The Lure of the Dark Side
by Jeanette Friedman and David Gold
Evil is never banal.
Of course I am a doctor and I want to preserve life. And out of respect for human life, I would remove a gangrenous appendix from a diseased body. The Jew is the gangrenous appendix in the body of mankind.
SS Dr. Fritz Klein, a doctor at Auschwitz Concentration Camp
Have you ever asked yourself who educated Mengele, Freisler and the hundreds of well-trained doctors and lawyers who made the Nazi machine work? …They weren’t educated in Nazi universities. They were taught in world-renowned universities in a time when having a degree from a German university was as good as you could get.
Dr. Franklin H. Littell, Department of Religion, Temple University, Methodist minister, Holocaust scholar
Maimonides, the medieval Jewish philosopher and physician, taught that free will means that our moral and spiritual characters are never set in stone. At every moment we are able to renew ourselves and achieve great spiritual heights by doing the right thing and taking responsibility. At the same time, we are at every moment tempted by sin and can destroy a lifetime of good deeds by making even a few bad choices.
There are individuals who choose to go over to the Dark Side, a.k.a. Evil. Like Darth Vader in Star Wars, they can be vengeful, angry and bitter and work for people who use them for their own nefarious purposes. (In the end, Darth Vader sees the error of his ways and redeems himself by destroying the Empire that empowered him.)
Power corrupts; Absolute power corrupts absolutely. -- Lord Acton
Power is the central attraction of the Dark Side. People enjoy the power of controlling other people, and many times power that can be used for “good” is used instead to commit unethical and immoral acts. Most people who are evil feel that they are above the law, that they are exempt from mainstream societal mores and morals. Their sense of entitlement gives them a sense of superiority.
IS EVIL BANAL?
Hannah Arendt, a philosopher who fled the Nazis, decided during the Adolf Eichmann trial in Jerusalem, that evil was banal -- ordinary and humdrum because she thought Eichmann was banal.
She was wrong. Evil is never banal; the evildoer may sometimes be banal, if he is the one who is simply following orders. But Eichmann was not following orders. He was evil and led evil men who believed that every Jew on the planet needed to be destroyed.
Based on documents that are now available, historians agree that there was nothing banal about Eichmann and the bureaucracy of which he was a part. In Hitler's Bureaucrats: The Nazi Security Police and the Banality of Evil, author Yaacov Lozowick, clearly shows that Eichmann and his team were a group of people who were completely aware of what they were doing. They were people with high ideological motivation, who took the initiative and contributed far beyond what was necessary to achieve their murderous goals.
As he noted, “…there could be no doubt about it: they clearly understood that their deeds were not positive except in the value system of the Third Reich. They hated Jews and thought that getting rid of them would be to Germany’s good. ”
Hans Safrian, another historian (who wrote “Eichmann’s Maenner” in German) described how Eichmann was the man who sent his forces across the continent, to do their work there. He documented the conscious moral dedication that enveloped Eichmann and his men. They were anything but banal. They followed and executed their racist ideology by taking the initiative, using innovation, zeal and dedication. They may have been paper pushers for the most part, but when they made decisions, they were ruthless in condemning the Jews to their fates.
In an email to the authors, Yehuda Bauer wrote, “Eichmann managed to fool her (Hannah Arendt), and many others. He was no cog. He was part of the machine motor. He was an initiator, and a convinced and extreme Nazi ideologist and antisemite. The bureaucratic group he was part of was, the Reichssicherheitshauptamt (RSHA), was ideologically motivated and was the moving spirit of the Nazi terror machine. The RSHA was responsible only to Himmler and Hitler, and received their full support; it was the center of the terror regime. It was responsible for the Einsatzgruppen, for the Gestapo, for population movements, for the mass murders.”
All of us -- under the wrong circumstances -- have the capacity to do evil if we make the wrong choices.
In many cases the evil doer is a sociopath obsessed with the uses of power. But evil acts are not confined to sociopaths. All of us -- under the wrong circumstances -- have the capacity to do evil if we make the wrong choices.
POWER TOOLS
Power can be defined in many ways. It is the ability to get what you want because you have the talent, method or tools to do so, whether by right or might. The University of Colorado Conflict Research Consortium makes distinctions between three kinds of power—”power over,” “power to” and “power with.”
“Power over” means you control other people. Those in control can attempt to influence the masses with verbal persuasion. But if that doesn’t work, if people don’t want to do what they are told to do, the “controllers” can resort to using the violent tools of power: force, torture or threats. In most cases, when someone abuses his/her power, his/her victims become excessively dependent, and every aspect of their lives is controlled.
In a family dynamic this often manifests itself in domestic violence. In an organization or society, some leaders, usually the most charismatic, are given total power over their followers, who become their “subjects” and do as they are told. In addition to destroying their individuality, this absolves their followers from making choices and taking responsibility for their actions.
“Power to” means you have the ability, resources, and method to do whatever you want; it allows you to do things other people cannot or will not do.
“Power with” means that you bring together other entities or people who will help you accomplish your goals. In a positive world, it would be the equivalent of joining a neighborhood watch group, or founding a committee to build a park, or creating cooperation between groups or individuals to get something accomplished for the benefit of the community.
These same kinds of coalitions can be used to perpetrate evil. In communist and fascist countries, people spy on and report their neighbors for real and imagined acts. In these cases, as in Nazi Germany, children are taught to inform on their own parents and siblings. Family members who resist the party line can land in jail or worse.
