SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Preventing Undercover
Employment Operations
Competition
A new crime trend: stealing bull
semen Gazette Extra By TED SULLIVAN Tuesday, April 20, 2010
“In a string of recent burglaries, thieves have targeted dairy
farmers to steal a valuable commodity: bull semen. Valued at
$22,000”
“Farmers believe thieves might be selling the semen on the black
market.”
“A bull semen theft also was reported in Brodhead in July 2008.
About 100 embryos or semen samples valued at $35,000 were
stolen.
Terrorist
Their ideology or religion is more
important than anything else to
include their own lives.
Their motivation is to eliminate those
who are non-believers or those who
jeopardize the fundamentals of their
religious beliefs.
Protectionist
These groups want to protect things
they think can’t protect themselves.
Other motivations dehumanizes their
targets while protectionist groups
humanize what they are protecting.
Goals
Keep You Problem Solving
Financial Impact
Change Your Practices / End or Impact Business
Shake Consumer Confidence
Gain Media Attention
Claim Responsibility
Reduce Public Support of Industry
Increases Membership
Public Belief & Awareness of Cause
Fundraising
Empowers their efforts
Group Profiling Considerations




Location and Motivation helps
determine potential targets
Financial Backing and Education
helps determine potential capability
and range of operations
How They Get It?
Getting hired in your organization
 Social Engineering Your Group
 Undercover Tactics – Video & Pictures
 Legal Methods – OSI, Public Info,
Courts
 Sharing Their Success With Others

Knowledge Is Power
Art of War
“The Original Spy Manual”

“Probe the enemy to unmask his
strengths, weaknesses, patterns of
movement and intentions. Shape
the enemy’s perception of the world
to manipulate/ undermine his plans
and actions.”
Social Engineering


What can I figure out about you?
• Internet – Google
• Social Pages (Facebook)
Maiden Name, DOB
 Address, travel plans
 High School & College
 Hobbies & Friends


• Trash
• Phishing – 21% Increase (18,820 Attacks)
Social Engineering
Log Ins & Passwords
 Security Questions
 Cell & Computer Security

Hacking human gullibility with social
penetration:

We don't need no stinking exploits By Dan Goodin in
San Francisco

“Vulnerability stems from humans' inherent tendency to trust
one another. Survival over the millennia largely depended
on their ability to work in groups. When one person saw
that a group of his peers ate a particular berry and didn't
die, he ate the same fruit - and survived as a result.
Hackers who understand this trait can exploit it to access
companies' most precious assets.”
“David Bailey said he regularly sends client employees emails
informing them the strength of their login passwords is
being tested through a new website. They are then
instructed to follow a link and enter their credentials. The
success rate: as high as 50 per cent”
How They Use It?


Distort Public Perceptions
• Hallmark-Westland Video







Activism & Fraud
Network Access
Criminal Acts – Arson, Stalking, Criminal Mischief
Educate other Groups
Propaganda
• Funding – USDA Domestic Horse Slaughter Insp.
• Public Relations – Yellow Tail Winery - $100K
• Political – Sub-therapeutic Antibiotics Legislation
What might they do with this info?
What’s Next
Animal activists' unsettling bid for freedom Sharp Science

Short

15 March 2010
Science In Society -Andy Coghlan, reporter
-Andy

Firebombing, arson, hitting people with baseball clubs,
disinterring people's dead relatives and screaming abuse
through loudhailers all day and night
Researchers quoted in The Guardian say they're intimidated
by the tactic, fearing that exposure of their experiments,
however legal and ethically justified, would make them
targets for extremists.
Constrained in the UK, activists moved instead to the US
and the European mainland, where they have been
engaging in violent campaigns similar to those previously
confined to the UK
What Can You Do?









To understand how not to hire a plant you
must first understand them.
Understand how your business may be
vulnerable
Understand what is out there about you
Investigate complaints thoroughly and
completely (internal & external)
Suspicious Activity Reporting Process
(anonymous, easy, and free) has to be
followed up on quickly.
Facility Security Recommendations


Office & Plant Security

• The Environment Dictates the Tactic



Employee Screening

• Profile Behaviors Not People



Employee Training & Accountability

• SCAN, Reporting Process (suspicion & abuse)



Responding to Activists’ Letters
• Let the Pro’s Help You



Talking With Law Enforcement

• Explosives,Arson (ATF) $10K, Terrorism (FBI), pay (IRS)



Talking With Media

• Have a PIO – You never know when or where it will
happen
Behaviors






Temporary Positions – willing to take jobs that
only last short periods of time.
18 to 30’s
Generally Caucasians
College or University ID’s not Government ID
• University or major city within hour of you?









