense situation this is not all that important, as the effect
from a 1% solution OC product is usually sufficient enough to allow
an intended victim to escape before their attacker recovers from the
effects of the pepper spray. 

  So, just how effective is pepper spray? A research paper, published
by the National Institute of Justice (NIJ) in March 1997, showed that
OC spray successfully incapacitated humans in 156 out of 174
confrontations, or about 90% of the time. In the other 18 cases the
report stated that the subjects were not fully subdued. The report
further stated that these 18 individuals appeared to be on drugs or
mentally troubled, and suggested that such individuals may not yield
to the effects of OC. 

  The NIJ study focused on Baltimore (MD) County Police Department's
use of OC in police operations. Although OC has some limitations,
there is clearly a place for its use in individual self-defense
situations. 

  As with any method of self-defense, however, there is a need to
practice one's self-defense techniques. Most supplies of chemical
self-defense sprays also provide inert (water based) training sprays. 
If you intend to add OC in your self-defense plan, the author strongly
suggests that you obtain one of these training sprays. Also, practice
with a partner.

Martial Arts

  There are several different styles of martial arts. The purpose of
of each one of them will vary in their emphasis. Where one schools
focuses on traditional martial arts, another highlights the
competition of the sport. Others concentrate on self-defense and some
even attempt to combine all these traits in their training. For the
purposes of this article, however, the author will focus on martial
arts for self-defense purposes only. 

  The first thing to understand is that no system of martial arts
(unarmed self-defense/hand-to-hand combat) will make one entirely
invincible. A good martial arts program will allow the student to
learn techniques that can be employed to defend against an attacker. 
It will also improve the level of physical fitness of the student and
allow the development of confidence so that the student does not
project an image of "target" or "victim" to a would-be criminal. 

  With all other things being equal (skill and teaching ability of the
instructor, professionalism of the school, etc.) the best all around
"self-defense" martial art, suitable for the greatest number of
people, is Jujutsu. Jujutsu and its associated arts will teach you to
throw a person to the ground, to escape from holds and grabs, and to
defend against punches and kicks. Most importantly however, Jujutsu
will teach you to fall or be thrown to the ground without being hurt. 

  You may also hear it said that "Strength is not important in martial
arts if you have mastered the techniques." Generally, this is not
true. Strength does, in fact, play an important part in any hand-to-
hand situation. However, if you do not have a lot of physical
strength, you will usually do better with a throwing art, like Jujutsu
or Aikido, as opposed to a martial art that focuses on strikes, like
Karate. The 105 pound woman who is attacked by a 250 pound,
intoxicated man will usually have a better chance of using a
throwing/tripping technique to throw her attacker to the ground and
escape than she will by trying to disable him with punches and kicks
before trying to escape. 

  The study of martial arts requires dedication and commitment. Some
people spend their entire lives in pursuit of the mastery of a martial
art. From the self-defense perspective, no matter what martial art you
choose to study, you should plan to train regularly for six months to
a year before you can reasonably be expected to be able to effectively
use your martial arts techniques against a determined attacker.

Your Most Effective Weapon

  If there is any one secret to self-defense and protection from
crime. it has got to be "personal awareness." Criminals generally seek
out victims who appear to be "easy targets." If you are alert and
highly aware of your surroundings, and you have a well thought-out
plan for self protection, it is quite likely that you will never face
a violent criminal because criminals go for easy targets.

  Editor's Note: Mention of a product or service in this article does
    not constitute an endorsement by Safety & Security Magazine or its
    author. Those products and services listed are intended to serve
    only as a starting point for individuals wishing to obtain
    additional information regarding their specific self-defense
    needs.  --Michael Chesbro

         +---------------------------------------------------+
         | Send your comments and questions to the author of |
         | this story. Send it to 100336.675@compuserve.com  |
         +---------------------------------------------------+

                         ----------*----------
                                 III.
                        Basic Crime Prevention:

                       Break The Crime Triangle


Al Colombo

  Crime prevention begins with a basic understanding of why crime
occurs in the first place. In reality, law enforcement and crime
prevention practitioners all agree that there are three elements to
crime: "need," "opportunity," and a "victim." These three crime causes
form a triangle:

                +-------------------------------------+
                |                 NEED                |
                |                  /\                 |
                |                 /  \                |
                |                /    \               |
                |               /      \              |
                |              /        \             |
                |             /          \            |
                |            /            \           |  
                | OPPORTUNITY -------------- VICTIM   | 
                +-------------------------------------+
                |  Crime, as seen by the above Crime  |
                |  Triangle, requires all three       |
                |  elements before a crime can take   |
                |  place. (Source: OCPA, Dublin, Oh)  |
                +-------------------------------------+

  At the very top of the triangle is "NEED." At the bottom left is
"OPPORTUNITY," and at the bottom right. "VICTIM." All three must be
present for a crime to occur. For example, when a crime takes place,
there is always a perceived NEED on the part of the criminal. This
NEED might be real or it may be imagined; but, to the perpetrator, it
is real.

  NEED can take the form of cash, but more often it involves property
theft, which is often converted to cash. For example, a disgruntle
employee at a large manufacturing company may feel quite justified in
taking raw or finished goods from an assembly line, rework department
or stockroom. Their rationale is quite simply that they are merely
getting the additional pay that the company should have paid them but
did not. Another example is the retail sales clerk who believes that
it is alright to take finished goods from their employer's store. In
this case, the NEED for goods may have been encouraged by a lost
promotion or a forgotten pay raise.

  The second element necessary for crime is OPPORTUNITY. In the case
of the factory worker and sales clerk, both were trusted by their
employer and given full access to the goods that were taken. One way
to minimize the risk of loss is to limit or remove employee access.
By eliminating opportunity you reduce the likelihood of theft.
However, by eliminating employee access, the effective and efficient
operation of both a retail or manufacturing company would surely
suffer.

  The third element needed is a VICTIM. Just like the other two, if
you remove the VICTIM from the crime triangle, then you eliminate the
crime. In fact, interrupt any one of these three crime aspects, and
you eliminate the crime. Of course, criminals often do more than just
steal goods. In fact, victims also take the form of individuals, and
personal safety and security is the primary reason why police officers
and crime prevention practitioners work hard to teach people how to
protect themselves using basic crime prevention tools.

  One way that crime prevention practitioners say that you can prevent
crime is to carefully choose where you go and when you go there. If
you must venture out after dark, especially in the city, be especially
aware of people and activities going on around you. If walking alone
on the sidewalk, do not walk next to the buildings, someone could be
waiting in one of the alcoves for a victim to come along. By the same
token, do not walk too close to parked cars, for fear that someone
might be crouched down behind one of them.

  Above all, trust your instincts. For example, while walking along a
city sidewalk after dark you suddenly sense danger, chances are you
are in danger. Trust your instincts and take immediate action to
protect yourself. If necessary, and if saftey permits, cross the
street to the other side; or, if there are no cars on the street, walk
on the street to avoid danger.

  Parking garages are another source of danger for ordinary people.
When entering one, make sure that ALL your doors are locked, stay
alert, be on your toes, and be ever ready to respond at a moment's
notice. Be sure to carefully choose the spot you park in.  Make sure
it is well lit and as close as possible to the stairway or elevators.

  Before pulling into the parking spot you have chosen, check
underneath the cars adjacent to the spot you want. Look for someone
crouched down behind one of them. If necessary, pull up so you can see
the other side of the farthest vehicle, then back up and pull in the
spot. Also, avoid parking in a slot next to a car with someone sitting
in it. This person, no matter how honest they may appear, could be a
predator waiting for a victim to come along.

  In each of the situations above, the intended victim made an
attempt to minimize their risk of attack by reducing or removing a
criminal's OPPORTUNITY or by eliminating the VICTIM. For example, by
not parking next to a car with someone in it, you eliminate a
criminal's OPPORTUNITY by removing the VICTIM. You also remove
the criminal's OPPORTUNITY when a locksmith installs double-cylinder
deadbolt locks on all your doors and an electrician installs ample
outside lighting around entrances. If you eliminate the one, you
remove the other, which greatly reduces risk.
  
    +--------------------------------------------------------------+
    | Send your comments and questions to the author of this story |
    | by sending it to: safety.security@cancomm.com                |
    +--------------------------------------------------------------+

                         ----------*----------
                                  IV.        
                             In The News:


Police To Have Unlimited
Access to Medical Records

  The Clinton administration is about to provide state and federal law
enforcement with unlimited access to medical records without the
consent of the patient, something that has traditionally not been
allowed. "Donna Shalala, the secretary of health and human services,
plans to announce the proposals at a congressional hearing Thursday,"
said Robert Pear, author of NEW LAWS MAY LET POLICE INSPECT MEDICAL
RECORDS, N.Y. Times News Service.

  Although the reason for this change in federal law is related to the
recent state and federal investigations into Medicare and Medicaid
fraud, privacy advocates are sure to question the potential for misuse
by unscrupulous investigators in matters not related to medical
payment fraud. According to Pear, such investigations conducted by the
FBI have more than tripled over the past five years. This means it
will be easier for law enforcement to access medical records than a
bank's database, cable television records, or video rental records.
Access to these information sources will continue to be protected by
federal privacy laws.

                              -----*-----

Bank Secrecy Act

  According to Ira Madsen, author of THE BANK SECRECY ACT--ANOTHER
GOVERNMENT ASSAULT, if you fail to report certain monetary
transactions, even though they are entirely honest and above board,
you open yourself to arrest and a criminal felony charge.

  "You may not know this, but under the provisions of the Bank Secrecy
Act, a Currency Transaction Report (IRS Form 4789) must be filed with
the IRS for any cash transaction involving $10,000 or more. But that
is not all. CTRs must also be filed by anyone purchasing more than
$3,000 in money orders or making transfers among bank accounts in a
series totally $10,000 or more," says Madsen.

  Banks are also required to report these transactions, and they can
file for you as well. But, if a teller suspects that you do not know
to file, he or she could turn you in by personally calling federal
authorities and telling them about the transaction. For doing so, the
employee stands to collect $150,000 as a reward. Although this is
unlikely to occur, according to Madsen, the mechanism that could make
this happen is now in place.

  The reporting requirement allegedly also applies to, "Private
bankers, brokers, investment bankers, currency dealers, check cashing
firms, credit card and insurance companies, metals dealers, jewelers,
pawnbrokers, loan companies, travel agencies, money senders, real
estate transactions, casinos and others," says Madsen.

  For not filing, violators face five years in prison and a $250,000
fine. Not only that, but under federal law, the accounts involved in
the transaction(s) is subject to seizure. For additional information,
visit http://www.pnc.com.au/~cafmr/hammell/index.html, which is
sponsored by John C. Hammell, legislative advocate, IAHF, or E-mail
him at jham@concentric.net.

                              -----*-----

Sex Offenders and
Civil Commitment

  The Supreme Court, in a recent decision (Kansas vs. Hendricks),
ruled in favor of the State of Kansas, allowing law enforcement in
Kansas to confine sex offenders found "mentally abnormal" or with a
"personality disorder" that is likely to result in a predatory sexual
act. In this case, the sex offender can be committed to a mental
hospital.

  The guidelines set down in the Kansas legislation requires the state
to first provide counseling and an examination by a mental health
professional. The confinee must also be given the right to cross
examine witnesses and to review state-presented documentary evidence.

  Once committed, the state must afford the sex offender every
opportunity to prove himself competent. For example, the court that
committed the individual must determine whether continued commitment
is necessary by conducting annual reviews. The individual himself is
also permitted to file a petition of release; or the secretary of
social and rehab services can have him released by declaring that a
change in his situation has occurred.


                              -----*-----

Police Find Fugitives
Using Welfare Rolls

  Thanks to legislation signed this past June, law enforcement in Ohio
is taking a serious bite out of crime by using state welfare rolls to
locate wanted fugitives of the law. According to Lt. Dan Pierron of
the Montgomery County sheriff's department, the sheriff's office sent
86 names to the state auditor's office. Forty three names came up
after running a cross check using the welfare database. Seventeen of
the 43 either fell under another department's jurisdiction or the
perpetrator was not discovered at the addresses given.

  In the end, 12 warrants were served. Pierron said that his
department intends to continue to use state welfare records to locate
fugitives because it gives them another place to look. It is also an
effective way to save state welfare money, said Bob Lidman, state
auditor's office.

    +--------------------------------------------------------------+
    | You can send your comments and questions to the author of In |
    | The News by sending them to acolombo@compuserve.com          |
    +--------------------------------------------------------------+

                         ----------*----------
                                  V.
                           Home Protection:

                         Home Security Basics


Ron Nelson

  A good security system incorporates many devices that are designed
to alert you and the necessary authorities of an attempted burglary or
dangerous situation. Well designed systems have layers of protection
that can be incorporated into your security program, depending upon
your lifestyle and occupancy of the home.

  The traditional approach is to use contacts on exterior openings and
then install a network of interior "traps" or additional areas of
protection that will be activated when an intruder moves about the
house. This month we will look at these basic burglary detection
devices and future articles will cover fire, gas, water, other
security-related detection devices, and remote monitoring techniques.

Contacts

  The first-line of defense are contacts installed on doors and
windows. These devices will activate the alarm if the door/window is
opened more than a few inches. It is advisable to have contacts on all
exterior doors and windows that a would be burglar could use to gain
entry. This would include all basement, ground floor, and even on the
upper floors if there is a roof, ledge or other means that could
facilitate entry.

  Most contacts used today consist of two parts, a sealed reed switch
and a magnet. They may be surface mounted or concealed ranging in size
from 1/4 to 3 in. and come in a few selected colors such as white,
ivory, or brown. If you want to be able to leave certain windows open
a little for ventilation, it is possible to install one switch and two
magnets, one in the fully-closed position and the second positioned so
that window can be open. Care should be exercised when doing this to
make sure that the open area is not sufficient to allow entry or to
permit an intruder to compromise the contact.

Glass-Break Detectors

  These units are designed to detect the sound and or vibration of
breaking glass. Depending upon the type of detection employed, they
are mounted directly on the glass, frame, wall, or ceiling. Units
designed for wall and ceiling mount can provide protection for more
that one window. When installing glass break detectors it is very
important that the area of coverage be tested with all window
coverings, drapes/blinds, etc., in their normal position.