DOCTORS PLAYING AT GOD
The role of a physician, a doctor, is to save life. A positive example of “power with” is Dr. Jonas Salk, who used his power to stop a dread disease, polio, from killing millions of children. Developing the polio vaccine, he used the power of persuasion to convince medical experts and government leaders that his discovery could save millions of lives. He used his power “with” the power of others to make the vaccine available worldwide. Edward R. Murrow the dean of CBS reporters, wanted to know if Salk did it for the money. In 1955, in televised interview, he asked Salk who owned the patent for the vaccine. The image shows Salk was surprised. He said, “Well, the people, I guess. There is no patent. Could you patent the sun?”
On the other hand, even before the establishment of the Third Reich, German doctors were the staunchest supporters of the Nazis. Starting in 1929, they were the first to kill “defective” German babies on Hitler’s orders. By 1942, 45 percent of non-Jewish German doctors were members of the Nazi Party, a higher percentage than any other group of German professionals. These 38,000 Nazi doctors viewed killing as a therapeutic imperative. None of the German doctors who worked on human medical experiments and were tried in Nuremberg ever admitted that what they did was wrong.
What could they have been thinking when they killed all those people?
The Hippocratic Oath, taken by doctors since ancient times, is a promise not to harm patients. During war crimes trials, 23 doctors who worked in Nazi concentration camps were found guilty of breaching the code of medical ethics by performing horrifying medical experiments on prisoners. This led to discussions regarding ethical treatment of human subjects, and outlined the ethics of medical research with regard to the human rights of these subjects.
In Auschwitz and other death and concentration camps, German doctors sold on Nazi ideology chose who would live long enough to be worked to death and who would be gassed, shot or hanged immediately. They also performed medical experiments on human beings without their consent, rarely using anesthetics. Among them were experiments to determine how quickly a poison or disease can kill, how long it takes a human being to freeze, and why twins do or don’t have the same traits. These experiments were mostly about discovering effective ways to kill. Ironically, some of the life-saving techniques used in medicine today came from some of those terrible, terrible experiments.
In the 1930s, when medical experiments based on race were conducted in the United States, no one admitted wrongdoing. On July 25, 1972, Associated Press reporter Jean Heller revealed the top-secret Tuskegee Syphilis Study that allowed a focus group of black men to go untreated for their disease. She wrote: “For 40 years, the U.S. Public Health Service has conducted a study in which human guinea pigs, not given proper treatment, have died of syphilis and its side effects…”
One of the results of the Nuremberg War Crimes Trials was the notion of “informed consent.” In the United States, doctors cannot perform a medical service or procedure on you unless they tell you what is going to happen to you, and you must agree, in writing, before they can proceed. You also have the right to stop a procedure or treatment.
Using humans for medical experiments raises ethical issues. We need to consider the ethical dilemmas when we carry out human medical experiments to save lives today. We have to ask ourselves if assisted suicide in cases of terminal illness is acceptable. We need to ask ourselves if abortion is acceptable, and under what circumstances. Should people participate in clinical trials or drug tests, when those tests might cause them harm? Furthermore, is it ethical to suppress negative information? For instance, how do we deal with corporations that refuse to link tobacco inhalation to lung cancer and other diseases or those who “fail” to recognize dioxin as contributing to diseases in Vietnam veterans exposed to Agent Orange? What do we do when the government fails to acknowledge troop exposure to airborne contaminants during the 1990 Gulf War and how this affected 25 percent of Gulf War veterans?7 What do we say to a government that refuses to extend health care benefits to wounded veterans and their families?
Mankind has been given the knowledge and ability to perfect the world. All we have to do is make ethical choices -- and that is not always an easy thing to do. Good and evil co-exist. If there is no sadness, how can we know happiness? If there is no disease, how can we appreciate good health? If there is no war, why would we work toward peace? And if we don’t know the difference between good and evil, how could we make the world a better place? Our responsibility is to resist the lure of the dark side.
Excerpted from: Why Should I Care? Lessons from the Holocaust, By Jeanette Friedman and David Gold
Visit their site at www.whyshouldicareontheweb.com
Monday, February 1, 2010
Friday, January 15, 2010
One-stop shop for cybercrime
Welcome to DarkMarket – global one-stop shop for cybercrime and banking fraud
• Personal data and tutorials in hacking offered online
• Founder of site traced to London internet cafe
Renukanth Subramaniam, 33, is accused of being a key figure in running DarkMarket, a website where criminals exchanged information on stolen credit cards and other data. Photograph: Serious Organised Crime Agency/AP
To the casual observer, there was little to distinguish the Java Bean internet cafe in Wembley from the hundreds of others dotted around the capital. But to surveillance officers staking it out month after month, this unremarkable venue was the key to busting a remarkable and sophisticated network of cyber criminals.
From the bank of computers inside, a former pizza bar worker ran an international cyber "supermarket" selling stolen credit card and account details costing the banking industry tens of millions.
Renukanth Subramaniam, 33, was revealed today as the founder and a major "orchestrator" of the secret DarkMarket website, where elite fraudsters bought and sold personal data, after it was infiltrated by the FBI and the US Secret Service.
Membership was strictly by invitation. But once vetted, its 2,000 vendors and buyers traded everything from card details, obtained through hacking, phishing and ATM skimming devices, to viruses with which buyers could extort money by threatening company websites.
The top English language cybercrime site in the world, it offered online tutorials in account takeovers, credit card deception and money laundering. Equipment – including false ATM and pin machines and everything needed to set up a credit card factory – was available.
It even featured breaking-news-style updates on the latest compromised material available, while criminals could buy banner adverts to promote their wares.