Over or Inappropriately (degree not related)
educated
Out of State ID or Vehicles
Willingness to come early & stay late
Attempting or accessing restricted areas not job
related. “I’ve always wanted to see that”
May indicate previous related job experience
Educate Yourself & Your Company









Need Buy-In from Top Down
Develop an understanding of the opposition
What is your companies vulnerability?
Understand how they would focus on your
vulnerabilities.
Educate your staff – SCAN, Water Cooler
Suspicions (“He doesn’t fit in”, “He’s over
educated for that job, that’s why he wants to
move up”. If company goes out of business
everyone is out of a job.
Secure your assets (facilities & Information) –
They only have to be right once, you have to be
right every day.
Develop legal hiring techniques that
identify suspected plants













Add perjury clause and have statements and
applications signed (compare signatures)
Verify past employment-ask questions and
communicate with others in industry.
Do background checks – use computer tools to
investigate (Google, E-Verify, Social Networking,
Facial Recognition Software) – Call references &
contacts
Take photos & fingerprints of them
Verify (false ID tools) & Xerox identification
(investigative asset) – keep secure so cant be
recovered by plant.
Register vehicles with access to plants
(photograph them with their vehicle)
Do a surprise home visit.
Develop policies that mandate animal care
and handling procedures
Hold employees accountable to those
policies and reporting abuses.
(Section C of AAA Facility Security
Recommendations)
 If you don’t police yourself someone
else will.
 Off Premise Monitoring
 Follow-up on complaints & back brief

Push Back
Prosecute Violations
 Make them work for it
 Be proactive
 Discipline Internal Violations

Develop Information & Intelligence Sharing
Relationships

Law Enforcement
 Other Processors & Facilities in your
area
 Organizations that track activists,
activities & proactive legislation
 Joint Training
 Share suspicious activity (Dallas)

Questions?
You have to be more passionate about
keeping this from happening than
they are about stopping it.
You have to be right every day, they
only have to get it right once.
Houston Johnson 254.534.1646
houston@genesis0103.com

Weitere ähnliche Inhalte

Was ist angesagt?

7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk   7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk Case IQ
 
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionInsider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionCase IQ
 
Promise And Perils Of Internet Searching Job Candidates
Promise And Perils Of Internet Searching Job CandidatesPromise And Perils Of Internet Searching Job Candidates
Promise And Perils Of Internet Searching Job CandidatesGeorge Lenard
 
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Case IQ
 
10 Critical Mistakes in Workplace Investigation Programs and How to Avoid Them
10 Critical Mistakes in Workplace Investigation Programs and How to Avoid Them10 Critical Mistakes in Workplace Investigation Programs and How to Avoid Them
10 Critical Mistakes in Workplace Investigation Programs and How to Avoid ThemCase IQ
 
Under the Table: Combatting Bribery and Corruption Through Analysis and Preve...
Under the Table: Combatting Bribery and Corruption Through Analysis and Preve...Under the Table: Combatting Bribery and Corruption Through Analysis and Preve...
Under the Table: Combatting Bribery and Corruption Through Analysis and Preve...Case IQ
 
Whistle blowing
Whistle blowing  Whistle blowing
Whistle blowing student
 
PSI Staff Report Final 5.18.2016 Update (1)
PSI Staff Report Final 5.18.2016 Update (1)PSI Staff Report Final 5.18.2016 Update (1)
PSI Staff Report Final 5.18.2016 Update (1)Andy Polesovsky
 

Was ist angesagt? (10)

7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk   7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
 
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionInsider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
 
Ethics of Whistleblowing
Ethics of WhistleblowingEthics of Whistleblowing
Ethics of Whistleblowing
 
Promise And Perils Of Internet Searching Job Candidates
Promise And Perils Of Internet Searching Job CandidatesPromise And Perils Of Internet Searching Job Candidates
Promise And Perils Of Internet Searching Job Candidates
 
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
 
10 Critical Mistakes in Workplace Investigation Programs and How to Avoid Them
10 Critical Mistakes in Workplace Investigation Programs and How to Avoid Them10 Critical Mistakes in Workplace Investigation Programs and How to Avoid Them
10 Critical Mistakes in Workplace Investigation Programs and How to Avoid Them
 
Under the Table: Combatting Bribery and Corruption Through Analysis and Preve...
Under the Table: Combatting Bribery and Corruption Through Analysis and Preve...Under the Table: Combatting Bribery and Corruption Through Analysis and Preve...
Under the Table: Combatting Bribery and Corruption Through Analysis and Preve...
 
