60
Analysis | What’s an axolotl? Why obscure animals rule kids’ world. – The Washington Post
Analysis | What’s an axolotl? Why obscure animals rule kids’ world. The Washington Post
source
A strategic approach to protecting corporate executives – SecurityInfoWatch
Since the release of the video footage showing the shooting of UnitedHealthcare CEO Brian Thompson on December 4, many security professionals in the media have pointed out potential security failures that may have made it easier for the killer to carry out this horrific crime. While many facts of the case are still being processed, we know at a minimum that Thompson was walking alone without a security detail despite having received recent threats and was targeted by the killer. Shooting suspect Luigi Mangione was arrested in Altoona, Pa., on December 9. In time, we’ll learn more about what other security lapses could have contributed. Still, for now, this tragic event has driven corporations and the public to consider the necessity of robust executive security programs.
Unfortunately, in the time since the murder, we have borne witness to a disturbing tolerance – even encouragement – of violence across swaths of the American populace. Many are celebrating the suspect as a hero across social media. According to the Network Contagion Research Institute, following Thompson’s killing, a surge of highly engaged posts across social media, generating impressions in the tens of millions, glorified the incident and called for additional acts of violence. Merchandise went for sale online, including hats, T-shirts, and pint glasses bearing the words “delay,” “deny,” and “defend” – the same words etched on the killer’s bullet casings. Wanted Posters for other executives have been hung on the streets of New York City, some show Thompson’s face with an “X” to indicate that he is the first “villain” to be eliminated.
This vitriol has heightened the threat of violence against corporate executives across a wide range of industries and is driving companies to enhance security measures for their top executives. According to reports, some health insurers are temporarily closing their headquarters out of an abundance of caution. Others are adding or expanding armed security protection for executives and reducing or deleting executives’ digital footprints. While some of these measures may be short-term, the impact of this event should drive companies to take a hard look at the threats facing their top executives. The board of directors will likely weigh in and demand more investment to implement appropriate security measures.
The hard truth is that short-term security surges or simply hiring a security detail are more performative than substantive, and security theater is more than actual security. These quick and easy fixes are not a substitute for a well-planned executive protection (EP) program that is thoughtfully designed and horizontally integrated with other security functions, including intelligence, physical security, cyber security, and crisis management, supported by clear policies, procedures, and training.
The hard truth is that short-term security surges or simply hiring a security detail are more performative than substantive, and security theater is more than actual security.
Unfortunately, there is presently no industry standard for executive protection. This makes the design of an EP program less straightforward. However, the Board of Executive Protection Professionals is developing a standard and hopes to have one approved by the American National Standards Institute (ANSI) sometime next year. In the meantime, many best practices are available, which any future Standard will likely codify. Throughout my forty years as a senior security executive, I was able to draw upon many of these practices and successfully apply them when building EP programs for my organizations.
Threat assessment is the critical first step in any EP program. Identifying credible threats to senior executives—both at program initiation and continuously—determines the appropriate scope of the EP program, the level of protection needed for certain executives, and whether protection should extend to certain less senior employees or family members.
Continuous threat assessment should take into account all possible risks to the executive and consider risk factors related to the executive, such as their public profile and organizational or political affiliations; factors related to the company, such as controversial products and practices, corporate downsizing, negative media, and past or pending criminal, civil or regulatory issues; and factors related to the broader environment, such as political turbulence, geopolitical dynamics, macroeconomic hardships, and emerging trends and technologies.
Threat assessment should be complemented by vulnerability assessment, which involves reviewing a wide range of locations and activities undertaken by the executive daily. These include the executive’s workplace, homes, travel itineraries, transportation, family, children’s schools, digital footprint, media appearances, and corporate and public events attendance.
Attacks against corporate executives can have dire consequences not only for the executives and their loved ones but also for the financial and operational stability of the company. Therefore, updates on the risk environment should not be shared only with the security team but also put on the radar of the C-suite and Board as appropriate.
You can build a comprehensive EP program based on a solid assessment of the threats and vulnerabilities. These programs typically cover various preventative measures to provide a 360-degree defense-in-depth of the executive. While not a complete list, the following are some areas for consideration when evaluating your EP requirements and building a program. All should be based on continuous risk assessment.