So vast was its reach, with members in the UK, Canada, US, Russia, Turkey, Germany and France, the UK's Serious Organised Crime Agency (Soca), which helped bust it, said it was "impossible" to put a figure on how much it cost banks worldwide.
Subramaniam, who used the online soubriquet JiLsi, was remanded in custody at his own request at Blackfriars crown court today after pleading guilty to conspiracy to defraud and five counts of furnishing false information. Judge John Hillen warned it was "inevitable" he faced a "substantial custodial sentence".
A Sri Lankan-born British citizen, Subramaniam was a former member of ShadowCrew, DarkMarket's forerunner, which was uncovered by the US Secret Service in 2004. "JiLsi was one of the highest in cybercrime in this country with what he managed to achieve setting up a forum globally. No JiLsi, no DarkMarket," said one Soca investigator.
Its 2,000 members never met in real life. Quality, not quantity, was the key. DarkMarket was fastidious in banning "rippers" who would cheat other criminals. Honour among thieves was paramount.
It operated an "escrow" service, with payments and goods exchanged through a third party – "like a PayPal for criminals", the judge observed, and an arbitration service resolved disputes. To keep off the radar, the rules were strict: no firearms, drugs or counterfeit currency.
Built on a pyramid structure, administrators decided who joined, moderators ran specific site sections, and reviewers vetted wannabes – each demanding 5% or £250 per transaction as a fixer's fee.
To get on, criminals had to present details of 100 compromised cards free of charge - 50 to one reviewer, 50 to another. Reviewers would test the cards and write an online review of customer satisfaction – just like eBay customers. "If the cards did what they were supposed to … they would be recommended. If not they weren't allowed in," said the investigator.
Payment was via accounts on WebMoney, or E-Gold. "It was the QuickTime method of sending money anywhere."
Subramaniam was one of the top administrators. He kept his operating system on memory sticks. But when one was stolen, costing him £100,000 in losses and compromising the site's security, he was downgraded to reviewer. Surveillance officers caught him logging on to the website as JiLsi unaware the fellow criminal MasterSplyntr he was talking to was, in fact, an FBI agent called Keith Mularski.
Considerable money was exchanged, though actual transactions took place away from the site for security reasons. One buyer spent £250,000 on stolen personal information in just six weeks.
Described as "a very quiet man", Subramaniam worked at Pizza Hut and as a dispatch courier. "He owned three houses but was largely itinerant," said Sharon Lemon, Soca deputy director. "The key to investigations of this sort is finding the evidence to connect the online persona with a living, breathing person."
Harendra de Silva QC, defending Subramaniam, said the "evidence was unchallenged" but said the "question of interpretation does arise in certain areas" and there would be submissions on "nuance" of the fraud in so far as it applied to his client. He is charged alongside John McHugh, 66, known as Devilman, also a site reviewer who has pleaded guilty to conspiracy to defraud and at whose Doncaster home officers found a credit card-making factory. The two will be sentenced later.
But the battle against cybercrime continues. "This was one of the top 10 sites in the world, but there are more than 100 we know of globally, and another 100 we don't yet know of," said the investigators.
In the DarkMarket
DarkMarket price list
Trusted vendors on DarkMarket offered a smorgasbord of personal data, viruses, and card-cloning kits at knockdown prices. Going rates were:
Dumps Data from magnetic stripes on batches of 10 cards. Standard cards: $50. Gold/platinum: $80. Corporate: $180.
Card verification values Information needed for online transactions. $3-$10 depending on quality.
Full information/change of billing Information needed for opening or taking over account details. $150 for account with $10,000 balance. $300 for one with $20,000 balance.
Skimmer Device to read card data. Up to $7,000.
Bank logins 2% of available balance.
Hire of botnet Software robots used in spam attacks. $50 a day.
Credit card images Both sides of card. $30 each.
Embossed card blanks $50 each.
Holograms $5 per 100.
• Personal data and tutorials in hacking offered online
• Founder of site traced to London internet cafe
Renukanth Subramaniam, 33, is accused of being a key figure in running DarkMarket, a website where criminals exchanged information on stolen credit cards and other data. Photograph: Serious Organised Crime Agency/AP
To the casual observer, there was little to distinguish the Java Bean internet cafe in Wembley from the hundreds of others dotted around the capital. But to surveillance officers staking it out month after month, this unremarkable venue was the key to busting a remarkable and sophisticated network of cyber criminals.
From the bank of computers inside, a former pizza bar worker ran an international cyber "supermarket" selling stolen credit card and account details costing the banking industry tens of millions.
Renukanth Subramaniam, 33, was revealed today as the founder and a major "orchestrator" of the secret DarkMarket website, where elite fraudsters bought and sold personal data, after it was infiltrated by the FBI and the US Secret Service.
Membership was strictly by invitation. But once vetted, its 2,000 vendors and buyers traded everything from card details, obtained through hacking, phishing and ATM skimming devices, to viruses with which buyers could extort money by threatening company websites.
The top English language cybercrime site in the world, it offered online tutorials in account takeovers, credit card deception and money laundering. Equipment – including false ATM and pin machines and everything needed to set up a credit card factory – was available.
It even featured breaking-news-style updates on the latest compromised material available, while criminals could buy banner adverts to promote their wares.
So vast was its reach, with members in the UK, Canada, US, Russia, Turkey, Germany and France, the UK's Serious Organised Crime Agency (Soca), which helped bust it, said it was "impossible" to put a figure on how much it cost banks worldwide.
Subramaniam, who used the online soubriquet JiLsi, was remanded in custody at his own request at Blackfriars crown court today after pleading guilty to conspiracy to defraud and five counts of furnishing false information. Judge John Hillen warned it was "inevitable" he faced a "substantial custodial sentence".