Screens

  A higher cost alternative to glass break detectors is to use
residential window screens. These are special screens that have a fine
wire woven into the material which will break if someone cuts the
screen. These devices have the additional advantages of being active
at all times and do not hamper your normal opening/closing of the
window.

Interior "Traps"

  These are devices that are designed to detect the motion of an
intruder as they move about your home. They can be motion detectors,
stress detectors, floor mats, or even contacts on interior doors.
Since the purpose of these units is to detect an intruder after they
have gained entry into the home they react to movement and are
generally not active when the home is occupied.

Motion Detectors

  Most motion detectors used today are either Passive Infrared
Receivers (also called Passive Infrared Detectors or PIRs) or dual-
technology detectors, such as those that combine PIR technology with
microwave detection. Dual detectors have gained in popularity due to
their able resistance to false alarms.

  You can install motion detectors in every room or locate them in
areas that are likely to be used by a burglar, such as common halls,
stairs, computer room, or the master bedroom. If you have pets care
must be exercised in locating motion detectors so that they are not
activated by the movement of your pet. Some manufacturers have
designed special "pet immune" detectors that reduce the possibility of
a pet-caused false alarm. In any case, special care is in order when
installing this type of detector. These units can not be active when
you are at home or likely to enter the areas of protection.

Stress Detectors

  These are electronic devices that are generally mounted on the floor
beams and can detect the slight flexing or stress that is caused in
the floor joists when someone walks through a room. These units can
be adjusted to allow pets to move about without tripping the system.

Floor Mats

  Mats are long, thin switches that are generally placed under the
carpets in a home. They are activated by the weight of someone
walking on them. Like motion detectors, these devices should be active
when you are at home for they can easily cause false alarms.

Interior Contacts

  Interior door contacts can also be used to detect movement inside
your home. By installing contacts on certain doors, such as basement,
garage, closet, safe, gun cabinet, and bedroom doors, you can protect
interior areas without installing interior motion detectors, which is
ideal in homes with pets. Using this arrangement, an alarm condition
is initiated when an intruder opens an interior door. These are much
less expensive than the other methods of interior detection but will
not detect an intruder who does not open any of the selected doors.

  Which approach is right for you? That depends upon many factors,
like the construction of your home, your family's lifestyle, the
degree of security desired, and, of course, the amount of money you
wish to spend. Before buying the first thing that comes along, discuss
the various security approaches available with your local security
company, then decide on what is best for you. Remember, in security
there is no such thing as "one size fits all." A truly effective
security system is one that is specifically designed for your
particular home.

          +------------------------------------------------+
          | Send your comments to the author of this story |
          | by sending them to: ron@topservice.com         |
          +------------------------------------------------+

                         ----------*----------                     
                                  VI.
                           Virus Protection:

                     How To Protect Your Software



                   ---------------------------------
                   What You Don't Know About Viruses
                         Can Hurt You, Part 3
                   ---------------------------------


Bruce Shaffer

  Now, what can you do to protect yourself from a virus attack? There
is only one way to ensure that you have no viruses and that you will
never get one: build your own PC from the ground up, including
programming the CPU. Do not include any disk drives or comm ports
either.

  Not a very useful computer would you say? You can, however, do other
things to minimize your chances of contracting a virus infection,
such as:

 o USE A QUALITY VIRUS SCANNER!
       This is the single most important thing you can do.  In
       addition to installing the software, you must also maintain the
       signature files for it as well.  These are usually posted
       somewhere electronically every month.  A high quality program
       will also allow for intermediate updates during the month. 
       Register your software so you can avail yourself of what ever
       services the publisher offers.

 o NEVER, EVER DISABLE YOUR SCANNER!
       For almost every instance where I was called in to help out
       someone who was running a scanner and kept it up to date, they
       disabled the scanner because it was interfering with something
       they tried to do.  I did this myself once and picked up EXEBUG
       virus.

 o SCAN EVERY DISKETTE OR CD-ROM THAT GOES INTO YOUR PC! 
       The majority of viruses are spread via diskette.  If the
       diskette went into someone else's PC, then there is a good
       chance it is infected.  Even blank diskettes out of a sealed
       box can be infected.  Formatting a diskette will not clean the
       virus off of it if it is formatted on an infected PC.

 o DO NOT EXECUTE ANY PROGRAM THAT IS E-MAILED TO YOU! 
       If it is from a trusted source, then I would scan it first.  If
       it just appears in your mailbox one day from an unknown source,
       delete it.  Experience shows me that it is probably worth what
       you paid for it.  There was a program that used to be sent to
       new users on AOL that would format the user's hard drive for
       them.  This particular program was sent out by some twisted
       vandal who thought there were too many people on AOL already.
       The author was awaiting sentencing the last I heard.

 o VIEW E-MAILED .DOC FILES WITH A VIEWER, NOT MSWORD! 
       Even if you trust the person who sent it to you.  Macro viruses
       are so easy to write that in the last two years we have seen
       literally hundreds of new macro viruses come on the scene. 
       They are coming out so often and are so easily spread across
       the Internet that there is a chance that your document could
       contain one that is not recognized yet by your scanner.

 o CHANGE THE BOOT SEQUENCE OF YOUR PC! 
       PCs, by default, always look to the floppy drive first when
       booting and will attempt to load whatever they find there. 
       Virtually all PCs made in the last three years will allow you
       to change that so that the PC always boots off of your hard
       drive first.  You will need to refer to the documentation that
       came with your PC to change your BIOS settings.  Doing this
       will eliminate almost 80% of the known viruses, or all boot
       sector viruses.

 o BEWARE OF THE FALSE AUTHORITY! 
       Many people claim to know all about viruses.  Perhaps they do,
       but, I would check credentials.  My own credentials are a
       Bachelor's Degree in Computer Science, almost 20 years
       experience in the computer industry, (strictly technical), have
       spent the last 10 years in computer services, am a network
       engineer, am a member of the NCSA, have been fighting viruses
       since I first saw them in 1988 and can give references.  Like I
       said, check credentials.

 o BEWARE OF THE SCANNER THAT WILL DETECT ALL KNOWN AND UNKNOWN
       VIRUSES! 
       If it can detect all known and unknown viruses, why bother with
       anything else, like monthly update subscriptions?  Every
       antivirus publisher will offer subscriptions for signature file
       updates, which is a fairly lucrative service.  This service
       alone would tell you that the software company does not trust
       its own claim. 
      
       Check the trade magazines for comparative reviews.  Ask
       questions of people who use the software.  You can find out a
       bit about the publisher by checking with organizations like the
       NCSA web page at www.ncsa.com.  NCSA does certification of
       antivirus vendors and have a fairly rigorous requirement set
       that vendors must meet for certification.  You can also find
       out a lot by monitoring the moderated news group,
       news:comp.virus.

 o USE BACKUPS! 
       If you have the facilities, back up your PC on a regular basis. 
       This will at least give you a base to fall back on in the event
       your PC is trashed by a virus.  If you do not have access to a
       zip drive or a tape backup, at least back up your important
       data files to floppy when you save them.  Software can always
       be reinstalled from the original diskettes.

 o MAKE A RESCUE DISKETTE! 
       There are many utilities available today that will make a copy
       of your important system files on floppy.  Even without a
       rescue utility, you can make a clean boot disk for your system. 
       It needs to be bootable, and should include important files
       such as EDLIN (do not laugh, it is a reasonable text editor
       that will do in an emergency.  Try putting EDIT on a
       diskette!), FDISK, FORMAT, a copy of your autoexec.bat and
       config.sys, (rename them to something else).  If you are using
       Win95, use the utility that comes with it to make a rescue
       disk.

  We used to be able to think in terms of "If I get a virus;" but,
this is no longer true. Today, we must think in terms of "When I get a
virus" and then do what we can to move that date as far out as
possible. We must also do what we need to do to minimize the damage
and ease the recovery for when we lose the drives. It may sound odd,
but, we need to practice safe computing. 

  No one can faithfully guarantee that you will never get a virus;
but, we can minimize the chances that it will occur as well as the
impact. Follow the steps outlined in all three parts of this story
and you will minimize both risk and impact. Also, read as much as you
can about viruses, but be sure to discount far-reaching claims and
conflicting advice. It is a big net out there and not everyone means
to do you good. 

  If the advertisements for antivirus software proclaim that it can
protect your computer against all known and unknown viruses, even
those not written yet, you would be well advised to look at some other
software. There is not a single antivirus package on the market today
that can truthfully make that claim. 

  Beware of software vendors who resort to media pumping to sell
product. The reason that they do this is simply to pump up sales. 
This is a tactic that has been used by a number of failing or waning
software companies who offer inferior product(s). It is unfortunate
that this tactic is still in use today. 

  Of all the security risks prevalent in today's computer-based
society, a virus is the most likely form of attack that you will see. 
Open your eyes, be aware of what you are doing and you will have a
very good chance of surviving a virus attack.

      +--------------------------------------------------------+
      | You can send your comments and questions to the author |
      | of this story. Send it to bruceshaffer@keyport.com     |
      +--------------------------------------------------------+

                         ----------*----------                     
                                 VII.
                            Highway Safety:

                            Road Rage, the
                          New American Killer



Nick Markowitz

  An Elderly couple out for a nice sunny afternoon ride is suddenly 
menaced from behind by an unknown, young male assailant. Because they
were in the left passing lane and doing only 50 mph in a 65 zone, the
assailant decided to force them to do the legal speed limit. The first
thing this boy did was flash his high-beam headlights, then he began
honking his horn and making indecent finger gestures at the old
couple. Then he began to yell profanities at them out of the window.

  The older gentleman driver became frightened and confused, so he
sped up and attempted to pull into the right lane to allow the
belligerent, young driver to go around him. But, the other driver
followed him into the right lane, continuing his assault against them,
to the point where the elderly driver lost control of his vehicle.
Going off the side of the road, the older driver crashed his car into
a ditch. The young assailant behind him drove on, yelling "good for
you, you old fool!"

  Fact or fiction? This might be a good story plot for a Steven
Spiegel movie, such as Dennis Hopper starred in with an enraged truck
driver called "Road Games," if it were not for the fact that people
are often seriously injured when angry drivers fail to keep their
anger under control. Everyday in America incidents like this one plays
itself out on U.S. roadways, sometimes with deadly results.

  The typical person who engages in road rage activities is typically
male, between the ages of 16 and 36, although cases exist of people,
also women, well into their 50s. Sometimes the most surprising thing
about these perpetrators is that they are often mild mannered outside
of their vehicles, yet crazed and extremely offensive on the highway.

  Some states have initiated programs were road rage and aggressive
drivers are spotted and ticketed for their offenses. In Pennsylvania,
a Highway Department van or car is often used, driving 55 in a 65 mph
zone and in the passing lane so to identify road-rage drivers that
like to intimidate drivers by flashing their headlights, sounding
their horns and tailgating. The description of the vehicle and driver
is then radioed ahead to a waiting State Trooper who then stops the
driver and tickets them. On one particular afternoon, on a single
stretch of highway, Pennsylvania State Troopers stopped 63 road-rage
motorists and caught three drunken drivers, all in the space of six
hours.

  What can you do to protect and prevent road-rage motorists from
targeting you? Check out the following helpful tips:

1) When in the left lane someone flashes their headlights at you,
   either speed up to meet the maximum speed limit or move to the
   right lane, allowing the individual to pass you. Keep your eyes
   straight ahead and on the road and do not look over at the road-
   rage driver's vehicle, which can sometimes escalate their attack
   against you.
  
2) Never pull off the road and get out of your car to fight a road-
   raged individual because the adrenaline level within the other
   individual may be pumped up to the point where you have little
   chance of defending yourself.

3) If you do accidentally cut off someone, the universal hand gesture
   of pointing at your head with a circular gesture to show you
   screwed up and are apologizing will some times stop a road rage
   attack.

4) If you are followed off the main highway, keep your doors locked
   and keep moving. Drive to a well populated, busy location or the
   nearest police station, or find a telephone in a busy area from
   which to dial 911. Give the dispatcher your location, a description
   of the vehicle and driver, as well as the other vehicle's license
   plate number, if possible.
  
5) Keep a cheap, throw-away camera in your vehicle at all times with
   which to take a picture of the vehicle, driver and license plate.
   It can also come in handy should you become involved in an accident
   and need to document damage, vehicle locations, etc.

6) If you have a handicapped placard on your vehicle mirror, take them
   off when driving to avoid identifying yourself as someone who
   might be an easy target. Besides, in most states, it is against the
   law to move your vehicle with it attached to the mirror.

7) Do not bring a firearm into a road confrontation. Not only is it a
   bad idea, but it can lead to further problems for you if another
   well-intending motorist reports seeing you display it in traffic. A
   firearm should never be considered unless you have been forced to
   stop by the side of the road and you feel your life is in immanent
   danger.

8) Buy a can of mace (check your local authorities about licensing
   arrangements, if required) or OC pepper spray and learn how and when
   to use it. Keep it handy in your vehicle, should you be forced off
   the road. Stay inside your car with the window rolled down no more
   than an inch or two, and if the road-raged person verbally or
   physically threatens you, roll your window down enough so you can
   safely spray them in the eyes. Be sure not to spray yourself in the
   eyes in the process. Then roll up your window and leave the area,
   if possible, or blow your horn until someone notices you and help
   arrives. Chemical spray may also come in handy when leaving or
   entering your vehicle in a parking lot or parking garage.

  Remember, your best defense is defensive driving. Always obey the
traffic laws so other motorists do not have a reason to become angry
with you in the first place.

     Editor's Note: Being handicapped and driving with special   
        accellerator and brake adapters, it takes me a few       
        seconds to execute a maneuver than a non-impaired        
        driver. On several occasions young drivers, ages 16 to   
        30, have threatened me on the highway because of this,   
        despite the fact that my vehicle is clearly marked with  
        handicapped plates. In each case, I had them stopped and 
        arrested by calling 911. I gave the dispatchers the      
        description of both the vehicles and the drivers. There  
        have also been times that I've been targeted because I   
        have handicapped plates on my vehicle. --Nick Markowitz  
  
   +--------------------------------------------------------------+
   | You can send your comments and questions to the author of    |
   | these stories by sending them to nmarkow125@aol.com          |
   +--------------------------------------------------------------+

                         ----------*----------                     
                                 VIII.
                              Technology:

                      GPS Ready For Mass Markets

Gary Miller

  Although current GPS (Global Positioning System) commodities such as
aviation, marine, and automotive navigation in addition to surveying
and identification of field sites for drilling operations etc. have
become common place, the market area for the technology has not
expanded significantly. That may be changing in the very near future.