· Physical Security: EP programs should include written standards for protecting executive office suites and residents. Standards should outline the application of electronic security, remote monitoring, bullet-resistant doors and windows, panic rooms, and the use of security personnel. Guidelines should also be developed for secure transportation to and from the office using trained drivers and hardened vehicles.
· Event Security: Procedures for securing executives at high-profile corporate or public events should be developed. These should include assessing threats and ensuring coordination between security teams, event planners, venue security, and law enforcement to identify vulnerabilities and required security measures.
· Travel Security: A travel security program should be in place to identify and analyze threats within the visited locations. Considerations for additional security on the ground should include aviation security (private aircraft), secure ground transportation, hotel security, and measures to protect the executive and organization from espionage. Travel security services that provide traveler tracking capabilities and medical or security evacuation services should be considered. Emergency and communication protocols for travel emergencies should include coordinating with law enforcement, embassies, emergency services, and other stakeholders to ensure rapid response to potential threats, enable emergency evacuations, and ensure effective 24/7 communications during emergencies.
· Digital Footprint: Executives’ digital footprints should be reviewed to limit public information and photos of their home location and layout, family trips, children’s schools/camps/sporting events, memberships, and any other information that could be used by individuals seeking harm.
· Crisis Management: All companies should have emergency response and incident management procedures in place to deal with elevated threats or actual incidents that may occur. This should also include guidelines for responding to incidents involving kidnap-for-ransom events.
· Training and Awareness: Security training and awareness should be developed and provided to executives, administrative staff, and families. Depending on the executive and the environment, this may include tactical skills, counter-surveillance, survival skills, emotional and psychological preparedness, cybersecurity awareness, and other forms of training.
· Vendor Analysis: Companies should carefully analyze existing and potential EP vendors – including armed security personnel services, intelligence services, electronic security integrators, cyber protection firms, travel security services, and executive car services – to ensure professional, discreet, and cost-effective service. This vendor analysis must be informed by a current understanding of the threat to ensure contracted services are purpose-fit to the organization and do not create unnecessary costs.
In the days following any crisis – certainly one that has received the media attention of the Thompson murder – it can be tempting to make quick and reactive decisions. Hire a security detail. Take the executives’ photos off the website. Lock down the HQ. However, these measures are scaled back in the following weeks and months – judged too invasive or costly to maintain. A better approach is thoughtful, strategic, and methodical – doing things the right way, not the easy way. For that, companies will need to take a deeper and more time-intensive look at their organization, their culture, and their budget to build an EP program that lasts.
Rick Mercuri is Senior Advisor for Corporate Security at Rebel Global Security. Rick has served as senior security executive at two of the largest U.S. banks. For four decades in corporate security, Rick has demonstrated strong leadership and strategic decision-making for global and domestic organizations. Rick is a trusted advisor to C-level executives and a thought leader with expertise in mitigating complex physical security risks and developing threat intelligence capabilities. Rick is a Certified Protection Professional (CPP).
Humanity’s fate must not be left to algorithms, UN chief tells Security Council – UN News
Facebook Twitter Print Email
The UN Secretary-General on Thursday urged the Security Council to act decisively to establish international guardrails for artificial intelligence (AI), warning that delays could heighten risks to global peace and security.
Addressing ministers and ambassadors, António Guterres warned that rapid developments in AI are outpacing humanity’s ability to govern it, raising important questions about accountability, equality, safety and human oversight in decision-making.
“Every moment of delay in establishing international guardrails increases the risk for us all,” Mr. Guterres said.
“No country should design, develop, deploy or use military applications of AI in armed conflict that violate international humanitarian and human rights laws. That includes relying on AI to select or engage targets autonomously.”
He also underscored that geopolitical competition over emerging technologies must not destabilize international peace and security.
In his address, Mr. Guterres highlighted the dual-edged nature of AI, noting its potential to predict displacements caused by climate change or detect landmines. However, its integration into military systems and its misuse in digital security poses great risks.