Whistle blowing
Whistle blowing  Whistle blowing
Whistle blowing
 
PSI Staff Report Final 5.18.2016 Update (1)
PSI Staff Report Final 5.18.2016 Update (1)PSI Staff Report Final 5.18.2016 Update (1)
PSI Staff Report Final 5.18.2016 Update (1)
 
Identity theft protection company keepmy id.org
Identity theft protection company   keepmy id.orgIdentity theft protection company   keepmy id.org
Identity theft protection company keepmy id.org
 

Andere mochten auch

Bryn Jensson - Leading by example - showing we care at the barn level
Bryn Jensson - Leading by example - showing we care at the barn levelBryn Jensson - Leading by example - showing we care at the barn level
Bryn Jensson - Leading by example - showing we care at the barn levelJohn Blue
 
Mike Zumwinkle - What’s Happening on the Legislative Front - State
Mike Zumwinkle - What’s Happening on the Legislative Front - StateMike Zumwinkle - What’s Happening on the Legislative Front - State
Mike Zumwinkle - What’s Happening on the Legislative Front - StateJohn Blue
 
Ms. Susan Vaughn Grooters - Consumer Perceptions-Superbugs In Our Food Supply
Ms. Susan Vaughn Grooters - Consumer Perceptions-Superbugs In Our Food SupplyMs. Susan Vaughn Grooters - Consumer Perceptions-Superbugs In Our Food Supply
Ms. Susan Vaughn Grooters - Consumer Perceptions-Superbugs In Our Food SupplyJohn Blue
 
Dr. Robert Tauxe - Public Health Concerns About Resistant Foodborne Infections
Dr. Robert Tauxe - Public Health Concerns About Resistant Foodborne InfectionsDr. Robert Tauxe - Public Health Concerns About Resistant Foodborne Infections
Dr. Robert Tauxe - Public Health Concerns About Resistant Foodborne InfectionsJohn Blue
 
Chris Herr - Bridging the Divide, Finding Common Ground
Chris Herr - Bridging the Divide, Finding Common GroundChris Herr - Bridging the Divide, Finding Common Ground
Chris Herr - Bridging the Divide, Finding Common GroundJohn Blue
 
Dr. Dane Goede - Update on Porcine Epidemic Diarrhea Virus Studies
Dr. Dane Goede - Update on Porcine Epidemic Diarrhea Virus StudiesDr. Dane Goede - Update on Porcine Epidemic Diarrhea Virus Studies
Dr. Dane Goede - Update on Porcine Epidemic Diarrhea Virus StudiesJohn Blue
 
Dr. Joni Scheftel - The human animal interface at Minnesota fairs and live an...
Dr. Joni Scheftel - The human animal interface at Minnesota fairs and live an...Dr. Joni Scheftel - The human animal interface at Minnesota fairs and live an...
Dr. Joni Scheftel - The human animal interface at Minnesota fairs and live an...John Blue
 
Crystal Mackay - Cleaning Up the Bad Actors
Crystal Mackay - Cleaning Up the Bad ActorsCrystal Mackay - Cleaning Up the Bad Actors
Crystal Mackay - Cleaning Up the Bad ActorsJohn Blue
 
Agriculture is Using Social Media, How and Why
Agriculture is Using Social Media, How and Why Agriculture is Using Social Media, How and Why
Agriculture is Using Social Media, How and Why John Blue
 
Guia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOCGuia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOCAlejandro Videla
 
Oral Fluid Testing: Field Applications and Work In Progress
Oral Fluid Testing: Field Applications and Work In ProgressOral Fluid Testing: Field Applications and Work In Progress
Oral Fluid Testing: Field Applications and Work In ProgressJohn Blue
 
Dr. Leah Dorman - 2013 Antibiotic Symposia Welcome/Recap of Chicago, IL 2011 ...
Dr. Leah Dorman - 2013 Antibiotic Symposia Welcome/Recap of Chicago, IL 2011 ...Dr. Leah Dorman - 2013 Antibiotic Symposia Welcome/Recap of Chicago, IL 2011 ...
Dr. Leah Dorman - 2013 Antibiotic Symposia Welcome/Recap of Chicago, IL 2011 ...John Blue
 
Dr. Mark Engle - What Else Is On Our Radar Screen?
Dr. Mark Engle - What Else Is On Our Radar Screen?Dr. Mark Engle - What Else Is On Our Radar Screen?
Dr. Mark Engle - What Else Is On Our Radar Screen?John Blue
 
Dr. Nate Hagens - Feeding the World in the 21st Century- A Wide Boundary Pers...
Dr. Nate Hagens - Feeding the World in the 21st Century- A Wide Boundary Pers...Dr. Nate Hagens - Feeding the World in the 21st Century- A Wide Boundary Pers...
Dr. Nate Hagens - Feeding the World in the 21st Century- A Wide Boundary Pers...John Blue
 
Lela Perez and John Blue - Social Media Engagement Dos and Don’ts
Lela Perez and John Blue - Social Media Engagement Dos and Don’tsLela Perez and John Blue - Social Media Engagement Dos and Don’ts
Lela Perez and John Blue - Social Media Engagement Dos and Don’tsJohn Blue
 
Dr. Andres Perez - Spatial Epidemiology of PED Virus
Dr. Andres Perez - Spatial Epidemiology of PED VirusDr. Andres Perez - Spatial Epidemiology of PED Virus
Dr. Andres Perez - Spatial Epidemiology of PED VirusJohn Blue
 