  Soon, with a few keystrokes or the press of a button, we may be able
to find a lost child*, call for help on a cellular phone equipped with
GPS so that the operator can send assistance to our exact location, or
simply locate the family car that seems to be lost in that enormous
stadium parking lot. But for now, the market analysts agree that on-
board automobile navigation is the growth market for GPS.

  Just in this year alone, there were about 1.14 million auto-mobile
GPS systems installed across the globe. And it is estimated that the
totals will climb to above 11 million by the year 2001. This trend is
estimated to produce a market value of $1.7 billion in component sales
alone.

  The next-generation market of GPS products may include functions such
as:

* Real-time updates on traffic information
* Links to digital/cellular communications systems
* 8-Mb of memory for Internet access and E-mail
* Air bags that call 911 and trigger a GPS locator upon impact

  Industry trend watchers predict that many of the smaller board and
modular chip manufacturers will merge with or form alliances with the
larger vendors to realize their fair share of the emerging GPS
markets. 

*Editors Note: In the "lost-child" scenario, I would hope and pray
    that the locator device placed on the child would be in the form
    of a wrist watch or disguised as some other form of jewelry or
    wearing apparel.  There is talk of using a micro-chip implant
    similar to those already being used on animals. The political
    undertones of "implants" on any human being are obvious here, and
    should be greatly scrutinized. --Gary Miller

   +--------------------------------------------------------------+
   | You can send your comments and questions to the author of    |
   | these stories by sending them to gary.miller@cancomm.com     |
   +--------------------------------------------------------------+

                         ----------*----------                     
                                  IX.
                          Editor's Last Say:

                           Privacy Concerns

  During the past week, I have seen two documentary programs on cable
that dealt with the topic of Cyber Warriers and Cyber Spies. One
common thread disclosed in both programs was that ALL our finances and
the system that contains ALL our money--personal, corporate, and
government--is based on vulnerable digital technologies. That accounts
for 90 percent of ALL money and investments!

  It was noted that it is now possible for just ONE hacker or
technospy to bring this nation (or any nation) to its knees. In
addition to financial disaster, electrical power systems, air traffic
control and rail transportation are now computerized. Get the picture?

  The U.S. government has used its own hackers to breach our computer
security systems. Out of 800 cyber break-ins at the CIA headquarters
at Langley, VA, only 22 were detected by those people whose job it is
to detect such intrusions. Scarry, isn't it?

  Also covered in one of those documentaries, was that the CIA has all
but admitted to using human "implants" to keep track of their own
spies. Who can guess how many "other" people have been knowingly or
un-knowingly implanted with ID/tracking devices. It is common
knowledge that the GPS (Global Positioning System) can be used to
track such devices.

  Now, I read this week in one of my computer trade publications that
the commercial use of GPS will be expanded beyond the navigation-based
technology, and will be used for such applications as finding lost
children. My question is: will those children be "implanted" with
cyber-ID chips? If so, who will be the next group of people to be
implanted?  Maybe the elderly confined to nursing homes would be
implanted in case they would walk away. Then there are those confined
to our prisons. Wow, what a great way to keep tabs on them.

  That just about narrows it down to you and I. I am sure that our
government could find a good "reason" to implant the rest of us if
and when they want to. Incidentally, according to one of the
documentaries, the CIA implants deal with "mind control." (shudder) 

   --Gary Miller  (gary.miller@cancomm.com)

                         ----------*----------                     
                                  X.
                               EndNotes:


                             S&S Magazine
                           E-mail Addresses
                                                                    
                           Allan B. Colombo
                                Editor
                        acolombo@compuserve.com
                     http://web.raex.com/~colombo/

                           Ronald E. Nelson
                               Co-Editor
                          ron@topservice.com
       http://ourworld.compuserve.com/homepages/ren_productions/

                            Nick Markowitz
                          Contributing Writer
                          nmarkow125@aol.com

                              Gary Miller
                          Contributing Writer
                        gary.miller@cancomm.com

                Michael Chesbro, BCFE, CPO, CSS, DABFE
                          Contributing Writer
                       100336.675@compuserve.com
          http://ourworld.compuserve.com/homepages/chesnotes/

                             Bruce Shaffer
                          Contributing Writer
                        bshaffer@ix.netcom.com

                              -----+-----

                           View On The Web:

                      Safety & Security Home Page
          http://ourworld.compuserve.com/homepages/acolombo/

                     Safety & Security Depository
    http://ourworld.compuserve.com/homepages/acolombo/backissu.htm

                              -----+-----

                           Bulletin Boards:

                CompuServe Information Systems Forums:
           TWCRIME, AARPFORUM, TWDWELL, EWCFORUM, SafetyNet

                    Canton Communications (CanComm)
                             Canton, Ohio
                         Online: 330-477-4504
                          Voice: 330-477-3080

                              -----+-----

                       Subscription Information:

      To subscribe to the ASCii version of the Safety & Security
 [electronic] Magazine, send an E-mail message with the word SUBCRIBE
in the message text to ccmag-request@cancomm.com. To unsubscribe, send
 an E-mail message with the word UNSUBSCRIBE in the message text area
                         to the same address.

                              -----+-----

                              Disclaimer

      The information and tips contained in the Safety & Security
        Magazine is meant for entertainment purposes only.  The
         authors cannot guarantee the personal safety and well
        being of those who read and use the information herein.


                           Copyright(c)1997
                      Safety & Security Magazine
                      safety.security@cancomm.com
                            P.O. Box 30076
                        East Canton, Ohio 44730



--=====================_876450255==_--




 +-----------------+ +--------------------------+ +-----------------+

 +-+               | |                          | |               +-+

   +---+           | |    Safety & Security     | |           +---+

       +--+        | |       [electronic]       | |        +--+

          +--+     | |         Magazine         | |     +--+

             +--+  | |                          | |  +--+

                +--+ +--------------------------+ +--+



  



  ===================================================================

  Volume 3, Issue 12 (c)1997 Safety & Security Magazine November 1997

  ===================================================================



       Each month in the Safety & Security [electronic] Magazine

       you will find helpful and informative articles on topics

        related to property protection and personal safety and

            security at home, at work, and while traveling.

           





                         +-------------------+

                         | Table of Contents |

                         +-------------------+





   I. Editor's Say: Doctor Death's Free Body Parts

  II. Fire Prevention: Kerosene Appliance Safety

 III. Personal Safety: Carbon Monoxide -- The Silent Killer

  IV. In the News: Cases of Drug-Resistant Tuberculosis on Rise;

          Corrections Privitization in New York Not Likely; Call for

          Encryption Algorithms for Advanced Encryption Standard; NIST

          Reports on New DNA Sequencing Technologies; Sun Research

          Reveals Problems Ahead; Auto-Dial Messaging for ProActive

          Policing; Supreme Court on Religious Freedom; The Great

          Chicago Fire, Change in Story?

   V. Mail: Domestic violence; Evaluation of Pepper Spray; Thank you;

          Link to our site; Feedback on e-zine

  VI. Question & Answer: Identity Fraud Concerns

 VII. Fire Safety: Electric Heaters, An Alternative to Kerosene

VIII. Home Safety: Earthquakes and Fire

  IX. Editor's Last Say: Is Your Garbage Worth Protecting?

   X. EndNotes: Staff, E-mail addresses, View On The Web, Bulletin

             Boards, Subscription Info, Disclaimer, Contact Info





                         ----------*----------

                                  I.

                             Editor's Say:



                          Doctor Death's Free

                              Body Parts







  Doctor Jack Kevorkian, the doctor-of-death, is at it again. Only

this time, he is trying to sell the public and medical profession an

inperfect bill of goods. He wants to shift attention away from the

real issue of assisted suicide and place it on society's need for body

parts. If he is successful, and there is a good chance he will be,

this will lead to the normalization of euthanasia. Our government has

taken God out of almost everything else, we cannot allow them to

remove God from the decision of death.



  | Isaiah 40:6,7                                                   |

  |                                                                 |

  | 6 -- The voice said, Cry. And he said, What shall I cry? All    |

  | flesh is grass, and all the goodliness thereof is as the flower |

  | of the field:                                                   |

  | 7 -- The grass withereth, the flower fadeth: because the spirit |

  | of the Lord bloweth upon it: surely the people is grass. --KJV  |



  The decision of "when is it time to die" for all of us, even those

who are terminally ill, should be left to our Maker and not the

doctor-of-death or any other physician. What is doctor death's tie-in

with Safety and Security? Well, if this practice should ever become

legalized and sanctioned by the U.S. Government, abuse is almost sure

to follow. Maybe not right away, and then again...



  Take a good, serious look at China's body-parts business where for

US$30,000, US$5,000 down and a blood sample, you can buy an operation

and the body part you need from the Red Communist Chinese Military.

After doing a DNA typing of your blood, they then match it to that of

a Chinese prisoner already in custody (I assume he/she is already in

custody). At a scheduled date, this particular prisoner, along with

many others (who I assume are likewise designated as body-part

donors), are put to death. Their body parts are then removed from

their bodies and immediately placed within the recipients'. Because

the execution date was transmitted to each of the recipients, they

were already there, ready to receive their body part.



  I hope the doctors and good citizens of the United States do not buy

into what Kovorkian is selling. What he is proposing is inhuman and

good doctors should be above that. The life of one for the life of

another, this is God Almighty's job, not ours. We should not encourage

this kind of imoral, unethical behavior, for the potential for abuse

is far too great. No matter how positive it might sound, there is no

way to escape the fact that this is an atrocity.



  A little over two years ago, I painfully watched my dear mother,

Nova Jane, age 72, die of cancer. She was a second-hand-smoke victim,

given her close proximity to my father, a well-meaning, good man who

smoked constantly. Her death was slow and painful, and much as I still

agonize over it, I am certain that she would not have wanted to end

her life a moment sooner than God deemed necessary. She was a strong,

courageous woman and she died with dignity.  --Al Colombo

                                                           

    +--------------------------------------------------------------+

    | The opinions expressed in Editors Say is the personal views  |

    | of the writer and not Safety & Security [electronic]         |

    | Magazine or staff. You can send your comments to the writer  |

    | of this editorial at: safety.security@cancomm.com            |

    +--------------------------------------------------------------+



                         ----------*----------

                                  II.

                           Fire Prevention:



                       Kerosene Appliance Safety







Nick Markowitz



  Fires can occur at any time, especially when there's been a natural

disaster. Whether it is a bad storm, an earthquake (see Section IV),

or merely a power outage, if it is cold weather, the first thing many

people do is drag out their kerosene heaters and lanterns. In this

regard, under the best of conditions, fire safety is a must; but it is

even more critical during an emergency.



  The first rule of thumb when using kerosene appliances is to use

good-quality kerosene fuel. K1 is usually the best, but always follow

the manufacturer's recommendations. If someone you know should offer

you some other kind of fuel that they say will work in your kerosene

appliances, such as jet fuel, no matter what the price, pass it up and

buy the real thing.



  Another rule of thumb when using kerosene appliances is to store the

fuel in an approved container and keep the cap on tight to prevent

spills and contamination. If the can you want to use had gasoline in

it at some time in the past, no matter how thorough you may have

washed it, do not use this can for your kerosene fuel. Only use cans

that have had nothing other than kerosene in them.



Local Regulations and Maintenance



  Some communities do not permit their citizens to use kerosene

appliances in some environments. This is especially true of apartment

tenants. However, in some communities this also applies to single-

family dwellings. So, before you buy a kerosene lantern or space

heater, be sure to check with the local building codes authority and

fire inspection department to find out if they are allowed.



  Naturally, after sitting all summer without being used, always take

your kerosene appliances to a specialist to have them maintained.

Cleaning is very important and you should have them install a new

wick. Be sure the technician that works on your appliance uses only

replacement parts approved by the original manufacturer.



  Another important aspect associated with using kerosene appliances

is the distance between them and combustible materials in the

environment. Maintain at least one foot (12 inches) of space between

them and draperies, furniture and other combustibles.



  These appliances also require constant supervision to assure that

they do not catch on fire or cause a fire by radiated heat. In

addition, supervision assures that children in the home will not come

into contact with the hot surface of a kerosene device.



  Another concern is that of carbon monoxide. Are you using your

kerosene appliance in a well-ventilated area? What about a carbon

dioxide CO  detector? In a tightly sealed room, CO could become an

issue in short order, causing those inside the enclosed area to become

ill or even perish. A CO detector will provide early warning of such a

problem. Because power may be an issue during a disaster, it is

probably wise to purchase both a battery and electric model.



Thawing Water Pipes



  Frankly, one of the things that people mistakenly do is use kerosene

heaters to thaw out water pipes. The best procedure is to thaw pipes

by naturally heating the room. They take longer to thaw, this is true,

but the fire risk of the other alternative is too great and

potentially costly to consider. Another alternative, if electricity is

available, is to use an electric hair dryer.



  Another risk in the home is the use of what some call a "salamander"

kerosene heater. These are often found on construction sites in some

portions of the country. One man lost his new home and almost his

family when he used one for this very purpose. He only walked away

from it for three minutes--instant inferno.



  There is little doubt that kerosene heaters make a great emergency

source of heat and light. But they also contribute to many winter time

fires and fire deaths. Before using your kerosene heater, be sure to

follow the above advice and read the instruction manual that came with

your kerosene appliances.



Editor's Note: Remember, if you use a kerosene heater in the wrong

   way, you may get one of those house calls from your local fire

   department. Using a kerosene lantern can also get you into trouble

   if you do not know how to safely use them. I cannot stress enough

   the need to read the instruction manual that came with your

   appliances, or you might end up taking an unexpected trip to the

   hospital. In the mean time, think SNOW!!!  --Nick Markowitz

   

          +------------------------------------------------+

          | Send your comments and questions to the author |

          | of this story at safety.security@cancomm.com   |

          +------------------------------------------------+



                         ----------*----------

                                 III.

                           Personal Safety:



                        Carbon Monoxide -- The

                             Silent Killer





               ----------------------------------------

                Reprinted from the November 1995 Issue

                   of the Safety & Security Magazine

               ----------------------------------------





Ron Nelson



  According to the US Consumer Product Safety Commission CO Fact

Sheet, in the year 1989 there were 295 deaths associated with CO

poisoning and close to 5,000 people are treated each year in emergency

rooms for symptoms of CO poisoning. The problem has grown so great

that in 1993 President Clinton declared the last week in September as

"CO Safety Awareness Week." Many municipalities have also adopted

legislation requiring the installation of CO detectors in homes and

recreational vehicles





What is Carbon monoxide?