A Sri Lankan-born British citizen, Subramaniam was a former member of ShadowCrew, DarkMarket's forerunner, which was uncovered by the US Secret Service in 2004. "JiLsi was one of the highest in cybercrime in this country with what he managed to achieve setting up a forum globally. No JiLsi, no DarkMarket," said one Soca investigator.
Its 2,000 members never met in real life. Quality, not quantity, was the key. DarkMarket was fastidious in banning "rippers" who would cheat other criminals. Honour among thieves was paramount.
It operated an "escrow" service, with payments and goods exchanged through a third party – "like a PayPal for criminals", the judge observed, and an arbitration service resolved disputes. To keep off the radar, the rules were strict: no firearms, drugs or counterfeit currency.
Built on a pyramid structure, administrators decided who joined, moderators ran specific site sections, and reviewers vetted wannabes – each demanding 5% or £250 per transaction as a fixer's fee.
To get on, criminals had to present details of 100 compromised cards free of charge - 50 to one reviewer, 50 to another. Reviewers would test the cards and write an online review of customer satisfaction – just like eBay customers. "If the cards did what they were supposed to … they would be recommended. If not they weren't allowed in," said the investigator.
Payment was via accounts on WebMoney, or E-Gold. "It was the QuickTime method of sending money anywhere."
Subramaniam was one of the top administrators. He kept his operating system on memory sticks. But when one was stolen, costing him £100,000 in losses and compromising the site's security, he was downgraded to reviewer. Surveillance officers caught him logging on to the website as JiLsi unaware the fellow criminal MasterSplyntr he was talking to was, in fact, an FBI agent called Keith Mularski.
Considerable money was exchanged, though actual transactions took place away from the site for security reasons. One buyer spent £250,000 on stolen personal information in just six weeks.
Described as "a very quiet man", Subramaniam worked at Pizza Hut and as a dispatch courier. "He owned three houses but was largely itinerant," said Sharon Lemon, Soca deputy director. "The key to investigations of this sort is finding the evidence to connect the online persona with a living, breathing person."
Harendra de Silva QC, defending Subramaniam, said the "evidence was unchallenged" but said the "question of interpretation does arise in certain areas" and there would be submissions on "nuance" of the fraud in so far as it applied to his client. He is charged alongside John McHugh, 66, known as Devilman, also a site reviewer who has pleaded guilty to conspiracy to defraud and at whose Doncaster home officers found a credit card-making factory. The two will be sentenced later.
But the battle against cybercrime continues. "This was one of the top 10 sites in the world, but there are more than 100 we know of globally, and another 100 we don't yet know of," said the investigators.
In the DarkMarket
DarkMarket price list
Trusted vendors on DarkMarket offered a smorgasbord of personal data, viruses, and card-cloning kits at knockdown prices. Going rates were:
Dumps Data from magnetic stripes on batches of 10 cards. Standard cards: $50. Gold/platinum: $80. Corporate: $180.
Card verification values Information needed for online transactions. $3-$10 depending on quality.
Full information/change of billing Information needed for opening or taking over account details. $150 for account with $10,000 balance. $300 for one with $20,000 balance.
Skimmer Device to read card data. Up to $7,000.
Bank logins 2% of available balance.
Hire of botnet Software robots used in spam attacks. $50 a day.
Credit card images Both sides of card. $30 each.
Embossed card blanks $50 each.
Holograms $5 per 100.
Thursday, January 7, 2010
The 'Israelification' of airports: High security, little bother
December 30, 2009
Cathal Kelly
While North America's airports groan under the weight of another sea-change in security protocols, one word keeps popping out of the mouths of experts: Israelification.
That is, how can we make our airports more like Israel's, which deal with far greater terror threat with far less inconvenience.
"It is mindboggling for us Israelis to look at what happens in North America, because we went through this 50 years ago," said Rafi Sela, the president of AR Challenges, a global transportation security consultancy. He's worked with the RCMP, the U.S. Navy Seals and airports around the world.
"Israelis, unlike Canadians and Americans, don't take s--- from anybody. When the security agency in Israel (the ISA) started to tighten security and we had to wait in line for — not for hours — but 30 or 40 minutes, all hell broke loose here. We said, 'We're not going to do this. You're going to find a way that will take care of security without touching the efficiency of the airport."
That, in a nutshell is "Israelification" - a system that protects life and limb without annoying you to death.
Despite facing dozens of potential threats each day, the security set-up at Israel's largest hub, Tel Aviv's Ben Gurion Airport, has not been breached since 2002, when a passenger mistakenly carried a handgun onto a flight. How do they manage that?
"The first thing you do is to look at who is coming into your airport," said Sela.
The first layer of actual security that greets travellers at Tel Aviv's Ben Gurion International Airport is a roadside check. All drivers are stopped and asked two questions: How are you? Where are you coming from?
"Two benign questions. The questions aren't important. The way people act when they answer them is," Sela said.
Officers are looking for nervousness or other signs of "distress" — behavioural profiling. Sela rejects the argument that profiling is discriminatory.
"The word 'profiling' is a political invention by people who don't want to do security," he said. "To us, it doesn't matter if he's black, white, young or old. It's just his behaviour. So what kind of privacy am I really stepping on when I'm doing this?"
Once you've parked your car or gotten off your bus, you pass through the second and third security perimeters.
Armed guards outside the terminal are trained to observe passengers as they move toward the doors, again looking for odd behaviour. At Ben Gurion's half-dozen entrances, another layer of security are watching. At this point, some travellers will be randomly taken aside, and their person and their luggage run through a magnometer.