Andere mochten auch (20)

Bryn Jensson - Leading by example - showing we care at the barn level
Bryn Jensson - Leading by example - showing we care at the barn levelBryn Jensson - Leading by example - showing we care at the barn level
Bryn Jensson - Leading by example - showing we care at the barn level
 
Mike Zumwinkle - What’s Happening on the Legislative Front - State
Mike Zumwinkle - What’s Happening on the Legislative Front - StateMike Zumwinkle - What’s Happening on the Legislative Front - State
Mike Zumwinkle - What’s Happening on the Legislative Front - State
 
Ms. Susan Vaughn Grooters - Consumer Perceptions-Superbugs In Our Food Supply
Ms. Susan Vaughn Grooters - Consumer Perceptions-Superbugs In Our Food SupplyMs. Susan Vaughn Grooters - Consumer Perceptions-Superbugs In Our Food Supply
Ms. Susan Vaughn Grooters - Consumer Perceptions-Superbugs In Our Food Supply
 
Dr. Robert Tauxe - Public Health Concerns About Resistant Foodborne Infections
Dr. Robert Tauxe - Public Health Concerns About Resistant Foodborne InfectionsDr. Robert Tauxe - Public Health Concerns About Resistant Foodborne Infections
Dr. Robert Tauxe - Public Health Concerns About Resistant Foodborne Infections
 
Chris Herr - Bridging the Divide, Finding Common Ground
Chris Herr - Bridging the Divide, Finding Common GroundChris Herr - Bridging the Divide, Finding Common Ground
Chris Herr - Bridging the Divide, Finding Common Ground
 
Dr. Dane Goede - Update on Porcine Epidemic Diarrhea Virus Studies
Dr. Dane Goede - Update on Porcine Epidemic Diarrhea Virus StudiesDr. Dane Goede - Update on Porcine Epidemic Diarrhea Virus Studies
Dr. Dane Goede - Update on Porcine Epidemic Diarrhea Virus Studies
 
Dr. Joni Scheftel - The human animal interface at Minnesota fairs and live an...
Dr. Joni Scheftel - The human animal interface at Minnesota fairs and live an...Dr. Joni Scheftel - The human animal interface at Minnesota fairs and live an...
Dr. Joni Scheftel - The human animal interface at Minnesota fairs and live an...
 
Crystal Mackay - Cleaning Up the Bad Actors
Crystal Mackay - Cleaning Up the Bad ActorsCrystal Mackay - Cleaning Up the Bad Actors
Crystal Mackay - Cleaning Up the Bad Actors
 
Agriculture is Using Social Media, How and Why
Agriculture is Using Social Media, How and Why Agriculture is Using Social Media, How and Why
Agriculture is Using Social Media, How and Why
 
Guia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOCGuia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOC
 
Oral Fluid Testing: Field Applications and Work In Progress
Oral Fluid Testing: Field Applications and Work In ProgressOral Fluid Testing: Field Applications and Work In Progress
Oral Fluid Testing: Field Applications and Work In Progress
 
Dr. Leah Dorman - 2013 Antibiotic Symposia Welcome/Recap of Chicago, IL 2011 ...
Dr. Leah Dorman - 2013 Antibiotic Symposia Welcome/Recap of Chicago, IL 2011 ...Dr. Leah Dorman - 2013 Antibiotic Symposia Welcome/Recap of Chicago, IL 2011 ...
Dr. Leah Dorman - 2013 Antibiotic Symposia Welcome/Recap of Chicago, IL 2011 ...
 
Dr. Mark Engle - What Else Is On Our Radar Screen?
Dr. Mark Engle - What Else Is On Our Radar Screen?Dr. Mark Engle - What Else Is On Our Radar Screen?
Dr. Mark Engle - What Else Is On Our Radar Screen?
 
Dr. Nate Hagens - Feeding the World in the 21st Century- A Wide Boundary Pers...
Dr. Nate Hagens - Feeding the World in the 21st Century- A Wide Boundary Pers...Dr. Nate Hagens - Feeding the World in the 21st Century- A Wide Boundary Pers...
Dr. Nate Hagens - Feeding the World in the 21st Century- A Wide Boundary Pers...
 