  CO is a colorless, odorless, and highly poisonous gas that is

produced when fuels containing carbon are burned. It is about 3%

lighter than air and as such tends to rise under normal conditions.

It is dangerous because when it is inhaled it combines with

hemoglobin, the oxygen carrying substance in blood cells, and prevents

them from absorbing needed oxygen. This lack of oxygen causes

headaches, nausea, followed by unconsciousness and ultimately death.

As little as 1/5 of 1% may prove fatal in less than 30 minutes. CO is

a particularly  insidious gas since it is odorless and someone may be

exposed to dangerous levels without knowing it.



Symptoms of Carbon Monoxide poisoning:



  * Mild exposure- Slight headache, nausea, vomiting, and fatigue.

            These symptoms are sometimes described as "flu like".



  * Medium exposure- Severe throbbing headache, drowsiness, confusion,

            fast heart rate.



  * Extreme exposure- Unconsciousness, convulsions, cardiorespiratory

            failure, death.



  The disorientating effects of CO poisoning often prevent the victims

from seeking help even though they are aware that they are not feeling

well.



  Each year many deaths are caused by CO gas escaping from furnaces,

stoves, and fireplaces when the ventilation is not properly regulated.

If you develop CO poisoning symptoms leave immediately and call your

local fire department or ambulance if the symptoms are severe. You may

also notify your local gas company or HVAC contractor.



Types of CO detectors

                                                              

There are 2 basic types of CO detectors, Biomimetic and Taguchi.



  Biomimetic units, also called gel cell or litmus, utilize a

semipermeable gel that changes color when exposed to CO. This gel

absorbs CO at the same rate as human hemoglobin, and its color is

directly related to the amount of CO absorbed. The detector has a

light beam which shines through the gel and senses the change in

color, activating the device. These units require that the sensor pack

be replaced every 2 years and are also known to be sensitive to

cooking or other fumes.



  Taguchi units, also called tin oxide or figaro, utilize a specially

doped semiconductor that changes its resistance when exposed to CO.

The detector senses this change and activates the unit. A new

technology for detecting CO is called non-dispersive infrared. This

type of detector is still under development but promises to be a much

better and reliable method to detect CO.



Installation of detectors



  Due to its lighter than air composition CO detectors should be

located near the top of a wall or on a ceiling. Do not mount it

directly in a corner since the normal movement of air causes a dead

spot in that area.

                                                                    

  In addition do not locate it within 5 feet of a CO producing source,

such as furnace, since false alarms may occur. Due to the unique

composition of CO, detectors are specifically designed to react only

to its presence and are not combined with other types of gas

detection.

                                      

Power and connection to security systems



  The detectors currently available may be powered by batteries, 110

vac, 12 vdc, or 110 vac with battery backup. Units may also be

purchased that have a relay output for connection to any security

system control or wireless transmitter.



  If you will be connecting your detectors to a security system, they

must be installed on dedicated 24 hour zones to insure proper reaction

to an activation. As always, make sure that you  completely read the

detector instructions that are packed with each unit, and follow all

of the manufacturers directions.



What to do if your detector activates



  If your CO detector activates you should leave the location

immediately and check to make sure everyone got out. Call your local

fire department, your local gas company or HVAC contractor. You can

open the windows to ventilate the area and clean out the CO buildup.



  Do not take any chances, it is much better to call for assistance

than to become another statistic. It is also possible for CO poisoning

to occur from faulty exhaust pipes on automobiles or trucks. If you

begin to experience headaches or nausea while driving or riding in an

automobile or truck, you should open the windows immediately and have

the exhaust system checked.



 Monthly maintenance



   Cleaning- You should clean the outside of the detector with a vacuum

 or soft brush and make sure that no objects are blocking the unit or

 restricting air flow around it.



   Testing CO detectors- These units are designed to detect only Carbon

 monoxide so they can not be checked for actual operation. If the unit

 is equipped with a test button you should use it to test the unit. If

 your detector is connected to a remote monitoring office please

 remember to notify your security company prior to testing.



   For additional information check your local library or you can

 contact your gas supplier, utility company, local fire department, or

 HVAC contractor.



          +------------------------------------------------+

          | Send your comments and questions to the author |

          | of this story at safety.security@cancomm.com   |

          +------------------------------------------------+



                         ----------*----------

                                  IV.        

                             In The News:



Cases of Drug-Resistant

Tuberculosis on Rise



  As reported in the September, 1996 issue of Safety & Security, the

advance of drug-resistant TB is on the rise. Recently, a survey

conducted by researchers for the World Health Organization (WHO) and

the U.S. Centers for Disease Control and Prevention (CDC) confirmed

the existence of multi-drug resistant (MDR) TB in one third of the 35

countries who were queried. TB is caused by an airborne bacterium.

This new strain of TB is almost sure to spread to other countries.

This is of grave concern to the world health community because WHO's

research reveals that anyone infected with TB of any strain is likely

to infect 10 to 20 people every year.



  The drug-resistant strain of TB is said to be the result of poor

medical practices, such as infected people that fail to take all of

the medication prescribed. This common, wide-spread practice permits

drug-resistant strains to occur. Also a problem, doctors often

prescribe the wrong medication, which essentially has the same effect.



  Because the cost of treating MDR tuberculosis is about a hundred

times more expensive than traditional TB, a large portion of the

people who have it will not receive the correct treatment. Not only

will the assure the death of these people, but it will serve to

further spread these mutated strains.



  WHO reports a 96% recovery rate among patients who use Directly

Observed Treatment Shortcourse (DOTS). DOTS entails the suprvision of

patients being treated by better assuring that they take the right

medication for the prescribed period of time. According to WHO,

because not everyone has access to DOTS, only 3 million of the 8

million cases of TB reported annually are curable. For additional

information on this strawin of TB, check out WHO's web site at:

http://www.who.ch/programmes/gtb/dritw/foreward.htm.



                              -----*-----



Corrections Privitization

in New York Not Likely



  Dennis C. Vacco, Attorney General of New York says that in his legal

opinion, the privitization of prisons in New York State is not likely.

According to Corrections Journal, Pace Publications, May 21, 1997;

"senator Michael Nozzolio, chairman of the Senate's Crime Victims,

Crime, and Correction Committee, asked for the opinion after learning

of inquiries made by the Corrections Corporation of America, the

leading private corrections firm in the nation...."



  Lack of proper training and limited powers were two of the issues

that Vacco mentioned in his legal opinion. He said that employees of

private corrections companies would not be sworn peace officers, but

rather private citizens. This means that their right to use force

against prisoners would be greatly limited by New York law. Because of

this, private correctional employees might not be legally able to

apply the necessary force required to stop a prison riot or ward off

an escape--not without serious legal consequences. Not only that, but

prisoners that try to escape from a privately run correctional

facility could not be legally charged with Escape or Attempted Escape

according to New York law.



Editor's Note:  For more information on correctional issues or their

   semi-monthly publication "Corrections Journal," ISSN 1089-2575,

   contact Pace Publications, 443 Park Ave. South, New York, NY 10016;

   phone 212-685-5450; or by fax 212-679-4701. --Al Colombo

  

                              -----*-----



Call For Encryption Algorithms

for Advanced Encryption Standard



  Security product manufactures, voluntary standards organizations and

others are invited to submit their encryption algorithms for

inspection and evaluation. The algorithm selected could become the

basis of an Advanced Encryption Standard (AES). According to a notice

published in the 12 Sept. 1997 Federal Register, the AES will specify

an unclassified, publicaly-disclosed encryption algorithm that will be

made available, royalty free, to anyone in the entire world for

protecting information.



  Candidate algorithm submission packages must be received no later

than 15 June 1998. Submissions received prior to 15 April 1998 (tax

day :-) will be reviewed for completeness by NIST and their submitters

notified of any deficiencies by 15 May 1998. This should allow time

for corrections before the 15 June deadline.



Editor's Note:  For more information on the AES program, contact

   Technology Lab, Attn: AES Nominations, A231 Technology Bldg., NIST,

   Gaithersburg, MD 20899; call 301-975-3696; fax 301-948-1233; or E-

   mail aesquest@nist.gov. You can also visit the AES web site at:

   http://csrc.nist.gov/encryption/aes/aes_9709.htm. --Al Colombo



                              -----*-----



NIST Reports on New DNA

Sequencing Technologies



  National Institute of Standards (NIST) reported a new DNA sequencing

technology, developed by GeneTrace Systems Inc., Menlo Park, CA, that

is hundreds of times faster than current methods and at a fraction of

the cost. It is expected that this research will lead to a set of

highly-effective drugs that will make the diagnosis of diseases and

the identification of people, as part of a forensic exercise or

paternity test much faster.



  Co-funded by both NIST and Technology's Advanced Technology Program,

the company developed the technology needed to apply fast and accurate

mass-spectrometry techniques to the identification of DNA fragments.

The system is able to identify the sequence of base chemicals in a

given DNA strand in as little as five seconds, rather than the three

hours required for conventional DNA separation today.



  GeneTrace reduced labor costs by using a robotics system for initial

sample handling. The process combines DNA probing, sequencing and

sizing reactions with mass spectrometry. Eight patents on this new

process are now pending. The company expects this technology to lead

to genetic screening tests for as little as a few dollars, compared

to the $300 to $5,000 now required. Several companies are now using

GeneTrace's technology for pilot projects that focus on gene discovery

and expression, genotyping and other topics.



  In an entirely different effort, NIST recently reported the

existence of a new DNA chip technology that has the potential of

revolutionizing the sequencing of DNA, genetic disease diagnosis,

detection of pathogens in food and water, forensics and personal

identification and other applications. The NIST DNA chip is made of

one layer of single-stranded DNA molecules, which self-assemble on

gold. This forms a well organized monolayer. The surface-tethered DNA

can then bind complementary small fragments of single-stranded DNA

from solution. Such DNA sensors could be used for analysis of blood or

urine samples from a patient, or in water or food. In theory, NIST

claims that DNA chip sensors could also be developed to check for many

types of bacteria and viruses.



Editor's Note:  For more information on the GeneTrace's DNA Sequencing

   method, contact Michael Baum, NIST, at 301-975-2763. For additional

   information on the NIST DNA chip method, contact Linda Joy, NIST,

   at 301-975-4403 or linda.joy@nist.gov. --Al Colombo



                              -----*-----



Sun Research Reveals

Problems Ahead



  It was recently reported by National Public Radio (NPR) that since

1991, scientists have known that our sun is emitting two additional

spectral bands of radiation. According to public radio, so certain are

these findings that our sun was officially reclassified from its

original "stable star" category to "variable-output."



  What is the significance of this recent finding to us on planet

earth? According to NPR, this increase in energy output is thought by

some scientists to be cause of El Nino, which, according to

scientists, is not showing any sign of abatement at this time. It is

expected that El Nino will continue to cause adverse weather patterns

across the globe. Experts say it has already affected agricultural

output in developing countries, such as Australia and Brazil. Its

affects are expected to reach output in developed countries as well.





                              -----*-----



Auto-Dial Messaging for

ProActive Policing



  Police departments, like the Baltimore County, MD, police

department, are taking a proactive stance to policing using an auto-

dialer message system, manufactured by VoieWorld, Scottsdale, AZ. The

system, which costs about $5,000, enables police officials to

automatically send voice messages over the telephone network to

hundreds or thousands of residents, warning them of crime trends,

specific crime problems, and other situations.



  "We can very quickly identify all of the households in a community

that's experiencing a crime problem. We enter the phone numbers

automatically thorugh a computer to the auto-dialing system, and

within minutes, we can deliver our message to people, alerting them to

the problem and giving them suggetions as to what they can do to

reduce their chances of being victimized," said Philip Canter, Chief

Statistician, Baltimore County, MD, police department (Law Enforcement

News, John Jay College of Criminal Justice, New York, NY, 15 October

1997 issue).



  According to Canter, his department is able to discern a difference

in crime statistics in Baltimore County because of this auto-dialing

system. In fact, the same system was used by Los Angeles Police

Department to warn police officers in LA County after the verdict in

the 1992 state trial of LAPD officers who were charged in the beating

of Rodney King.



                              -----*-----



Supreme Court on

Religious Freedom



  The Supreme Court recently ruled (City of Boerne versus Flores) that

the Religious Freedom Restoration Act of 1993 is unconstitutional and

that by passing this act, Congress overstepped its Constitutional

authority and interfered with state soverignty.



                              -----*-----



The Great Chicago Fire

Change in Story?



  If Richard F. Bales, a title insurance lawyer in the employ of

Chicago Title Insurance Co., is right, Mrs. O'Leary's cow may not have

tipped over the kerosene lantern that was alleged to have caused the

great Chicago Fire of 1871. According to records, the fire that killed

300 and made homeless more than 100,000 started in Mrs. O'Leary's

barn. The popular story has it that her cow kicked over the lantern as

she was being milked.



  According to Bales, the fire may have started in O'leary's barn, but

Mrs. O'Leary may not have been the culprit. One of the problems with

the original investigation, says Bales, was that no one had adequately

mapped out the area. Because he has ready access to the property

records kept by Chicago Title, he was able to detect possible

discrempencies in a Peg Leg Sullivan's story.



  "[Bales] was struck that Peg Leg Sullivan seemed to have a lot to

say. Sullivan said he had been in front of another neighbor's house

and had seen the fire break out in the O'Leary's barn. But Bales

discovered that the title records showed that at least one house,

maybe two, plus an 8-foot-high fence would have blocked Sullivan's

view," says Pam Belluck, author of MRS. O'LEARY'S COW MAY HAVE BEEN

FRAMED, published by The New York Times.



  At the time, Sullivan told authorities that he ran to Mrs. O'Leary's

barn to save the animals, then ran out of the barn to get help. All of

this he did on his wooden peg leg, says Bales. Records also revealed

that Sullivan told authorities that he visited the barn every evening

to feed a cow that his mother kept there. All of this, says Bates,

throws a serious doubt on the popular story that claims that Mrs.

O'Leary's cow started the fire.