“Recent conflicts have become testing grounds for AI military applications,” he said, citing AI use in autonomous surveillance, predictive policing and even reported life-and-death decisions.
Particularly alarming, he underscored, is the potential integration of AI with nuclear weapons and the advent of quantum-AI systems that could destabilize global security.
“The fate of humanity must never be left to the ‘black box’ of an algorithm,” he stated, stressing the importance of human control over decisions involving the use of force.
The role of AI in the information domain is another area of concern, Mr. Guterres said, pointing to how deepfakes and AI-generated disinformation can manipulate public opinion, trigger crises and erode trust in societies.
He also drew attention to the environmental risks of AI, highlighting the resource-intensive nature of data centres and geopolitical competition over critical minerals needed for AI technology.
“Unprecedented global challenges call for unprecedented global cooperation,” he said, calling for collaborative efforts to ensure AI benefit everyone and does not exacerbate inequality.
Mr. Guterres outlined recent steps toward establishing global governance for AI, including the adoption of the UN Global Digital Compact at the Summit of the Future, and two key resolutions at the General Assembly on enhancing global cooperation and capacity-building.
A third resolution – focusing on AI in the military domain – is due to be considered by the General Assembly in the coming days.
Concluding his address, Mr. Guterres reiterated his call for banning lethal autonomous weapons, he said, urging the Security Council to lead by example in preventing the militarisation of AI in ways that destabilize international peace and security.
“I urge you all to join forces to build a safe, secure and inclusive AI future.”
An alarming surge in ransomware attacks is putting the world’s healthcare infrastructure at critical risk, endangering patient safety and destabilising health systems, the head of the UN World Health Organization (WHO) warned on Friday, as the Security Council convened to discuss strategies to counter the growing threat.
The UN Security Council on Monday explored the dual-edged nature of rapid technological advancements – ranging from artificial intelligence to neurotechnology – highlighting both groundbreaking solutions and emerging risks to global peace and security.
Facebook Twitter Print Email
Worldshards Launches Complete in-game Economy With Pre-tge Airdrops for All the Active Players – Decrypt
Former Polk County teacher arrested for a relationship with a former student – WFTV Orlando
WFTV Now
POLK COUNTY, Fla. — The Polk County Sheriff’s Office arrested 36-year-old Donald Mitchell out of Lakeland Wednesday, Dec. 18, 2024, on sexual offenses against a student by an authority figure.
On Dec. 10, 2024, a 19-year-old former student at Kathleen High School, reported via social media that she had been engaged in a sexual relationship with Mitchell from October of 2023, when she was a student at Kathleen High School, to November of 2024, after her graduation, according to PCSO.
When questioned about the relationship, Mitchell denied there was any sexual component to their relationship until after she graduated but admitted to texting her often.
After examining his messages, PCSO Specials Victims Unit and Computer Crimes Unit determined Mitchell uses his position of authority over the victim inappropriately.
Read: Amazon drivers strike days before Christmas
“Using one’s position of authority and trust over a student is egregious. Students rely on teachers to be educators and mentors, and Mitchell abused this trust by turning the relationship between him and his student sexual. This type of behavior will not be tolerated.” – Sheriff Grady Judd.
Mitchell, formerly a teacher at Kathleen High School, is now employed as a Community Outreach Facilitator for the Polk County School Board.
He has been placed on administrative leave pending further investigation by the school board.
Read: Several people hurt during hazmat fire in Orlando, firefighters say
Click here to download our free news, weather and smart TV apps. And click here to stream Channel 9 Eyewitness News live.
©2024 Cox Media Group
Carl-Max Millionard is a Content Creator for WFTV.com.
© 2024 Cox Media Group. This station is part of Cox Media Group Television. Learn about careers at Cox Media Group. By using this website, you accept the terms of our Visitor Agreement and Privacy Policy, and understand your options regarding Ad Choices.
Pudgy Penguins Airdrop PENGU Bounces From Recent Bottom – Time to Buy? – Cryptonews
How to write code for your Raspberry Pi Pico in your web browser with ViperIDE – Tom's Hardware
Japanese Anime Animated $19.8 Billion in Global Revenue in 2023 – TV Technology
Chrome crashed and you lost all of your tabs? Here's how to get them back – ZDNet
It was midnight. The witching hour. And also my bedtime. As I was coming back to the family room from brushing my teeth, I heard an exclamation of frustration. I walked in and found my wife scowling.