Lela Perez and John Blue - Social Media Engagement Dos and Don’ts
Lela Perez and John Blue - Social Media Engagement Dos and Don’tsLela Perez and John Blue - Social Media Engagement Dos and Don’ts
Lela Perez and John Blue - Social Media Engagement Dos and Don’ts
 
Dr. Andres Perez - Spatial Epidemiology of PED Virus
Dr. Andres Perez - Spatial Epidemiology of PED VirusDr. Andres Perez - Spatial Epidemiology of PED Virus
Dr. Andres Perez - Spatial Epidemiology of PED Virus
 
Ttest
TtestTtest
Ttest
 
Msute Andry Bonilla
Msute Andry BonillaMsute Andry Bonilla
Msute Andry Bonilla
 
Audible visible notification
Audible visible notificationAudible visible notification
Audible visible notification
 
Cadvr 04 08-16_d
Cadvr 04 08-16_dCadvr 04 08-16_d
Cadvr 04 08-16_d
 

Ähnlich wie Houston Johnson - Preventing Undercover Employment Operations

Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftCase IQ
 
Nonprofits & Fraud: Protecting the People You Serve
Nonprofits & Fraud: Protecting the People You ServeNonprofits & Fraud: Protecting the People You Serve
Nonprofits & Fraud: Protecting the People You ServeMcKonly & Asbury, LLP
 
Session 1 - Vero (Catch Me if You Can) event presentation with video
Session 1 - Vero (Catch Me if You Can) event presentation with videoSession 1 - Vero (Catch Me if You Can) event presentation with video
Session 1 - Vero (Catch Me if You Can) event presentation with videoHr NETWORK Magazine
 
Straight Talk for Lawyers About Social Media
Straight Talk for Lawyers About Social MediaStraight Talk for Lawyers About Social Media
Straight Talk for Lawyers About Social MediaDeborah Gonzalez, Esq.
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...jsnyder40
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 
Case study on whistleblowing
Case study on whistleblowingCase study on whistleblowing
Case study on whistleblowingParveen Bano
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Jim Adler
 
Confessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data BrokerConfessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data Brokermetanautix
 
IST Presentation
IST PresentationIST Presentation
IST Presentationguest1d1ed5
 
ACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastLogikcull.com
 
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)Shawn Tuma
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxZakiAhmed70
 
Whistle blowing Policy-1.pptx
Whistle blowing Policy-1.pptxWhistle blowing Policy-1.pptx
Whistle blowing Policy-1.pptxVenkatDhanyamraju
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 

Ähnlich wie Houston Johnson - Preventing Undercover Employment Operations (20)

Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
whistle blowing.
whistle blowing.whistle blowing.
whistle blowing.
 
Nonprofits & Fraud: Protecting the People You Serve
Nonprofits & Fraud: Protecting the People You ServeNonprofits & Fraud: Protecting the People You Serve
Nonprofits & Fraud: Protecting the People You Serve
 
Session 1 - Vero (Catch Me if You Can) event presentation with video
Session 1 - Vero (Catch Me if You Can) event presentation with videoSession 1 - Vero (Catch Me if You Can) event presentation with video
Session 1 - Vero (Catch Me if You Can) event presentation with video
 
Straight Talk for Lawyers About Social Media
Straight Talk for Lawyers About Social MediaStraight Talk for Lawyers About Social Media
Straight Talk for Lawyers About Social Media
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
Case study on whistleblowing
Case study on whistleblowingCase study on whistleblowing
Case study on whistleblowing
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
 
Confessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data BrokerConfessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data Broker
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
The Ethics Of The Whistle Blower Essay
The Ethics Of The Whistle Blower EssayThe Ethics Of The Whistle Blower Essay
The Ethics Of The Whistle Blower Essay
 
ACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity Webcast
 
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
 
Kid Safe Democracy Work
Kid Safe Democracy WorkKid Safe Democracy Work
Kid Safe Democracy Work
 
Whistle blowing Policy-1.pptx
Whistle blowing Policy-1.pptxWhistle blowing Policy-1.pptx
Whistle blowing Policy-1.pptx
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 

Mehr von John Blue

Jordan Hoewischer - OACI Farmer Certification Program
Jordan Hoewischer - OACI Farmer Certification ProgramJordan Hoewischer - OACI Farmer Certification Program
Jordan Hoewischer - OACI Farmer Certification ProgramJohn Blue
 
Fred Yoder - No-till and Climate Change: Fact, Fiction, and Ignorance
Fred Yoder - No-till and Climate Change: Fact, Fiction, and IgnoranceFred Yoder - No-till and Climate Change: Fact, Fiction, and Ignorance
Fred Yoder - No-till and Climate Change: Fact, Fiction, and IgnoranceJohn Blue
 
Dr. John Grove - Fifty Years Of No-till Research In Kentucky
Dr. John Grove - Fifty Years Of No-till Research In KentuckyDr. John Grove - Fifty Years Of No-till Research In Kentucky
Dr. John Grove - Fifty Years Of No-till Research In KentuckyJohn Blue
 
Dr. Warren Dick - Pioneering No-till Research Since 1962
Dr. Warren Dick - Pioneering No-till Research Since 1962Dr. Warren Dick - Pioneering No-till Research Since 1962
Dr. Warren Dick - Pioneering No-till Research Since 1962John Blue
 
Dr. Christine Sprunger - The role that roots play in building soil organic ma...
Dr. Christine Sprunger - The role that roots play in building soil organic ma...Dr. Christine Sprunger - The role that roots play in building soil organic ma...
Dr. Christine Sprunger - The role that roots play in building soil organic ma...John Blue
 