     +----------------------------------------------------------+

     | You can send your comments and questions regarding these |

     | stories by sending them to safety.security@cancomm.com   |

     +----------------------------------------------------------+



                         ----------*----------

                                  V.         

                                 Mail:



From: GM

Network: worldnet.att.net

Date:

Subj: domestic violence; April, 1997 issue



  The article in your April S&S Magazine, which covered the Domestic

Violence Offender Gun Ban, sponsored by Senator Frank Lautenberg (D-

NJ), shows another prime example of the twisted thinking and

conflicting statistics fostered by the Clinton administration and his

left-wing comrades in Washington.



  I remember, as part of Clinton's policy on crime, he was going to put

"100,000" more cops on the street.  That figure in reality has become

approximately 18,000 to 25,000 additional police officers so far.



  Now... enter the Domestic Violence Offender law, and we lose 60,000

police officers.  That gives us a NEGATIVE gain of from 35,000 to

42,000.  I guess that's what comes from outcome-based education.



  Just because you are living in a rural area, and maybe only own a

double-barrel shotgun, don't turn your back on the city folks who

have had their handguns taken away!  Mr. farmer, YOU could be next!



  A story on the American Freedom Network this week told of a new

"Anti-Gang" crime bill that would disqualify you from ever owning a

firearm if you so much as had a shoplifting charge against you when

you were in grade school!



  Come on people... WAKE UP!  The government has slowly and

methodically picked away at our society by eliminating our 2nd

Amendment rights one class at a time, and one weapon at a time.



                              -----*-----



From:  John Rich

Network: CompuServe

Date:  September 15, 1997

Subj:  Evaluation of Pepper Spray



Source: NIJ Research in Brief, U.S. Department of Justice Office of

Justice Programs, National Institute of Justice. You can find the full

report at: www.ncjrs.org/txtfiles/162358.txt



 Key Findings:



 o OC spray successfully incapacitated humans in 156 out of 174 (90

   percent) confrontations.



 o In 18 encounters, subjects were not fully "subdued " by OC; in 7 of

   these incidents, subjects exhibited bizarre behavior and appeared

   to be on drugs or mentally troubled, thus suggesting that such

   individuals may not yield to OC's effects.



 o While assaults on officers were declining prior to implementation

   of the OC spray program, the rate of decline increased after OC was

   introduced.



 o Twenty-one officers received minor injuries when they used the

   spray, but none reported lost work days.



 o Similarly, only 14 suspects received injuries, none of which

   required hospital treatment.



 o Use-of-force complaints decreased by 53 percent in the study period

   despite decreased manpower and increased demand for services. No

   complaints addressed the use of OC.



 o Although training instructions stated that sprays were maximally

   effective from a distance of 4 to 6 feet, many officers applied the

   aerosol to humans from distances of less than 3 feet, which may

   have diminished the spray's effectiveness.



 o Overall, study findings showed that a well-developed OC-spray

   program can provide operational benefits to police.



 Interesting triva about pepper spray:



 As early as 2300 B.C., Chinese armies dispersed enemy forces by

 using "stink pots" -- red pepper burned in hot oil that produced

 irritating and suffocating smoke -- in massive frontal assaults.



Editor's Note: Thanks to John Rich for the OC update. --Al Colombo



                              -----*-----



From: Russ

Network: aol.com

Date: October 6, 1997

Subj: Thank you.....



Al,



What a great service you are providing. I am buying my first home and

want to install my own security system. How do I get in touch with the

International Association of Retired Police Chiefs for a kit to mark

my personal belongings and obtain window stickers stating same?



One more thing, I have read most of the info that you have published

re: home security, but I have not been able to find a dealer or

catalogue from which to purchase the necessary components to make my

own customized alarm system.



Once again, the information I have received thus far has been of great

help to me of which I am most appreciative.



Thank you, Russ



                              -----*-----



From: Will

Network: bkstr.ucsb.edu

Date: October 17, 1997

Subj: Link to our site         



If you would like could you add a link to our web site at the UC Santa

Barbara Asset Protection. We have a lot of loss prevention info and

report forms at the site. We also have a live video feed so people

visiting our site can see who or what we are watching.



Thank you.



Will Wood, AP Director UCSB AP web site- 

http://www.bookstore.ucsb.edu/lp/lp.html



                              -----*-----



From: William Plante

Network: home.com

Date: October 13, 1997

Subj: Feedback on e-zine



Hi!



I am a security consultant based in the Phoenix, AZ area and originally

from Canada. I was browsing the web when I hit your home page.



Wow, neat e-zine. You obviously dedicate a great deal of time and energy

to maintain this service - you should be highly commended for your

efforts.



Thanks.



William Plante

Principal Consultant

Corinthian Consulting, LLC





   +---------------------------------------------------------------+

   | You can send your comments and questions for inclusion in     |

   | the mail section by sending it to safety.security@cancomm.com |

   +---------------------------------------------------------------+



                         ----------*----------                     

                                  VI.

                          Question & Answer:



                        Identity Fraud Concerns



               -----------------------------------------

                      "Question & Answer," a new

                  department for difficult questions.

               -----------------------------------------







   Expert: John Bailey, CPS; Las Vegas, NV

Biography: Bailey specializes in wholesale database and other

           information services. Nation-wide investigative referral

           service, executive protection and privacy, tactical and

           custom mission-specific training programs, and software for

           investigators. E-mail: Task_force@compuserve.com



                        -----------------------



READER'S QUESTION -- In the early hours of Sunday morning my home was

   burglarized. The thief's only loot was my fiance's purse. It

   contained almost no cash but did include her "identity." It

   included her Social Security Card, Driver's License, credit cards

   and other things of minor value.



   I read in an article that with the information that the thief got

   he/she can create a new "identity."  I also read that that there

   was a way to advise the credit agencies that under no circumstances

   should they allow anyone to receive credit using this ID.



   I have three questions about all of this:



         1) -- How does one go about this?



         2) -- When she needs to, how does she get access to her own

               credit?



         3) -- I noticed that when you apply for credit it is noted on

               the bottom who has attempted access of your credit

               history. Is it wise to get a copy of your credit

               history every month for a while after a situation like

               this to see if anyone is attempting access? And if so,

               how?



BAILEY'S ANSWER -- You did not mention whether you were home or not.

   If you were, count yourself lucky that you did not have to cope

   with the worse. This is pretty typical of a "cat" burglar job,

   where they take the easiest item(s) and leave without taking the

   risk of searching for more loot. Without knowing more details, it

   is hard to draw conclusions about the probable perps. If, for

   instance, the purse was visible from the outside of the house, and

   the window was open, any neighborhood kid could have done it on a

   dare, and everything but the cash probably went into a nearby

   dumpster or ditch.



   I want to comment on the notion that a person's identity is

   contained on pieces of paper and plastic. This reminds me of the

   way certain native peoples fear that photographs steal their souls.

   The media has worked hard to maximize the emotional impact of this

   issue to make it more newsworthy. They have inadvertently also

   maximized the emotional impact of ID theft on the victims by

   promoting the concept that a human being's identity held captive by

   ink on paper. Tell your fiancee that you still know who she is -

   Her "identity" is intact. All that has been taken are some papers

   that have no intrinsic value. Help to minimize the impact of this

   issue.



   Make sure that no keys were taken. Change locks if necessary. And,

   an all-around security review is definitely in order for emotional

   reasons as well as practical ones. It is possible that your

   perpetrater is more than a thief, so advise your intended

   concerning physical security, etc. The two best tools for this are

   awareness and physical barriers.



   The remainder of your letter asked about the thief potentially

   using your fiancee's papers to create a new identity. I have worked

   some of these fascinating cases assisting the Secret Service, the

   Postal Service, NYCPD and other agencies. Fraud is a growth

   industry, and we can count on seeing more of it and endless new

   incarnations as communications and banking technologies evolve.



   You asked specifically about "advising the credit agencies" to keep

   the thief from obtaining credit in your fiancee's name. This theft

   is not the typical way in which a fraudster would go about

   obtaining information. It is too dangerous, and pays too little.

   However, the thief may sell the ID to someone else who is smarter.

   So, some fraud crimes may arise from the original theft.



   The credit bureaus are not particularly interested in every stolen

   purse. And, they have no control over who receives credit. You also

   do not want to muck up her credit file over this. Nevermind about

   the credit bureaus. They protect the banks, that frankly do not

   care about one instance of fraud. Let us concentrate on protecting

   you and yours instead.



   Fraud schemes vary. The most common attack would involve obtaining

   credit in your fiancee's name and absconding with merchandise or

   cash advances on a card. There is not much you can do about this,

   even if her purse were not stolen. It is a very common crime. The

   good news is that you are not liable for the bills, and it

   should not cost much more than some aggrevation with the banks.

   This type of crime has become common and banks are now easier for

   consumers to deal with about it. 



   Of more concern are frauds that could target your lady's own bank

   account through the use of various check or transaction schemes. In

   the wake of this theft, the lenders for stolen cards will usually

   close those accounts and issue new cards with new account numbers.

   Have your fiancee call all of her credit card lenders - not just

   the ones whose cards were stolen. Have them note the accounts. 



   Specifically, tell them that no change of address is planned, and

   that any changes in address should alert them. Have the accounts

   noted that no extra cards should be issued to "husband" or other

   family members. Have her establish some security protocol with

   them, using a security code OTHER than SSN, or mother's maiden

   name. Your fiancee can contact her bank(s). She can ask them about

   security protocols to curtail fraud, and she can establish

   procedures (passcode) for the release of account information.  If

   banking information was in the purse, she can consider closing the

   account and opening a new one, or even changing banks.



   General security against all kinds of identity theft should

   include, as in this case, physical security of documents. That

   includes security of your trash. Many fraudsters obtain the

   foundation of their information by picking through garbage. Some

   people throw away the most interesting things. In my investigative

   career, I have found everything from interoffice memos about

   illegal toxic dumping, to copies of CEO's personal 1040 forms and

   attachments. A good fraudster can use a single sales receipt, a

   bank deposit slip, or a check carbon to steal from you or your

   bank. Use a good quality shredder, or use these kinds of things to

   prime your fireplace this winter.



   Other security precautions include refusing to give your SSN,

   telephone number, address, or even your name to people who do not

   really NEED to have it. Refuse to sign release forms that allow

   information to pass hands. 



   Ask people who will have access to the information you provide. Ask

   them to tell you this IN WRITING. "Do not talk to strangers" - even

   on the phone. Several fraud schemes involve coaching credit card

   numbers out of people over the phone. Never order merchandise by

   phone if the sales person called you. They may make you a great

   offer just to get your card number.



   Checking your credit report periodically is probably a good thing -

   to make sure the information is correct and current. Fraud moves

   faster than you can detect or fight by monitoring these files,

   (there are three different major files).



   Fraud is here to stay. Although you can not entirely prevent it,

   attention to your privacy and physical security can minimize your

   "victim potential." Pay attention to the rules of the game so that

   if you are victimized, at least you are not left holding the empty

   bag.



    +--------------------------------------------------------------+

    | You can send your comments and questions to the author of    |

    | these stories by sending them to safety.security@cancomm.com |

    +--------------------------------------------------------------+



                         ----------*----------                     

                                 VII.                              

                             Fire Safety:



                           Electric Heaters,

                      An Alternative to Kerosene







Nick Markowitz





1) Whenever possible, use an electric heater rather than a kerosene

   type.



2) Keep electric space heaters away from combustibles, such as drapes

   and clothing.



3) Never allow the use of an electric space heater when you are away

   from home.

 

4) Make sure the electric outlet into which your electric space heater

   is plugged is load capable.

  

5) When using electric space heaters, do not use extension cords. This

   is an almost sure way to start a fire, especially when the

   metallic conductors within it are too small and unable to safely

   handle the electrical load of the heater.

  

6) Instead of blow torches and other open-flame devices when

   thawing water pipes, use a hair dryer.



7) When there is a doubt, the best procedure of all is to call a

   professional. He has the proper tools to safely and effectively

   thaw out your pipes.



          +--------------------------------------------------------+

          | Send your comments and questions to the author of this |

          | story. Send it to safety.security@cancomm.com          |

          +--------------------------------------------------------+



                         ----------*----------                     

                                 VIII.

                             Home Safety:                            



                         Earthquakes and Fires





  Did you know fires often happen after strong earthquakes, causing

damage to homes and businesses? In fact, the Great San Francisco

earthquake that occurred on April 18, 1906 caused a lot of damage to

buildings, but the fires that burned unchecked for three days after

the earthquake destroyed the city.



  According to the National Fire Prevention Association (NFPA),

Quincy, Massachusetts, there are several steps that residents can take

now to reduce the risk of fire when an earthquake happens later.



  o Have approved flexible gas fittings installed for gas appliances

    such as water heaters, furnaces and stoves. Many gas lines break

    at their weakest point, where they are fitted to an appliance. A

    flexible fitting allows for movement during earthquakes without

    breaking the line. Check with your gas utility company for more

    information.



  o Strap your water heater to wall studs using perforated metal tape

    called "strap iron" or "plumber's tape." This will keep the water

    heater from toppling over in an earthquake, and also protects a

    large supply of drinking water you may need after the quake.



There are also many ways to avoid fires after an earthquake.



  o Use a flashlight to inspect for damage. After an earthquake, more

    people die in residential fires caused by using candles during a

    power outage than from the actual earthquake itself.



  o Avoid turning light switches on or off. A small spark inside the

    switch can touch off a fire due to leaking gas.



  o Sniff for leaking gas. If you smell gas, open windows if you can,

    and get out of the building/house. Call the gas company and fire

    department from someone else's home. If you do not smell gas, do

    not turn the gas off. You will need it for cooking and heating.



  For additional information on earthquake safety and protective

measures that you can take before a quake happens, call the American

Red Cross chapter in your area and/or the National Fire Prevention

Association (NFPA) at 617-770-3000, fax to 617-770-0700, or E-mail at

library@nfpa.org.



      +---------------------------------------------------------+

      | You can send your comments and questions regarding this |

      | story by sending it to safety.security@cancomm.com      |

      +---------------------------------------------------------+



                         ----------*----------                     

                                  IX.

                          Editor's Last Say:



                   Is Your Garbage Worth Protecting?





  There are those who believe that because everyone has the right to

public information that safeguards are not needed to protect it.

However, the other day, when I went to renew my vehicle plates, the

girl at the DMV handed me some folded papers and instructed me to take

my own waste paper home and dispose of it.