"What's wrong, honey?"
"Chrome just exploded," she replied. "And I lost all my tabs."
She was very upset. She keeps a lot of tabs open. A lot. I personally practice perfect tab hygiene and never have more than three or four tabs open at once. Yeah… that's the ticket. Never more than… oh, who am I kidding? I have a bonkers number of tabs open, too.
Also: I have 100 Chrome tabs open, but you'd never know it with this sneaky trick
One big difference between her and me is that I use tab groups for most of my open tabs. She does not. Tab groups sync between Chrome instances on other machines, so if one Chrome crashes, those groups should be retrievable simply by logging back into one's Google account.
But her tabs were just there. Out in the open. Sitting pretty, willy-nilly all across the top of her Chrome address bar, getting more and more squished together as she opened and partially read web pages or viewed videos. Her tabs were an active, important part of her working process.
And now, they were gone.
I don't usually like to do tech support after bedtime. But when one's wonderful and incredibly tolerant wife is upset due to a Chrome crash, one does tech support.
I first tried the most obvious thing. We opened her Chrome history and looked at the Recent Tabs section. But Recent Tabs only shows eight recent tabs, as if someone had just started using a computer and didn't know you could have so many more than eight tabs open at once.
Recent Tabs in the Chrome history wouldn't help. Regular history didn't help either because while it showed all her history, it showed all her history. She didn't want to sift through all those history entries, each recorded even if a page was visited for a second. She wanted the pages she had carefully selected and curated for the uppermost real estate in her Chrome window.
So then, I took to The Goog.
Also: Google's favorite Chrome extensions of 2024 can save you time and money
I found a wide range of recommendations that didn't work. During my searches (which I did on my computer so as not to spoil the resident state of my wife's Chrome), I noticed a number of people complain that trying to restore their tabs opened up new tabs and new sessions, which made restoring things all the more complicated.
From that, I have my first recommendation if you lose your tabs to a crash. It's this: Once you reopen Chrome, keep your hands off the keyboard and mouse. Don't try opening history. Don't try opening a ton of windows. Don't try doing a ton of web searches (and yeah, I know, how would you find this article — on your phone, silly).
Basically, you don't want to spoil the current state of the browser or introduce new shenanigans into the process. Let it be. Get a cup of coffee. Say a few "woosahs."
Also: My 5 favorite web browsers – and what each is ideal for
When you're ready, when you're in the proper headspace, when you're cool, calm, and collected, only then should you move on to this next step.
Sit in front of your browser. Flex your fingers, straighten up your posture, place the mouse to the side of your keyboard.
Now, if you're on a Windows machine, press and hold the Control key. If you're on a Mac, press and hold the Command key (the thing that looks like an inside-out clover). While holding one of those keys, also press the Shift key. Now type T.
Boom! One of your tabs will be back.
Type it again. And again. And again. Keep typing CTRL-SHIFT-T or CMD-SHIFT-T over and over again until all your tabs return. Don't worry if new windows open or things move around. Just keep slamming that key combination until things return to the way they were.
You gotta admit, it's a lot easier than finding an actually running DeLorean and somehow getting it to race down the shopping mall parking lot at 88 miles per hour.
Also: You can make ChatGPT your default search engine in Chrome. Here's how
CONTROL-SHIFT-T. CMD-SHIFT-T. T is for time. Think of that key sequence as your own personal tab time machine.
Oh, and my wife got all her tabs back. Happy wife, happy life.
Have you lost your tabs? Did this trick help you get them back? Or did you just give up and declare tab bankruptcy and start all over again? Share your experiences in the comments below.
You can follow my day-to-day project updates on social media. Be sure to subscribe to my weekly update newsletter, and follow me on Twitter/X at @DavidGewirtz, on Facebook at Facebook.com/DavidGewirtz, on Instagram at Instagram.com/DavidGewirtz, and on YouTube at YouTube.com/DavidGewirtzTV.