Dr. Leonardo Deiss - Stratification, the Role of Roots, and Yield Trends afte...
Dr. Leonardo Deiss - Stratification, the Role of Roots, and Yield Trends afte...Dr. Leonardo Deiss - Stratification, the Role of Roots, and Yield Trends afte...
Dr. Leonardo Deiss - Stratification, the Role of Roots, and Yield Trends afte...John Blue
 
Dr. Steve Culman - No-Till Yield Data Analysis
Dr. Steve Culman - No-Till Yield Data AnalysisDr. Steve Culman - No-Till Yield Data Analysis
Dr. Steve Culman - No-Till Yield Data AnalysisJohn Blue
 
Alan Sundermeier and Dr. Vinayak Shedekar - Soil biological Response to BMPs
Alan Sundermeier and Dr. Vinayak Shedekar - Soil biological Response to BMPs Alan Sundermeier and Dr. Vinayak Shedekar - Soil biological Response to BMPs
Alan Sundermeier and Dr. Vinayak Shedekar - Soil biological Response to BMPs John Blue
 
Dr. Curtis Young - Attracting And Protecting Pollinators
 Dr. Curtis Young - Attracting And Protecting Pollinators Dr. Curtis Young - Attracting And Protecting Pollinators
Dr. Curtis Young - Attracting And Protecting PollinatorsJohn Blue
 
Garth Ruff - Alternative Forages
Garth Ruff - Alternative Forages Garth Ruff - Alternative Forages
Garth Ruff - Alternative Forages John Blue
 
Sarah Noggle - Cover Crop Decision Tool Selector
 Sarah Noggle - Cover Crop Decision Tool Selector Sarah Noggle - Cover Crop Decision Tool Selector
Sarah Noggle - Cover Crop Decision Tool SelectorJohn Blue
 
Jim Belt - Hemp Regulations
Jim Belt - Hemp RegulationsJim Belt - Hemp Regulations
Jim Belt - Hemp RegulationsJohn Blue
 
John Barker - UAVs: Where Are We And What's Next
John Barker - UAVs: Where Are We And What's NextJohn Barker - UAVs: Where Are We And What's Next
John Barker - UAVs: Where Are We And What's NextJohn Blue
 
Dr. Rajbir Bajwa - Medical uses of Marijuana
 Dr. Rajbir Bajwa - Medical uses of Marijuana Dr. Rajbir Bajwa - Medical uses of Marijuana
Dr. Rajbir Bajwa - Medical uses of MarijuanaJohn Blue
 
Dr. Jeff Stachler - Setting up a Corn and Soybean Herbicide Program with Cove...
Dr. Jeff Stachler - Setting up a Corn and Soybean Herbicide Program with Cove...Dr. Jeff Stachler - Setting up a Corn and Soybean Herbicide Program with Cove...
Dr. Jeff Stachler - Setting up a Corn and Soybean Herbicide Program with Cove...John Blue
 
Dr. Chad Penn - Developing A New Approach To Soil Phosphorus Testing And Reco...
Dr. Chad Penn - Developing A New Approach To Soil Phosphorus Testing And Reco...Dr. Chad Penn - Developing A New Approach To Soil Phosphorus Testing And Reco...
Dr. Chad Penn - Developing A New Approach To Soil Phosphorus Testing And Reco...John Blue
 
Jim Hoorman - Dealing with Cover Crops after Preventative Planting
Jim Hoorman - Dealing with Cover Crops after Preventative PlantingJim Hoorman - Dealing with Cover Crops after Preventative Planting
Jim Hoorman - Dealing with Cover Crops after Preventative PlantingJohn Blue
 
Dr. Sjoerd Duiker - Dealing with Poor Soil Structure and Soil Compaction
Dr. Sjoerd Duiker - Dealing with Poor Soil Structure and Soil Compaction Dr. Sjoerd Duiker - Dealing with Poor Soil Structure and Soil Compaction
Dr. Sjoerd Duiker - Dealing with Poor Soil Structure and Soil Compaction John Blue
 
Christine Brown - Canadian Livestock Producers Efforts to Improve Water Quality
Christine Brown - Canadian Livestock Producers Efforts to Improve Water QualityChristine Brown - Canadian Livestock Producers Efforts to Improve Water Quality
Christine Brown - Canadian Livestock Producers Efforts to Improve Water QualityJohn Blue
 
Dr. Lee Briese - Details Matter (includes details about soil, equipment, cove...
Dr. Lee Briese - Details Matter (includes details about soil, equipment, cove...Dr. Lee Briese - Details Matter (includes details about soil, equipment, cove...
Dr. Lee Briese - Details Matter (includes details about soil, equipment, cove...John Blue
 

Mehr von John Blue (20)