  Thinking this a bit odd, I promptly asked her why couldn't she

dispose of it here, behind the counter. She told me something that I

already knew, but hadn't thought of at that moment. She said that

recently, on several occassions, people from the bureau had

encountered people going through their trash dumpsters. She said that

they were obviously looking for papers with peoples' Social Security

Numbers, names, and birthdays on them. When I asked if they had called

the police about it at the time, she said there was nothing they could

do about it, these materials were no longer theirs to protect once

they placed them in the garbage.



  Do you think about the important kinds of information you frequently

dispose of in your trash can? Could someone be freely looking through

your garbage without your knowledge?  --Al Colombo



        +----------------------------------------------------+

        | Send your comments and questions to the author of  |

        | this story. Send it to safety.security@cancomm.com |

        +----------------------------------------------------+



                         ----------*----------                     

                                  X.

                               EndNotes:





                             S&S Magazine

                           E-mail Addresses

                                                                    

                           Allan B. Colombo

                                Editor

                        al.colombo@cancomm.com

                     http://web.raex.com/~colombo/

            

                              Ron Nelson

                               Co-Editor

                          ron@topservice.com

       http://ourworld.compuserve.com/homepages/ren_productions/



                            Nick Markowitz

                          Contributing Writer

                          nmarkow125@aol.com



                              John Bailey

                          Contributing Writer

         http://ourworld.compuserve.com/homepages/task_force/

                       task_force@compuserve.com



                              -----+-----



                           View On The Web:



                      Safety & Security Home Page

          http://ourworld.compuserve.com/homepages/acolombo/



                     Safety & Security Depository

    http://ourworld.compuserve.com/homepages/acolombo/backissu.htm



                              -----+-----



                           Bulletin Boards:



                CompuServe Information Systems Forums:

           TWCRIME, AARPFORUM, TWDWELL, EWCFORUM, SafetyNet



                    Canton Communications (CanComm)

                             Canton, Ohio

                         Online: 330-477-4504

                          Voice: 330-477-3080



                              -----+-----



                       Subscription Information:



      To subscribe to the ASCii version of the Safety & Security

[electronic] Magazine, send an E-mail message with the word SUBSCRIBE

in the message text to ccmag-request@cancomm.com. To unsubscribe, send

an E-mail message to the same address with the word UNSUBSCRIBE in the

                message text area to the same address.



                              -----+-----



                              Disclaimer



      The information and tips contained in the Safety & Security

        Magazine is meant for entertainment purposes only.  The

         authors cannot guarantee the personal safety and well

        being of those who read and use the information herein.





                           Copyright(c)1997

                      Safety & Security Magazine

                      safety.security@cancomm.com

                            P.O. Box 30076

                        East Canton, Ohio 44730

                          Phone: 330-488-1119






 +-----------------+ +--------------------------+ +-----------------+

 +-+               | |                          | |               +-+

   +---+           | |    Safety & Security     | |           +---+

       +--+        | |       [electronic]       | |        +--+

          +--+     | |         Magazine         | |     +--+

             +--+  | |                          | |  +--+

                +--+ +--------------------------+ +--+



  



  ===================================================================

  Volume 3, Issue 12 (c)1997 Safety & Security Magazine November 1997

  ===================================================================



       Each month in the Safety & Security [electronic] Magazine

       you will find helpful and informative articles on topics

        related to property protection and personal safety and

            security at home, at work, and while traveling.

           





                         +-------------------+

                         | Table of Contents |

                         +-------------------+





   I. Editor's Say: Doctor Death's Free Body Parts

  II. Fire Prevention: Kerosene Appliance Safety

 III. Personal Safety: Carbon Monoxide -- The Silent Killer

  IV. In the News: Cases of Drug-Resistant Tuberculosis on Rise;

          Corrections Privitization in New York Not Likely; Call for

          Encryption Algorithms for Advanced Encryption Standard; NIST

          Reports on New DNA Sequencing Technologies; Sun Research

          Reveals Problems Ahead; Auto-Dial Messaging for ProActive

          Policing; Supreme Court on Religious Freedom; The Great

          Chicago Fire, Change in Story?

   V. Mail: Domestic violence; Evaluation of Pepper Spray; Thank you;

          Link to our site; Feedback on e-zine

  VI. Question & Answer: Identity Fraud Concerns

 VII. Fire Safety: Electric Heaters, An Alternative to Kerosene

VIII. Home Safety: Earthquakes and Fire

  IX. Editor's Last Say: Is Your Garbage Worth Protecting?

   X. EndNotes: Staff, E-mail addresses, View On The Web, Bulletin

             Boards, Subscription Info, Disclaimer, Contact Info





                         ----------*----------

                                  I.

                             Editor's Say:



                          Doctor Death's Free

                              Body Parts







  Doctor Jack Kevorkian, the doctor-of-death, is at it again. Only

this time, he is trying to sell the public and medical profession an

inperfect bill of goods. He wants to shift attention away from the

real issue of assisted suicide and place it on society's need for body

parts. If he is successful, and there is a good chance he will be,

this will lead to the normalization of euthanasia. Our government has

taken God out of almost everything else, we cannot allow them to

remove God from the decision of death.



  | Isaiah 40:6,7                                                   |

  |                                                                 |

  | 6 -- The voice said, Cry. And he said, What shall I cry? All    |

  | flesh is grass, and all the goodliness thereof is as the flower |

  | of the field:                                                   |

  | 7 -- The grass withereth, the flower fadeth: because the spirit |

  | of the Lord bloweth upon it: surely the people is grass. --KJV  |



  The decision of "when is it time to die" for all of us, even those

who are terminally ill, should be left to our Maker and not the

doctor-of-death or any other physician. What is doctor death's tie-in

with Safety and Security? Well, if this practice should ever become

legalized and sanctioned by the U.S. Government, abuse is almost sure

to follow. Maybe not right away, and then again...



  Take a good, serious look at China's body-parts business where for

US$30,000, US$5,000 down and a blood sample, you can buy an operation

and the body part you need from the Red Communist Chinese Military.

After doing a DNA typing of your blood, they then match it to that of

a Chinese prisoner already in custody (I assume he/she is already in

custody). At a scheduled date, this particular prisoner, along with

many others (who I assume are likewise designated as body-part

donors), are put to death. Their body parts are then removed from

their bodies and immediately placed within the recipients'. Because

the execution date was transmitted to each of the recipients, they

were already there, ready to receive their body part.



  I hope the doctors and good citizens of the United States do not buy

into what Kovorkian is selling. What he is proposing is inhuman and

good doctors should be above that. The life of one for the life of

another, this is God Almighty's job, not ours. We should not encourage

this kind of imoral, unethical behavior, for the potential for abuse

is far too great. No matter how positive it might sound, there is no

way to escape the fact that this is an atrocity.



  A little over two years ago, I painfully watched my dear mother,

Nova Jane, age 72, die of cancer. She was a second-hand-smoke victim,

given her close proximity to my father, a well-meaning, good man who

smoked constantly. Her death was slow and painful, and much as I still

agonize over it, I am certain that she would not have wanted to end

her life a moment sooner than God deemed necessary. She was a strong,

courageous woman and she died with dignity.  --Al Colombo

                                                           

    +--------------------------------------------------------------+

    | The opinions expressed in Editors Say is the personal views  |

    | of the writer and not Safety & Security [electronic]         |

    | Magazine or staff. You can send your comments to the writer  |

    | of this editorial at: safety.security@cancomm.com            |

    +--------------------------------------------------------------+



                         ----------*----------

                                  II.

                           Fire Prevention:



                       Kerosene Appliance Safety







Nick Markowitz



  Fires can occur at any time, especially when there's been a natural

disaster. Whether it is a bad storm, an earthquake (see Section IV),

or merely a power outage, if it is cold weather, the first thing many

people do is drag out their kerosene heaters and lanterns. In this

regard, under the best of conditions, fire safety is a must; but it is

even more critical during an emergency.



  The first rule of thumb when using kerosene appliances is to use

good-quality kerosene fuel. K1 is usually the best, but always follow

the manufacturer's recommendations. If someone you know should offer

you some other kind of fuel that they say will work in your kerosene

appliances, such as jet fuel, no matter what the price, pass it up and

buy the real thing.



  Another rule of thumb when using kerosene appliances is to store the

fuel in an approved container and keep the cap on tight to prevent

spills and contamination. If the can you want to use had gasoline in

it at some time in the past, no matter how thorough you may have

washed it, do not use this can for your kerosene fuel. Only use cans

that have had nothing other than kerosene in them.



Local Regulations and Maintenance



  Some communities do not permit their citizens to use kerosene

appliances in some environments. This is especially true of apartment

tenants. However, in some communities this also applies to single-

family dwellings. So, before you buy a kerosene lantern or space

heater, be sure to check with the local building codes authority and

fire inspection department to find out if they are allowed.



  Naturally, after sitting all summer without being used, always take

your kerosene appliances to a specialist to have them maintained.

Cleaning is very important and you should have them install a new

wick. Be sure the technician that works on your appliance uses only

replacement parts approved by the original manufacturer.



  Another important aspect associated with using kerosene appliances

is the distance between them and combustible materials in the

environment. Maintain at least one foot (12 inches) of space between

them and draperies, furniture and other combustibles.



  These appliances also require constant supervision to assure that

they do not catch on fire or cause a fire by radiated heat. In

addition, supervision assures that children in the home will not come

into contact with the hot surface of a kerosene device.



  Another concern is that of carbon monoxide. Are you using your

kerosene appliance in a well-ventilated area? What about a carbon

dioxide CO  detector? In a tightly sealed room, CO could become an

issue in short order, causing those inside the enclosed area to become

ill or even perish. A CO detector will provide early warning of such a

problem. Because power may be an issue during a disaster, it is

probably wise to purchase both a battery and electric model.



Thawing Water Pipes



  Frankly, one of the things that people mistakenly do is use kerosene

heaters to thaw out water pipes. The best procedure is to thaw pipes

by naturally heating the room. They take longer to thaw, this is true,

but the fire risk of the other alternative is too great and

potentially costly to consider. Another alternative, if electricity is

available, is to use an electric hair dryer.



  Another risk in the home is the use of what some call a "salamander"

kerosene heater. These are often found on construction sites in some

portions of the country. One man lost his new home and almost his

family when he used one for this very purpose. He only walked away

from it for three minutes--instant inferno.



  There is little doubt that kerosene heaters make a great emergency

source of heat and light. But they also contribute to many winter time

fires and fire deaths. Before using your kerosene heater, be sure to

follow the above advice and read the instruction manual that came with

your kerosene appliances.



Editor's Note: Remember, if you use a kerosene heater in the wrong

   way, you may get one of those house calls from your local fire

   department. Using a kerosene lantern can also get you into trouble

   if you do not know how to safely use them. I cannot stress enough

   the need to read the instruction manual that came with your

   appliances, or you might end up taking an unexpected trip to the

   hospital. In the mean time, think SNOW!!!  --Nick Markowitz

   

          +------------------------------------------------+

          | Send your comments and questions to the author |

          | of this story at safety.security@cancomm.com   |

          +------------------------------------------------+



                         ----------*----------

                                 III.

                           Personal Safety:



                        Carbon Monoxide -- The

                             Silent Killer





               ----------------------------------------

                Reprinted from the November 1995 Issue

                   of the Safety & Security Magazine

               ----------------------------------------





Ron Nelson



  According to the US Consumer Product Safety Commission CO Fact

Sheet, in the year 1989 there were 295 deaths associated with CO

poisoning and close to 5,000 people are treated each year in emergency

rooms for symptoms of CO poisoning. The problem has grown so great

that in 1993 President Clinton declared the last week in September as

"CO Safety Awareness Week." Many municipalities have also adopted

legislation requiring the installation of CO detectors in homes and

recreational vehicles





What is Carbon monoxide?



  CO is a colorless, odorless, and highly poisonous gas that is

produced when fuels containing carbon are burned. It is about 3%

lighter than air and as such tends to rise under normal conditions.

It is dangerous because when it is inhaled it combines with

hemoglobin, the oxygen carrying substance in blood cells, and prevents

them from absorbing needed oxygen. This lack of oxygen causes

headaches, nausea, followed by unconsciousness and ultimately death.

As little as 1/5 of 1% may prove fatal in less than 30 minutes. CO is

a particularly  insidious gas since it is odorless and someone may be

exposed to dangerous levels without knowing it.



Symptoms of Carbon Monoxide poisoning:



  * Mild exposure- Slight headache, nausea, vomiting, and fatigue.

            These symptoms are sometimes described as "flu like".



  * Medium exposure- Severe throbbing headache, drowsiness, confusion,

            fast heart rate.



  * Extreme exposure- Unconsciousness, convulsions, cardiorespiratory

            failure, death.



  The disorientating effects of CO poisoning often prevent the victims

from seeking help even though they are aware that they are not feeling

well.



  Each year many deaths are caused by CO gas escaping from furnaces,

stoves, and fireplaces when the ventilation is not properly regulated.

If you develop CO poisoning symptoms leave immediately and call your

local fire department or ambulance if the symptoms are severe. You may

also notify your local gas company or HVAC contractor.



Types of CO detectors

                                                              

There are 2 basic types of CO detectors, Biomimetic and Taguchi.



  Biomimetic units, also called gel cell or litmus, utilize a

semipermeable gel that changes color when exposed to CO. This gel

absorbs CO at the same rate as human hemoglobin, and its color is

directly related to the amount of CO absorbed. The detector has a

light beam which shines through the gel and senses the change in

color, activating the device. These units require that the sensor pack

be replaced every 2 years and are also known to be sensitive to

cooking or other fumes.



  Taguchi units, also called tin oxide or figaro, utilize a specially

doped semiconductor that changes its resistance when exposed to CO.

The detector senses this change and activates the unit. A new

technology for detecting CO is called non-dispersive infrared. This

type of detector is still under development but promises to be a much

better and reliable method to detect CO.



Installation of detectors



  Due to its lighter than air composition CO detectors should be

located near the top of a wall or on a ceiling. Do not mount it

directly in a corner since the normal movement of air causes a dead

spot in that area.

                                                                    

  In addition do not locate it within 5 feet of a CO producing source,

such as furnace, since false alarms may occur. Due to the unique

composition of CO, detectors are specifically designed to react only

to its presence and are not combined with other types of gas

detection.