"This is to see that you don't have heavy metals on you or something that looks suspicious," said Sela.
You are now in the terminal. As you approach your airline check-in desk, a trained interviewer takes your passport and ticket. They ask a series of questions: Who packed your luggage? Has it left your side?
"The whole time, they are looking into your eyes — which is very embarrassing. But this is one of the ways they figure out if you are suspicious or not. It takes 20, 25 seconds," said Sela.
Lines are staggered. People are not allowed to bunch up into inviting targets for a bomber who has gotten this far.
At the check-in desk, your luggage is scanned immediately in a purpose-built area. Sela plays devil's advocate — what if you have escaped the attention of the first four layers of security, and now try to pass a bag with a bomb in it?
"I once put this question to Jacques Duchesneau (the former head of the Canadian Air Transport Security Authority): say there is a bag with play-doh in it and two pens stuck in the play-doh. That is 'Bombs 101' to a screener. I asked Ducheneau, 'What would you do?' And he said, 'Evacuate the terminal.' And I said, 'Oh. My. God.'
"Take Pearson. Do you know how many people are in the terminal at all times? Many thousands. Let's say I'm (doing an evacuation) without panic — which will never happen. But let's say this is the case. How long will it take? Nobody thought about it. I said, 'Two days.'"
A screener at Ben-Gurion has a pair of better options.
First, the screening area is surrounded by contoured, blast-proof glass that can contain the detonation of up to 100 kilos of plastic explosive. Only the few dozen people within the screening area need be removed, and only to a point a few metres away.
Second, all the screening areas contain 'bomb boxes'. If a screener spots a suspect bag, he/she is trained to pick it up and place it in the box, which is blast proof. A bomb squad arrives shortly and wheels the box away for further investigation.
"This is a very small simple example of how we can simply stop a problem that would cripple one of your airports," Sela said.
Five security layers down: you now finally arrive at the only one which Ben-Gurion Airport shares with Pearson — the body and hand-luggage check.
"But here it is done completely, absolutely 180 degrees differently than it is done in North America," Sela said.
"First, it's fast — there's almost no line. That's because they're not looking for liquids, they're not looking at your shoes. They're not looking for everything they look for in North America. They just look at you," said Sela. "Even today with the heightened security in North America, they will check your items to death. But they will never look at you, at how you behave. They will never look into your eyes ... and that's how you figure out the bad guys from the good guys."
That's the process — six layers, four hard, two soft. The goal at Ben-Gurion is to move fliers from the parking lot to the airport lounge in a maximum of 25 minutes.
This doesn't begin to cover the off-site security net that failed so spectacularly in targeting would-be Flight 253 bomber Umar Farouk Abdulmutallab — intelligence. In Israel, Sela said, a coordinated intelligence gathering operation produces a constantly evolving series of threat analyses and vulnerability studies.
"There is absolutely no intelligence and threat analysis done in Canada or the United States," Sela said. "Absolutely none."
But even without the intelligence, Sela maintains, Abdulmutallab would not have gotten past Ben Gurion Airport's behavioural profilers.
So. Eight years after 9/11, why are we still so reactive, so un-Israelified?
Working hard to dampen his outrage, Sela first blames our leaders, and then ourselves.
"We have a saying in Hebrew that it's much easier to look for a lost key under the light, than to look for the key where you actually lost it, because it's dark over there. That's exactly how (North American airport security officials) act," Sela said. "You can easily do what we do. You don't have to replace anything. You have to add just a little bit — technology, training. But you have to completely change the way you go about doing airport security. And that is something that the bureaucrats have a problem with. They are very well enclosed in their own concept."
And rather than fear, he suggests that outrage would be a far more powerful spur to provoking that change.
"Do you know why Israelis are so calm? We have brutal terror attacks on our civilians and still, life in Israel is pretty good. The reason is that people trust their defence forces, their police, their response teams and the security agencies. They know they're doing a good job. You can't say the same thing about Americans and Canadians. They don't trust anybody," Sela said. "But they say, 'So far, so good'. Then if something happens, all hell breaks loose and you've spent eight hours in an airport. Which is ridiculous. Not justifiable
"But, what can you do? Americans and Canadians are nice people and they will do anything because they were told to do so and because they don't know any different."
Cathal Kelly
While North America's airports groan under the weight of another sea-change in security protocols, one word keeps popping out of the mouths of experts: Israelification.
That is, how can we make our airports more like Israel's, which deal with far greater terror threat with far less inconvenience.
"It is mindboggling for us Israelis to look at what happens in North America, because we went through this 50 years ago," said Rafi Sela, the president of AR Challenges, a global transportation security consultancy. He's worked with the RCMP, the U.S. Navy Seals and airports around the world.
"Israelis, unlike Canadians and Americans, don't take s--- from anybody. When the security agency in Israel (the ISA) started to tighten security and we had to wait in line for — not for hours — but 30 or 40 minutes, all hell broke loose here. We said, 'We're not going to do this. You're going to find a way that will take care of security without touching the efficiency of the airport."
That, in a nutshell is "Israelification" - a system that protects life and limb without annoying you to death.
Despite facing dozens of potential threats each day, the security set-up at Israel's largest hub, Tel Aviv's Ben Gurion Airport, has not been breached since 2002, when a passenger mistakenly carried a handgun onto a flight. How do they manage that?
"The first thing you do is to look at who is coming into your airport," said Sela.
The first layer of actual security that greets travellers at Tel Aviv's Ben Gurion International Airport is a roadside check. All drivers are stopped and asked two questions: How are you? Where are you coming from?