Jordan Hoewischer - OACI Farmer Certification Program
Jordan Hoewischer - OACI Farmer Certification ProgramJordan Hoewischer - OACI Farmer Certification Program
Jordan Hoewischer - OACI Farmer Certification Program
 
Fred Yoder - No-till and Climate Change: Fact, Fiction, and Ignorance
Fred Yoder - No-till and Climate Change: Fact, Fiction, and IgnoranceFred Yoder - No-till and Climate Change: Fact, Fiction, and Ignorance
Fred Yoder - No-till and Climate Change: Fact, Fiction, and Ignorance
 
Dr. John Grove - Fifty Years Of No-till Research In Kentucky
Dr. John Grove - Fifty Years Of No-till Research In KentuckyDr. John Grove - Fifty Years Of No-till Research In Kentucky
Dr. John Grove - Fifty Years Of No-till Research In Kentucky
 
Dr. Warren Dick - Pioneering No-till Research Since 1962
Dr. Warren Dick - Pioneering No-till Research Since 1962Dr. Warren Dick - Pioneering No-till Research Since 1962
Dr. Warren Dick - Pioneering No-till Research Since 1962
 
Dr. Christine Sprunger - The role that roots play in building soil organic ma...
Dr. Christine Sprunger - The role that roots play in building soil organic ma...Dr. Christine Sprunger - The role that roots play in building soil organic ma...
Dr. Christine Sprunger - The role that roots play in building soil organic ma...
 
Dr. Leonardo Deiss - Stratification, the Role of Roots, and Yield Trends afte...
Dr. Leonardo Deiss - Stratification, the Role of Roots, and Yield Trends afte...Dr. Leonardo Deiss - Stratification, the Role of Roots, and Yield Trends afte...
Dr. Leonardo Deiss - Stratification, the Role of Roots, and Yield Trends afte...
 
Dr. Steve Culman - No-Till Yield Data Analysis
Dr. Steve Culman - No-Till Yield Data AnalysisDr. Steve Culman - No-Till Yield Data Analysis
Dr. Steve Culman - No-Till Yield Data Analysis
 
Alan Sundermeier and Dr. Vinayak Shedekar - Soil biological Response to BMPs
Alan Sundermeier and Dr. Vinayak Shedekar - Soil biological Response to BMPs Alan Sundermeier and Dr. Vinayak Shedekar - Soil biological Response to BMPs
Alan Sundermeier and Dr. Vinayak Shedekar - Soil biological Response to BMPs
 
Dr. Curtis Young - Attracting And Protecting Pollinators
 Dr. Curtis Young - Attracting And Protecting Pollinators Dr. Curtis Young - Attracting And Protecting Pollinators
Dr. Curtis Young - Attracting And Protecting Pollinators
 
Garth Ruff - Alternative Forages
Garth Ruff - Alternative Forages Garth Ruff - Alternative Forages
Garth Ruff - Alternative Forages
 
Sarah Noggle - Cover Crop Decision Tool Selector
 Sarah Noggle - Cover Crop Decision Tool Selector Sarah Noggle - Cover Crop Decision Tool Selector
Sarah Noggle - Cover Crop Decision Tool Selector
 
Jim Belt - Hemp Regulations
Jim Belt - Hemp RegulationsJim Belt - Hemp Regulations
Jim Belt - Hemp Regulations
 
John Barker - UAVs: Where Are We And What's Next
John Barker - UAVs: Where Are We And What's NextJohn Barker - UAVs: Where Are We And What's Next
John Barker - UAVs: Where Are We And What's Next
 
Dr. Rajbir Bajwa - Medical uses of Marijuana
 Dr. Rajbir Bajwa - Medical uses of Marijuana Dr. Rajbir Bajwa - Medical uses of Marijuana
Dr. Rajbir Bajwa - Medical uses of Marijuana
 
Dr. Jeff Stachler - Setting up a Corn and Soybean Herbicide Program with Cove...
Dr. Jeff Stachler - Setting up a Corn and Soybean Herbicide Program with Cove...Dr. Jeff Stachler - Setting up a Corn and Soybean Herbicide Program with Cove...
Dr. Jeff Stachler - Setting up a Corn and Soybean Herbicide Program with Cove...
 
Dr. Chad Penn - Developing A New Approach To Soil Phosphorus Testing And Reco...
Dr. Chad Penn - Developing A New Approach To Soil Phosphorus Testing And Reco...Dr. Chad Penn - Developing A New Approach To Soil Phosphorus Testing And Reco...
Dr. Chad Penn - Developing A New Approach To Soil Phosphorus Testing And Reco...
 