                                      

Power and connection to security systems



  The detectors currently available may be powered by batteries, 110

vac, 12 vdc, or 110 vac with battery backup. Units may also be

purchased that have a relay output for connection to any security

system control or wireless transmitter.



  If you will be connecting your detectors to a security system, they

must be installed on dedicated 24 hour zones to insure proper reaction

to an activation. As always, make sure that you  completely read the

detector instructions that are packed with each unit, and follow all

of the manufacturers directions.



What to do if your detector activates



  If your CO detector activates you should leave the location

immediately and check to make sure everyone got out. Call your local

fire department, your local gas company or HVAC contractor. You can

open the windows to ventilate the area and clean out the CO buildup.



  Do not take any chances, it is much better to call for assistance

than to become another statistic. It is also possible for CO poisoning

to occur from faulty exhaust pipes on automobiles or trucks. If you

begin to experience headaches or nausea while driving or riding in an

automobile or truck, you should open the windows immediately and have

the exhaust system checked.



 Monthly maintenance



   Cleaning- You should clean the outside of the detector with a vacuum

 or soft brush and make sure that no objects are blocking the unit or

 restricting air flow around it.



   Testing CO detectors- These units are designed to detect only Carbon

 monoxide so they can not be checked for actual operation. If the unit

 is equipped with a test button you should use it to test the unit. If

 your detector is connected to a remote monitoring office please

 remember to notify your security company prior to testing.



   For additional information check your local library or you can

 contact your gas supplier, utility company, local fire department, or

 HVAC contractor.



          +------------------------------------------------+

          | Send your comments and questions to the author |

          | of this story at safety.security@cancomm.com   |

          +------------------------------------------------+



                         ----------*----------

                                  IV.        

                             In The News:



Cases of Drug-Resistant

Tuberculosis on Rise



  As reported in the September, 1996 issue of Safety & Security, the

advance of drug-resistant TB is on the rise. Recently, a survey

conducted by researchers for the World Health Organization (WHO) and

the U.S. Centers for Disease Control and Prevention (CDC) confirmed

the existence of multi-drug resistant (MDR) TB in one third of the 35

countries who were queried. TB is caused by an airborne bacterium.

This new strain of TB is almost sure to spread to other countries.

This is of grave concern to the world health community because WHO's

research reveals that anyone infected with TB of any strain is likely

to infect 10 to 20 people every year.



  The drug-resistant strain of TB is said to be the result of poor

medical practices, such as infected people that fail to take all of

the medication prescribed. This common, wide-spread practice permits

drug-resistant strains to occur. Also a problem, doctors often

prescribe the wrong medication, which essentially has the same effect.



  Because the cost of treating MDR tuberculosis is about a hundred

times more expensive than traditional TB, a large portion of the

people who have it will not receive the correct treatment. Not only

will the assure the death of these people, but it will serve to

further spread these mutated strains.



  WHO reports a 96% recovery rate among patients who use Directly

Observed Treatment Shortcourse (DOTS). DOTS entails the suprvision of

patients being treated by better assuring that they take the right

medication for the prescribed period of time. According to WHO,

because not everyone has access to DOTS, only 3 million of the 8

million cases of TB reported annually are curable. For additional

information on this strawin of TB, check out WHO's web site at:

http://www.who.ch/programmes/gtb/dritw/foreward.htm.



                              -----*-----



Corrections Privitization

in New York Not Likely



  Dennis C. Vacco, Attorney General of New York says that in his legal

opinion, the privitization of prisons in New York State is not likely.

According to Corrections Journal, Pace Publications, May 21, 1997;

"senator Michael Nozzolio, chairman of the Senate's Crime Victims,

Crime, and Correction Committee, asked for the opinion after learning

of inquiries made by the Corrections Corporation of America, the

leading private corrections firm in the nation...."



  Lack of proper training and limited powers were two of the issues

that Vacco mentioned in his legal opinion. He said that employees of

private corrections companies would not be sworn peace officers, but

rather private citizens. This means that their right to use force

against prisoners would be greatly limited by New York law. Because of

this, private correctional employees might not be legally able to

apply the necessary force required to stop a prison riot or ward off

an escape--not without serious legal consequences. Not only that, but

prisoners that try to escape from a privately run correctional

facility could not be legally charged with Escape or Attempted Escape

according to New York law.



Editor's Note:  For more information on correctional issues or their

   semi-monthly publication "Corrections Journal," ISSN 1089-2575,

   contact Pace Publications, 443 Park Ave. South, New York, NY 10016;

   phone 212-685-5450; or by fax 212-679-4701. --Al Colombo

  

                              -----*-----



Call For Encryption Algorithms

for Advanced Encryption Standard



  Security product manufactures, voluntary standards organizations and

others are invited to submit their encryption algorithms for

inspection and evaluation. The algorithm selected could become the

basis of an Advanced Encryption Standard (AES). According to a notice

published in the 12 Sept. 1997 Federal Register, the AES will specify

an unclassified, publicaly-disclosed encryption algorithm that will be

made available, royalty free, to anyone in the entire world for

protecting information.



  Candidate algorithm submission packages must be received no later

than 15 June 1998. Submissions received prior to 15 April 1998 (tax

day :-) will be reviewed for completeness by NIST and their submitters

notified of any deficiencies by 15 May 1998. This should allow time

for corrections before the 15 June deadline.



Editor's Note:  For more information on the AES program, contact

   Technology Lab, Attn: AES Nominations, A231 Technology Bldg., NIST,

   Gaithersburg, MD 20899; call 301-975-3696; fax 301-948-1233; or E-

   mail aesquest@nist.gov. You can also visit the AES web site at:

   http://csrc.nist.gov/encryption/aes/aes_9709.htm. --Al Colombo



                              -----*-----



NIST Reports on New DNA

Sequencing Technologies



  National Institute of Standards (NIST) reported a new DNA sequencing

technology, developed by GeneTrace Systems Inc., Menlo Park, CA, that

is hundreds of times faster than current methods and at a fraction of

the cost. It is expected that this research will lead to a set of

highly-effective drugs that will make the diagnosis of diseases and

the identification of people, as part of a forensic exercise or

paternity test much faster.



  Co-funded by both NIST and Technology's Advanced Technology Program,

the company developed the technology needed to apply fast and accurate

mass-spectrometry techniques to the identification of DNA fragments.

The system is able to identify the sequence of base chemicals in a

given DNA strand in as little as five seconds, rather than the three

hours required for conventional DNA separation today.



  GeneTrace reduced labor costs by using a robotics system for initial

sample handling. The process combines DNA probing, sequencing and

sizing reactions with mass spectrometry. Eight patents on this new

process are now pending. The company expects this technology to lead

to genetic screening tests for as little as a few dollars, compared

to the $300 to $5,000 now required. Several companies are now using

GeneTrace's technology for pilot projects that focus on gene discovery

and expression, genotyping and other topics.



  In an entirely different effort, NIST recently reported the

existence of a new DNA chip technology that has the potential of

revolutionizing the sequencing of DNA, genetic disease diagnosis,

detection of pathogens in food and water, forensics and personal

identification and other applications. The NIST DNA chip is made of

one layer of single-stranded DNA molecules, which self-assemble on

gold. This forms a well organized monolayer. The surface-tethered DNA

can then bind complementary small fragments of single-stranded DNA

from solution. Such DNA sensors could be used for analysis of blood or

urine samples from a patient, or in water or food. In theory, NIST

claims that DNA chip sensors could also be developed to check for many

types of bacteria and viruses.



Editor's Note:  For more information on the GeneTrace's DNA Sequencing

   method, contact Michael Baum, NIST, at 301-975-2763. For additional

   information on the NIST DNA chip method, contact Linda Joy, NIST,

   at 301-975-4403 or linda.joy@nist.gov. --Al Colombo



                              -----*-----



Sun Research Reveals

Problems Ahead



  It was recently reported by National Public Radio (NPR) that since

1991, scientists have known that our sun is emitting two additional

spectral bands of radiation. According to public radio, so certain are

these findings that our sun was officially reclassified from its

original "stable star" category to "variable-output."



  What is the significance of this recent finding to us on planet

earth? According to NPR, this increase in energy output is thought by

some scientists to be cause of El Nino, which, according to

scientists, is not showing any sign of abatement at this time. It is

expected that El Nino will continue to cause adverse weather patterns

across the globe. Experts say it has already affected agricultural

output in developing countries, such as Australia and Brazil. Its

affects are expected to reach output in developed countries as well.





                              -----*-----



Auto-Dial Messaging for

ProActive Policing



  Police departments, like the Baltimore County, MD, police

department, are taking a proactive stance to policing using an auto-

dialer message system, manufactured by VoieWorld, Scottsdale, AZ. The

system, which costs about $5,000, enables police officials to

automatically send voice messages over the telephone network to

hundreds or thousands of residents, warning them of crime trends,

specific crime problems, and other situations.



  "We can very quickly identify all of the households in a community

that's experiencing a crime problem. We enter the phone numbers

automatically thorugh a computer to the auto-dialing system, and

within minutes, we can deliver our message to people, alerting them to

the problem and giving them suggetions as to what they can do to

reduce their chances of being victimized," said Philip Canter, Chief

Statistician, Baltimore County, MD, police department (Law Enforcement

News, John Jay College of Criminal Justice, New York, NY, 15 October

1997 issue).



  According to Canter, his department is able to discern a difference

in crime statistics in Baltimore County because of this auto-dialing

system. In fact, the same system was used by Los Angeles Police

Department to warn police officers in LA County after the verdict in

the 1992 state trial of LAPD officers who were charged in the beating

of Rodney King.



                              -----*-----



Supreme Court on

Religious Freedom



  The Supreme Court recently ruled (City of Boerne versus Flores) that

the Religious Freedom Restoration Act of 1993 is unconstitutional and

that by passing this act, Congress overstepped its Constitutional

authority and interfered with state soverignty.



                              -----*-----



The Great Chicago Fire

Change in Story?



  If Richard F. Bales, a title insurance lawyer in the employ of

Chicago Title Insurance Co., is right, Mrs. O'Leary's cow may not have

tipped over the kerosene lantern that was alleged to have caused the

great Chicago Fire of 1871. According to records, the fire that killed

300 and made homeless more than 100,000 started in Mrs. O'Leary's

barn. The popular story has it that her cow kicked over the lantern as

she was being milked.



  According to Bales, the fire may have started in O'leary's barn, but

Mrs. O'Leary may not have been the culprit. One of the problems with

the original investigation, says Bales, was that no one had adequately

mapped out the area. Because he has ready access to the property

records kept by Chicago Title, he was able to detect possible

discrempencies in a Peg Leg Sullivan's story.



  "[Bales] was struck that Peg Leg Sullivan seemed to have a lot to

say. Sullivan said he had been in front of another neighbor's house

and had seen the fire break out in the O'Leary's barn. But Bales

discovered that the title records showed that at least one house,

maybe two, plus an 8-foot-high fence would have blocked Sullivan's

view," says Pam Belluck, author of MRS. O'LEARY'S COW MAY HAVE BEEN

FRAMED, published by The New York Times.



  At the time, Sullivan told authorities that he ran to Mrs. O'Leary's

barn to save the animals, then ran out of the barn to get help. All of

this he did on his wooden peg leg, says Bales. Records also revealed

that Sullivan told authorities that he visited the barn every evening

to feed a cow that his mother kept there. All of this, says Bates,

throws a serious doubt on the popular story that claims that Mrs.

O'Leary's cow started the fire.



     +----------------------------------------------------------+

     | You can send your comments and questions regarding these |

     | stories by sending them to safety.security@cancomm.com   |

     +----------------------------------------------------------+



                         ----------*----------

                                  V.         

                                 Mail:



From: GM

Network: worldnet.att.net

Date:

Subj: domestic violence; April, 1997 issue



  The article in your April S&S Magazine, which covered the Domestic

Violence Offender Gun Ban, sponsored by Senator Frank Lautenberg (D-

NJ), shows another prime example of the twisted thinking and

conflicting statistics fostered by the Clinton administration and his

left-wing comrades in Washington.



  I remember, as part of Clinton's policy on crime, he was going to put

"100,000" more cops on the street.  That figure in reality has become

approximately 18,000 to 25,000 additional police officers so far.



  Now... enter the Domestic Violence Offender law, and we lose 60,000

police officers.  That gives us a NEGATIVE gain of from 35,000 to

42,000.  I guess that's what comes from outcome-based education.



  Just because you are living in a rural area, and maybe only own a

double-barrel shotgun, don't turn your back on the city folks who

have had their handguns taken away!  Mr. farmer, YOU could be next!



  A story on the American Freedom Network this week told of a new

"Anti-Gang" crime bill that would disqualify you from ever owning a

firearm if you so much as had a shoplifting charge against you when

you were in grade school!



  Come on people... WAKE UP!  The government has slowly and

methodically picked away at our society by eliminating our 2nd

Amendment rights one class at a time, and one weapon at a time.



                              -----*-----



From:  John Rich

Network: CompuServe

Date:  September 15, 1997

Subj:  Evaluation of Pepper Spray



Source: NIJ Research in Brief, U.S. Department of Justice Office of

Justice Programs, National Institute of Justice. You can find the full

report at: www.ncjrs.org/txtfiles/162358.txt



 Key Findings:



 o OC spray successfully incapacitated humans in 156 out of 174 (90

   percent) confrontations.



 o In 18 encounters, subjects were not fully "subdued " by OC; in 7 of

   these incidents, subjects exhibited bizarre behavior and appeared

   to be on drugs or mentally troubled, thus suggesting that such

   individuals may not yield to OC's effects.



 o While assaults on officers were declining prior to implementation

   of the OC spray program, the rate of decline increased after OC was

   introduced.



 o Twenty-one officers received minor injuries when they used the

   spray, but none reported lost work days.



 o Similarly, only 14 suspects received injuries, none of which

   required hospital treatment.



 o Use-of-force complaints decreased by 53 percent in the study period

   despite decreased manpower and increased demand for services. No

   complaints addressed the use of OC.



 o Although training instructions stated that sprays were maximally

   effective from a distance of 4 to 6 feet, many officers applied the

   aerosol to humans from distances of less than 3 feet, which may

   have diminished the spray's effectiveness.



 o Overall, study findings showed that a well-developed OC-spray

   program can provide operational benefits to police.