"Two benign questions. The questions aren't important. The way people act when they answer them is," Sela said.
Officers are looking for nervousness or other signs of "distress" — behavioural profiling. Sela rejects the argument that profiling is discriminatory.
"The word 'profiling' is a political invention by people who don't want to do security," he said. "To us, it doesn't matter if he's black, white, young or old. It's just his behaviour. So what kind of privacy am I really stepping on when I'm doing this?"
Once you've parked your car or gotten off your bus, you pass through the second and third security perimeters.
Armed guards outside the terminal are trained to observe passengers as they move toward the doors, again looking for odd behaviour. At Ben Gurion's half-dozen entrances, another layer of security are watching. At this point, some travellers will be randomly taken aside, and their person and their luggage run through a magnometer.
"This is to see that you don't have heavy metals on you or something that looks suspicious," said Sela.
You are now in the terminal. As you approach your airline check-in desk, a trained interviewer takes your passport and ticket. They ask a series of questions: Who packed your luggage? Has it left your side?
"The whole time, they are looking into your eyes — which is very embarrassing. But this is one of the ways they figure out if you are suspicious or not. It takes 20, 25 seconds," said Sela.
Lines are staggered. People are not allowed to bunch up into inviting targets for a bomber who has gotten this far.
At the check-in desk, your luggage is scanned immediately in a purpose-built area. Sela plays devil's advocate — what if you have escaped the attention of the first four layers of security, and now try to pass a bag with a bomb in it?
"I once put this question to Jacques Duchesneau (the former head of the Canadian Air Transport Security Authority): say there is a bag with play-doh in it and two pens stuck in the play-doh. That is 'Bombs 101' to a screener. I asked Ducheneau, 'What would you do?' And he said, 'Evacuate the terminal.' And I said, 'Oh. My. God.'
"Take Pearson. Do you know how many people are in the terminal at all times? Many thousands. Let's say I'm (doing an evacuation) without panic — which will never happen. But let's say this is the case. How long will it take? Nobody thought about it. I said, 'Two days.'"
A screener at Ben-Gurion has a pair of better options.
First, the screening area is surrounded by contoured, blast-proof glass that can contain the detonation of up to 100 kilos of plastic explosive. Only the few dozen people within the screening area need be removed, and only to a point a few metres away.
Second, all the screening areas contain 'bomb boxes'. If a screener spots a suspect bag, he/she is trained to pick it up and place it in the box, which is blast proof. A bomb squad arrives shortly and wheels the box away for further investigation.
"This is a very small simple example of how we can simply stop a problem that would cripple one of your airports," Sela said.
Five security layers down: you now finally arrive at the only one which Ben-Gurion Airport shares with Pearson — the body and hand-luggage check.
"But here it is done completely, absolutely 180 degrees differently than it is done in North America," Sela said.
"First, it's fast — there's almost no line. That's because they're not looking for liquids, they're not looking at your shoes. They're not looking for everything they look for in North America. They just look at you," said Sela. "Even today with the heightened security in North America, they will check your items to death. But they will never look at you, at how you behave. They will never look into your eyes ... and that's how you figure out the bad guys from the good guys."
That's the process — six layers, four hard, two soft. The goal at Ben-Gurion is to move fliers from the parking lot to the airport lounge in a maximum of 25 minutes.
This doesn't begin to cover the off-site security net that failed so spectacularly in targeting would-be Flight 253 bomber Umar Farouk Abdulmutallab — intelligence. In Israel, Sela said, a coordinated intelligence gathering operation produces a constantly evolving series of threat analyses and vulnerability studies.
"There is absolutely no intelligence and threat analysis done in Canada or the United States," Sela said. "Absolutely none."
But even without the intelligence, Sela maintains, Abdulmutallab would not have gotten past Ben Gurion Airport's behavioural profilers.
So. Eight years after 9/11, why are we still so reactive, so un-Israelified?
Working hard to dampen his outrage, Sela first blames our leaders, and then ourselves.
"We have a saying in Hebrew that it's much easier to look for a lost key under the light, than to look for the key where you actually lost it, because it's dark over there. That's exactly how (North American airport security officials) act," Sela said. "You can easily do what we do. You don't have to replace anything. You have to add just a little bit — technology, training. But you have to completely change the way you go about doing airport security. And that is something that the bureaucrats have a problem with. They are very well enclosed in their own concept."
And rather than fear, he suggests that outrage would be a far more powerful spur to provoking that change.
"Do you know why Israelis are so calm? We have brutal terror attacks on our civilians and still, life in Israel is pretty good. The reason is that people trust their defence forces, their police, their response teams and the security agencies. They know they're doing a good job. You can't say the same thing about Americans and Canadians. They don't trust anybody," Sela said. "But they say, 'So far, so good'. Then if something happens, all hell breaks loose and you've spent eight hours in an airport. Which is ridiculous. Not justifiable
"But, what can you do? Americans and Canadians are nice people and they will do anything because they were told to do so and because they don't know any different."
Wednesday, December 23, 2009
Safety tips especially for women
Crucial Because of recent abductions In daylight hours, refresh yourself Of these things to do In an emergency situation...
This is for you, And for you to share With your wife, Your children, Everyone you know.
After reading these 9 crucial tips, Forward them to someone you care about.
It never hurts to be careful In this crazy world we live in.
1. Tip from Tae Kwon Do : The elbow is the strongest point On your body. If you are close enough to use it, do!
2. Learned this from a tourist guide. If a robber asks for your wallet and/or purse, DO NOT HAND IT TO HIM. Toss it away from you.... Chances are that he is more interested In your wallet and/or purse than you, And he will go for the wallet/purse. RUN LIKE MAD IN THE OTHER DIRECTION!