 Interesting triva about pepper spray:



 As early as 2300 B.C., Chinese armies dispersed enemy forces by

 using "stink pots" -- red pepper burned in hot oil that produced

 irritating and suffocating smoke -- in massive frontal assaults.



Editor's Note: Thanks to John Rich for the OC update. --Al Colombo



                              -----*-----



From: Russ

Network: aol.com

Date: October 6, 1997

Subj: Thank you.....



Al,



What a great service you are providing. I am buying my first home and

want to install my own security system. How do I get in touch with the

International Association of Retired Police Chiefs for a kit to mark

my personal belongings and obtain window stickers stating same?



One more thing, I have read most of the info that you have published

re: home security, but I have not been able to find a dealer or

catalogue from which to purchase the necessary components to make my

own customized alarm system.



Once again, the information I have received thus far has been of great

help to me of which I am most appreciative.



Thank you, Russ



                              -----*-----



From: Will

Network: bkstr.ucsb.edu

Date: October 17, 1997

Subj: Link to our site         



If you would like could you add a link to our web site at the UC Santa

Barbara Asset Protection. We have a lot of loss prevention info and

report forms at the site. We also have a live video feed so people

visiting our site can see who or what we are watching.



Thank you.



Will Wood, AP Director UCSB AP web site- 

http://www.bookstore.ucsb.edu/lp/lp.html



                              -----*-----



From: William Plante

Network: home.com

Date: October 13, 1997

Subj: Feedback on e-zine



Hi!



I am a security consultant based in the Phoenix, AZ area and originally

from Canada. I was browsing the web when I hit your home page.



Wow, neat e-zine. You obviously dedicate a great deal of time and energy

to maintain this service - you should be highly commended for your

efforts.



Thanks.



William Plante

Principal Consultant

Corinthian Consulting, LLC





   +---------------------------------------------------------------+

   | You can send your comments and questions for inclusion in     |

   | the mail section by sending it to safety.security@cancomm.com |

   +---------------------------------------------------------------+



                         ----------*----------                     

                                  VI.

                          Question & Answer:



                        Identity Fraud Concerns



               -----------------------------------------

                      "Question & Answer," a new

                  department for difficult questions.

               -----------------------------------------







   Expert: John Bailey, CPS; Las Vegas, NV

Biography: Bailey specializes in wholesale database and other

           information services. Nation-wide investigative referral

           service, executive protection and privacy, tactical and

           custom mission-specific training programs, and software for

           investigators. E-mail: Task_force@compuserve.com



                        -----------------------



READER'S QUESTION -- In the early hours of Sunday morning my home was

   burglarized. The thief's only loot was my fiance's purse. It

   contained almost no cash but did include her "identity." It

   included her Social Security Card, Driver's License, credit cards

   and other things of minor value.



   I read in an article that with the information that the thief got

   he/she can create a new "identity."  I also read that that there

   was a way to advise the credit agencies that under no circumstances

   should they allow anyone to receive credit using this ID.



   I have three questions about all of this:



         1) -- How does one go about this?



         2) -- When she needs to, how does she get access to her own

               credit?



         3) -- I noticed that when you apply for credit it is noted on

               the bottom who has attempted access of your credit

               history. Is it wise to get a copy of your credit

               history every month for a while after a situation like

               this to see if anyone is attempting access? And if so,

               how?



BAILEY'S ANSWER -- You did not mention whether you were home or not.

   If you were, count yourself lucky that you did not have to cope

   with the worse. This is pretty typical of a "cat" burglar job,

   where they take the easiest item(s) and leave without taking the

   risk of searching for more loot. Without knowing more details, it

   is hard to draw conclusions about the probable perps. If, for

   instance, the purse was visible from the outside of the house, and

   the window was open, any neighborhood kid could have done it on a

   dare, and everything but the cash probably went into a nearby

   dumpster or ditch.



   I want to comment on the notion that a person's identity is

   contained on pieces of paper and plastic. This reminds me of the

   way certain native peoples fear that photographs steal their souls.

   The media has worked hard to maximize the emotional impact of this

   issue to make it more newsworthy. They have inadvertently also

   maximized the emotional impact of ID theft on the victims by

   promoting the concept that a human being's identity held captive by

   ink on paper. Tell your fiancee that you still know who she is -

   Her "identity" is intact. All that has been taken are some papers

   that have no intrinsic value. Help to minimize the impact of this

   issue.



   Make sure that no keys were taken. Change locks if necessary. And,

   an all-around security review is definitely in order for emotional

   reasons as well as practical ones. It is possible that your

   perpetrater is more than a thief, so advise your intended

   concerning physical security, etc. The two best tools for this are

   awareness and physical barriers.



   The remainder of your letter asked about the thief potentially

   using your fiancee's papers to create a new identity. I have worked

   some of these fascinating cases assisting the Secret Service, the

   Postal Service, NYCPD and other agencies. Fraud is a growth

   industry, and we can count on seeing more of it and endless new

   incarnations as communications and banking technologies evolve.



   You asked specifically about "advising the credit agencies" to keep

   the thief from obtaining credit in your fiancee's name. This theft

   is not the typical way in which a fraudster would go about

   obtaining information. It is too dangerous, and pays too little.

   However, the thief may sell the ID to someone else who is smarter.

   So, some fraud crimes may arise from the original theft.



   The credit bureaus are not particularly interested in every stolen

   purse. And, they have no control over who receives credit. You also

   do not want to muck up her credit file over this. Nevermind about

   the credit bureaus. They protect the banks, that frankly do not

   care about one instance of fraud. Let us concentrate on protecting

   you and yours instead.



   Fraud schemes vary. The most common attack would involve obtaining

   credit in your fiancee's name and absconding with merchandise or

   cash advances on a card. There is not much you can do about this,

   even if her purse were not stolen. It is a very common crime. The

   good news is that you are not liable for the bills, and it

   should not cost much more than some aggrevation with the banks.

   This type of crime has become common and banks are now easier for

   consumers to deal with about it. 



   Of more concern are frauds that could target your lady's own bank

   account through the use of various check or transaction schemes. In

   the wake of this theft, the lenders for stolen cards will usually

   close those accounts and issue new cards with new account numbers.

   Have your fiancee call all of her credit card lenders - not just

   the ones whose cards were stolen. Have them note the accounts. 



   Specifically, tell them that no change of address is planned, and

   that any changes in address should alert them. Have the accounts

   noted that no extra cards should be issued to "husband" or other

   family members. Have her establish some security protocol with

   them, using a security code OTHER than SSN, or mother's maiden

   name. Your fiancee can contact her bank(s). She can ask them about

   security protocols to curtail fraud, and she can establish

   procedures (passcode) for the release of account information.  If

   banking information was in the purse, she can consider closing the

   account and opening a new one, or even changing banks.



   General security against all kinds of identity theft should

   include, as in this case, physical security of documents. That

   includes security of your trash. Many fraudsters obtain the

   foundation of their information by picking through garbage. Some

   people throw away the most interesting things. In my investigative

   career, I have found everything from interoffice memos about

   illegal toxic dumping, to copies of CEO's personal 1040 forms and

   attachments. A good fraudster can use a single sales receipt, a

   bank deposit slip, or a check carbon to steal from you or your

   bank. Use a good quality shredder, or use these kinds of things to

   prime your fireplace this winter.



   Other security precautions include refusing to give your SSN,

   telephone number, address, or even your name to people who do not

   really NEED to have it. Refuse to sign release forms that allow

   information to pass hands. 



   Ask people who will have access to the information you provide. Ask

   them to tell you this IN WRITING. "Do not talk to strangers" - even

   on the phone. Several fraud schemes involve coaching credit card

   numbers out of people over the phone. Never order merchandise by

   phone if the sales person called you. They may make you a great

   offer just to get your card number.



   Checking your credit report periodically is probably a good thing -

   to make sure the information is correct and current. Fraud moves

   faster than you can detect or fight by monitoring these files,

   (there are three different major files).



   Fraud is here to stay. Although you can not entirely prevent it,

   attention to your privacy and physical security can minimize your

   "victim potential." Pay attention to the rules of the game so that

   if you are victimized, at least you are not left holding the empty

   bag.



    +--------------------------------------------------------------+

    | You can send your comments and questions to the author of    |

    | these stories by sending them to safety.security@cancomm.com |

    +--------------------------------------------------------------+



                         ----------*----------                     

                                 VII.                              

                             Fire Safety:



                           Electric Heaters,

                      An Alternative to Kerosene







Nick Markowitz





1) Whenever possible, use an electric heater rather than a kerosene

   type.



2) Keep electric space heaters away from combustibles, such as drapes

   and clothing.



3) Never allow the use of an electric space heater when you are away

   from home.

 

4) Make sure the electric outlet into which your electric space heater

   is plugged is load capable.

  

5) When using electric space heaters, do not use extension cords. This

   is an almost sure way to start a fire, especially when the

   metallic conductors within it are too small and unable to safely

   handle the electrical load of the heater.

  

6) Instead of blow torches and other open-flame devices when

   thawing water pipes, use a hair dryer.



7) When there is a doubt, the best procedure of all is to call a

   professional. He has the proper tools to safely and effectively

   thaw out your pipes.



          +--------------------------------------------------------+

          | Send your comments and questions to the author of this |

          | story. Send it to safety.security@cancomm.com          |

          +--------------------------------------------------------+



                         ----------*----------                     

                                 VIII.

                             Home Safety:                            



                         Earthquakes and Fires





  Did you know fires often happen after strong earthquakes, causing

damage to homes and businesses? In fact, the Great San Francisco

earthquake that occurred on April 18, 1906 caused a lot of damage to

buildings, but the fires that burned unchecked for three days after

the earthquake destroyed the city.



  According to the National Fire Prevention Association (NFPA),

Quincy, Massachusetts, there are several steps that residents can take

now to reduce the risk of fire when an earthquake happens later.



  o Have approved flexible gas fittings installed for gas appliances

    such as water heaters, furnaces and stoves. Many gas lines break

    at their weakest point, where they are fitted to an appliance. A

    flexible fitting allows for movement during earthquakes without

    breaking the line. Check with your gas utility company for more

    information.



  o Strap your water heater to wall studs using perforated metal tape

    called "strap iron" or "plumber's tape." This will keep the water

    heater from toppling over in an earthquake, and also protects a

    large supply of drinking water you may need after the quake.



There are also many ways to avoid fires after an earthquake.



  o Use a flashlight to inspect for damage. After an earthquake, more

    people die in residential fires caused by using candles during a

    power outage than from the actual earthquake itself.



  o Avoid turning light switches on or off. A small spark inside the

    switch can touch off a fire due to leaking gas.



  o Sniff for leaking gas. If you smell gas, open windows if you can,

    and get out of the building/house. Call the gas company and fire

    department from someone else's home. If you do not smell gas, do

    not turn the gas off. You will need it for cooking and heating.



  For additional information on earthquake safety and protective

measures that you can take before a quake happens, call the American

Red Cross chapter in your area and/or the National Fire Prevention

Association (NFPA) at 617-770-3000, fax to 617-770-0700, or E-mail at

library@nfpa.org.



      +---------------------------------------------------------+

      | You can send your comments and questions regarding this |

      | story by sending it to safety.security@cancomm.com      |

      +---------------------------------------------------------+



                         ----------*----------                     

                                  IX.

                          Editor's Last Say:



                   Is Your Garbage Worth Protecting?





  There are those who believe that because everyone has the right to

public information that safeguards are not needed to protect it.

However, the other day, when I went to renew my vehicle plates, the

girl at the DMV handed me some folded papers and instructed me to take

my own waste paper home and dispose of it.



  Thinking this a bit odd, I promptly asked her why couldn't she

dispose of it here, behind the counter. She told me something that I

already knew, but hadn't thought of at that moment. She said that

recently, on several occassions, people from the bureau had

encountered people going through their trash dumpsters. She said that

they were obviously looking for papers with peoples' Social Security

Numbers, names, and birthdays on them. When I asked if they had called

the police about it at the time, she said there was nothing they could

do about it, these materials were no longer theirs to protect once

they placed them in the garbage.



  Do you think about the important kinds of information you frequently

dispose of in your trash can? Could someone be freely looking through

your garbage without your knowledge?  --Al Colombo



        +----------------------------------------------------+

        | Send your comments and questions to the author of  |

        | this story. Send it to safety.security@cancomm.com |

        +----------------------------------------------------+



                         ----------*----------                     

                                  X.

                               EndNotes:





                             S&S Magazine

                           E-mail Addresses

                                                                    

                           Allan B. Colombo

                                Editor

                        al.colombo@cancomm.com

                     http://web.raex.com/~colombo/

            

                              Ron Nelson

                               Co-Editor

                          ron@topservice.com

       http://ourworld.compuserve.com/homepages/ren_productions/



                            Nick Markowitz

                          Contributing Writer

                          nmarkow125@aol.com



                              John Bailey

                          Contributing Writer

         http://ourworld.compuserve.com/homepages/task_force/

                       task_force@compuserve.com



                              -----+-----



                           View On The Web:



                      Safety & Security Home Page

          http://ourworld.compuserve.com/homepages/acolombo/



                     Safety & Security Depository

    http://ourworld.compuserve.com/homepages/acolombo/backissu.htm



                              -----+-----



                           Bulletin Boards:



                CompuServe Information Systems Forums:

           TWCRIME, AARPFORUM, TWDWELL, EWCFORUM, SafetyNet



                    Canton Communications (CanComm)

                             Canton, Ohio

                         Online: 330-477-4504

                          Voice: 330-477-3080



                              -----+-----



                       Subscription Information:



      To subscribe to the ASCii version of the Safety & Security

[electronic] Magazine, send an E-mail message with the word SUBSCRIBE

in the message text to ccmag-request@cancomm.com. To unsubscribe, send

an E-mail message to the same address with the word UNSUBSCRIBE in the

                message text area to the same address.



                              -----+-----



                              Disclaimer



      The information and tips contained in the Safety & Security

        Magazine is meant for entertainment purposes only.  The

         authors cannot guarantee the personal safety and well

        being of those who read and use the information herein.





                           Copyright(c)1997

                      Safety & Security Magazine

                      safety.security@cancomm.com

                            P.O. Box 30076

                        East Canton, Ohio 44730

                          Phone: 330-488-1119












1 comment:

  1. Great to see this collection of Safety & Security Magazines on your blog, Nick. Thanks for sharing them. Al

    ReplyDelete