3. If you are ever thrown into the trunk of a car, Kick out the back tail lights and stick your arm out the hole And start waving like crazy. The driver won't see you, but everybody else will. This has saved lives.
4. Women have a tendency to get into their cars after shopping, eating, working, etc., and just sit (doing their checkbook, or making a list, etc. DON'T DO THIS!) The predator will be watching you, and this Is the perfect opportunity for him to get in On the passenger side, put a gun to your head, And tell you where to go. AS SOON AS YOU GET INTO YOUR CAR, LOCK THE DOORS AND LEAVE.
If someone Is in the car With a gun To your head DO NOT DRIVE OFF, Repeat:DO NOT DRIVE OFF! Instead gun the engine And speed into anything, wrecking the car. Your Air Bag will save you. If the person is in the back seat They will get the worst of it. As soon as the car crashes Bail out and run. It is better than having them find your body In a remote location.
5. A few notes about getting Into your car in a parking lot, Or parking garage:
A.) Be aware: Look around you, Look into your car, At the passenger side floor , And in the back seat
B.) If you are parked next to a big van, Enter your car from the passenger door. Most serial killers attack their victims By pulling them into their vans while the women Are attempting to get into their cars..
C.) Look ! at th e car Parked on the driver's side of your vehicle, And the passenger side... If a male is sitting alone In the seat nearest your car, you may want to walk back Into the mall, or work, and get a Guard/policeman to walk you back out.. IT IS ALWAYS BETTER TO BE SAFE THAN SORRY. (And better paranoid than dead.)
6. ALWAYS take the elevator Instead of the stairs. Stairwells are horrible places to be alone And the perfect crime spot. This is especially true at NIGHT!)
7. If the predator has a gun And you are not under his control, ALWAYS RUN!
The predator! will only hit you (a running target) 4 in 100 times; and even then, It most likely WILL NOT be a vital organ. RUN, Preferably in a zig -zag pattern!
8. As women, we are always trying To be sympathetic: STOP It may get you raped, or killed. Ted Bundy, the serial killer, was a good-looking, Well educated man, who ALWAYS played On the sympathies of unsuspecting women. He walked with a cane, or a limp,! ;and often Asked 'for help' into his vehicle or with his vehicle, Which is when he abducted His next victim.
9. Another Safety Point: Someone just told me that her friend heard A crying baby on her porch the night before last, And she called the police because it was late And she thought it was weird. The police told her 'Whatever you do, DO NOT Open the door.' The lady then said that it sounded like the baby ! Had crawled near a window, and she was worried That it would crawl to the street and get run over. The policeman said, 'We already have a unit on the way, Whatever you do, DO NOT open the door.' He told her that they think a serial killer Has a baby's cry recorded and uses it to coax women out of their homes thinking that someone dropped off a baby. He said they have not verified it, but have had several calls by women saying that they hear baby's cries outside their doors when they're home alone at night.
10. Water scam! If you wake up in the middle of the night to hear all your taps outside running or what you think is a burst pipe, DO NOT GO OUT TO INVESTIGATE! These people turn on all your outside taps full ball so that you will go out to investigate and then attack.
Stay alert, keep safe, and look out for your neighbors!
Please pass this on This e-mail should probably be taken seriously because the Crying Baby Theory was mentioned on America 's Most Wanted when they profiled the serial killer in Louisiana
This is for you, And for you to share With your wife, Your children, Everyone you know.
After reading these 9 crucial tips, Forward them to someone you care about.
It never hurts to be careful In this crazy world we live in.
1. Tip from Tae Kwon Do : The elbow is the strongest point On your body. If you are close enough to use it, do!
2. Learned this from a tourist guide. If a robber asks for your wallet and/or purse, DO NOT HAND IT TO HIM. Toss it away from you.... Chances are that he is more interested In your wallet and/or purse than you, And he will go for the wallet/purse. RUN LIKE MAD IN THE OTHER DIRECTION!
3. If you are ever thrown into the trunk of a car, Kick out the back tail lights and stick your arm out the hole And start waving like crazy. The driver won't see you, but everybody else will. This has saved lives.
4. Women have a tendency to get into their cars after shopping, eating, working, etc., and just sit (doing their checkbook, or making a list, etc. DON'T DO THIS!) The predator will be watching you, and this Is the perfect opportunity for him to get in On the passenger side, put a gun to your head, And tell you where to go. AS SOON AS YOU GET INTO YOUR CAR, LOCK THE DOORS AND LEAVE.
If someone Is in the car With a gun To your head DO NOT DRIVE OFF, Repeat:DO NOT DRIVE OFF! Instead gun the engine And speed into anything, wrecking the car. Your Air Bag will save you. If the person is in the back seat They will get the worst of it. As soon as the car crashes Bail out and run. It is better than having them find your body In a remote location.
5. A few notes about getting Into your car in a parking lot, Or parking garage:
A.) Be aware: Look around you, Look into your car, At the passenger side floor , And in the back seat
B.) If you are parked next to a big van, Enter your car from the passenger door. Most serial killers attack their victims By pulling them into their vans while the women Are attempting to get into their cars..
C.) Look ! at th e car Parked on the driver's side of your vehicle, And the passenger side... If a male is sitting alone In the seat nearest your car, you may want to walk back Into the mall, or work, and get a Guard/policeman to walk you back out.. IT IS ALWAYS BETTER TO BE SAFE THAN SORRY. (And better paranoid than dead.)
6. ALWAYS take the elevator Instead of the stairs. Stairwells are horrible places to be alone And the perfect crime spot. This is especially true at NIGHT!)
7. If the predator has a gun And you are not under his control, ALWAYS RUN!
The predator! will only hit you (a running target) 4 in 100 times; and even then, It most likely WILL NOT be a vital organ. RUN, Preferably in a zig -zag pattern!
8. As women, we are always trying To be sympathetic: STOP It may get you raped, or killed. Ted Bundy, the serial killer, was a good-looking, Well educated man, who ALWAYS played On the sympathies of unsuspecting women. He walked with a cane, or a limp,! ;and often Asked 'for help' into his vehicle or with his vehicle, Which is when he abducted His next victim.
9. Another Safety Point: Someone just told me that her friend heard A crying baby on her porch the night before last, And she called the police because it was late And she thought it was weird. The police told her 'Whatever you do, DO NOT Open the door.' The lady then said that it sounded like the baby ! Had crawled near a window, and she was worried That it would crawl to the street and get run over. The policeman said, 'We already have a unit on the way, Whatever you do, DO NOT open the door.' He told her that they think a serial killer Has a baby's cry recorded and uses it to coax women out of their homes thinking that someone dropped off a baby. He said they have not verified it, but have had several calls by women saying that they hear baby's cries outside their doors when they're home alone at night.
10. Water scam! If you wake up in the middle of the night to hear all your taps outside running or what you think is a burst pipe, DO NOT GO OUT TO INVESTIGATE! These people turn on all your outside taps full ball so that you will go out to investigate and then attack.
Stay alert, keep safe, and look out for your neighbors!
Please pass this on This e-mail should probably be taken seriously because the Crying Baby Theory was mentioned on America 's Most Wanted when they profiled the serial killer in Louisiana
Friday, September 25, 2009
Wednesday, September 16, 2009
Thursday, September 3, 2009
Smart thieves
This gives us something to think about with all our new electronic technology.
GPS
A couple of weeks ago a friend told me that someone she knew had their car broken into while they were at a football game.. Their car was parked on the green which was adjacent to the football stadium and specially allotted to football fans. Things stolen from the car included a garage door remote control, some money and a GPS which had been prominently mounted on the dashboard.
When the victims got home, they found that their house had been ransacked and just about everything worth anything had been stolen.
The thieves had used the GPS to guide them to the house.
They then used the garage remote control to open the garage door and gain entry to the house. The thieves knew the owners were at the football game, they knew what time the game was scheduled to finish and so they knew how much time they had to clean out the house. It would appear that they had brought a truck to empty the house of its contents.
Something to consider if you have a GPS - don't put your home address in it. Put a nearby address (like a store or gas station) so you can still find your way home if you need to, but no one else would know where you live if your GPS were stolen.
MOBILE PHONES
This lady has now changed her habit of how she lists her names on her mobile phone after her handbag was stolen. Her handbag, which contained her cell phone, credit card, wallet.. Etc...was stolen. 20 minutes later when she called her hubby, from a pay phone telling him what had happened, hubby says 'I received your text asking about our Pin number and I've replied a little while ago.'
When they rushed down to the bank, the bank staff told them all the money was already withdrawn. The thief had actually used the stolen cell phone to text 'hubby' in the contact list and got hold of the pin number. Within 20 minutes he had withdrawn all the money from their bank account.
Moral of the lesson: Do not disclose the relationship between you and the people in your contact list. Avoid using names like Home, Honey, Hubby, Sweetheart, Dad, Mom, etc....
And very importantly, when sensitive info is being asked through texts, CONFIRM by calling back.
Also, when you're being texted by friends or family to meet them somewhere, be sure to call back to confirm that the message came from them. If you don't reach them, be very careful about going places to meet 'family and friends' who text you.
GPS
A couple of weeks ago a friend told me that someone she knew had their car broken into while they were at a football game.. Their car was parked on the green which was adjacent to the football stadium and specially allotted to football fans. Things stolen from the car included a garage door remote control, some money and a GPS which had been prominently mounted on the dashboard.
When the victims got home, they found that their house had been ransacked and just about everything worth anything had been stolen.
The thieves had used the GPS to guide them to the house.
They then used the garage remote control to open the garage door and gain entry to the house. The thieves knew the owners were at the football game, they knew what time the game was scheduled to finish and so they knew how much time they had to clean out the house. It would appear that they had brought a truck to empty the house of its contents.
Something to consider if you have a GPS - don't put your home address in it. Put a nearby address (like a store or gas station) so you can still find your way home if you need to, but no one else would know where you live if your GPS were stolen.
MOBILE PHONES
This lady has now changed her habit of how she lists her names on her mobile phone after her handbag was stolen. Her handbag, which contained her cell phone, credit card, wallet.. Etc...was stolen. 20 minutes later when she called her hubby, from a pay phone telling him what had happened, hubby says 'I received your text asking about our Pin number and I've replied a little while ago.'
When they rushed down to the bank, the bank staff told them all the money was already withdrawn. The thief had actually used the stolen cell phone to text 'hubby' in the contact list and got hold of the pin number. Within 20 minutes he had withdrawn all the money from their bank account.
Moral of the lesson: Do not disclose the relationship between you and the people in your contact list. Avoid using names like Home, Honey, Hubby, Sweetheart, Dad, Mom, etc....
And very importantly, when sensitive info is being asked through texts, CONFIRM by calling back.
Also, when you're being texted by friends or family to meet them somewhere, be sure to call back to confirm that the message came from them. If you don't reach them, be very careful about going places to meet 'family and friends' who text you.
Subscribe to:
Posts (Atom)