Jim Hoorman - Dealing with Cover Crops after Preventative Planting
Jim Hoorman - Dealing with Cover Crops after Preventative PlantingJim Hoorman - Dealing with Cover Crops after Preventative Planting
Jim Hoorman - Dealing with Cover Crops after Preventative Planting
 
Dr. Sjoerd Duiker - Dealing with Poor Soil Structure and Soil Compaction
Dr. Sjoerd Duiker - Dealing with Poor Soil Structure and Soil Compaction Dr. Sjoerd Duiker - Dealing with Poor Soil Structure and Soil Compaction
Dr. Sjoerd Duiker - Dealing with Poor Soil Structure and Soil Compaction
 
Christine Brown - Canadian Livestock Producers Efforts to Improve Water Quality
Christine Brown - Canadian Livestock Producers Efforts to Improve Water QualityChristine Brown - Canadian Livestock Producers Efforts to Improve Water Quality
Christine Brown - Canadian Livestock Producers Efforts to Improve Water Quality
 
Dr. Lee Briese - Details Matter (includes details about soil, equipment, cove...
Dr. Lee Briese - Details Matter (includes details about soil, equipment, cove...Dr. Lee Briese - Details Matter (includes details about soil, equipment, cove...
Dr. Lee Briese - Details Matter (includes details about soil, equipment, cove...
 

Kürzlich hochgeladen

Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Associazione Digital Days
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 

Kürzlich hochgeladen (20)

Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 

Houston Johnson - Preventing Undercover Employment Operations

  • 2. Competition A new crime trend: stealing bull semen Gazette Extra By TED SULLIVAN Tuesday, April 20, 2010 “In a string of recent burglaries, thieves have targeted dairy farmers to steal a valuable commodity: bull semen. Valued at $22,000” “Farmers believe thieves might be selling the semen on the black market.” “A bull semen theft also was reported in Brodhead in July 2008. About 100 embryos or semen samples valued at $35,000 were stolen.
  • 3. Terrorist Their ideology or religion is more important than anything else to include their own lives. Their motivation is to eliminate those who are non-believers or those who jeopardize the fundamentals of their religious beliefs.
  • 4. Protectionist These groups want to protect things they think can’t protect themselves. Other motivations dehumanizes their targets while protectionist groups humanize what they are protecting.
  • 5. Goals Keep You Problem Solving Financial Impact Change Your Practices / End or Impact Business Shake Consumer Confidence Gain Media Attention Claim Responsibility Reduce Public Support of Industry Increases Membership Public Belief & Awareness of Cause Fundraising Empowers their efforts
  • 6. Group Profiling Considerations   Location and Motivation helps determine potential targets Financial Backing and Education helps determine potential capability and range of operations
  • 7. How They Get It? Getting hired in your organization  Social Engineering Your Group  Undercover Tactics – Video & Pictures  Legal Methods – OSI, Public Info, Courts  Sharing Their Success With Others 
  • 8. Knowledge Is Power Art of War “The Original Spy Manual” “Probe the enemy to unmask his strengths, weaknesses, patterns of movement and intentions. Shape the enemy’s perception of the world to manipulate/ undermine his plans and actions.”
  • 9. Social Engineering  What can I figure out about you? • Internet – Google • Social Pages (Facebook) Maiden Name, DOB  Address, travel plans  High School & College  Hobbies & Friends  • Trash • Phishing – 21% Increase (18,820 Attacks)
  • 10.
  • 11. Social Engineering Log Ins & Passwords  Security Questions  Cell & Computer Security 
  • 12.
  • 13.
  • 14. Hacking human gullibility with social penetration: We don't need no stinking exploits By Dan Goodin in San Francisco “Vulnerability stems from humans' inherent tendency to trust one another. Survival over the millennia largely depended on their ability to work in groups. When one person saw that a group of his peers ate a particular berry and didn't die, he ate the same fruit - and survived as a result. Hackers who understand this trait can exploit it to access companies' most precious assets.” “David Bailey said he regularly sends client employees emails informing them the strength of their login passwords is being tested through a new website. They are then instructed to follow a link and enter their credentials. The success rate: as high as 50 per cent”
  • 15.
  • 16. How They Use It?  Distort Public Perceptions • Hallmark-Westland Video      Activism & Fraud Network Access Criminal Acts – Arson, Stalking, Criminal Mischief Educate other Groups Propaganda • Funding – USDA Domestic Horse Slaughter Insp. • Public Relations – Yellow Tail Winery - $100K • Political – Sub-therapeutic Antibiotics Legislation
  • 17.
  • 18. What might they do with this info?
  • 19.
  • 20. What’s Next Animal activists' unsettling bid for freedom Sharp Science Short 15 March 2010 Science In Society -Andy Coghlan, reporter -Andy Firebombing, arson, hitting people with baseball clubs, disinterring people's dead relatives and screaming abuse through loudhailers all day and night Researchers quoted in The Guardian say they're intimidated by the tactic, fearing that exposure of their experiments, however legal and ethically justified, would make them targets for extremists. Constrained in the UK, activists moved instead to the US and the European mainland, where they have been engaging in violent campaigns similar to those previously confined to the UK
  • 21. What Can You Do?      To understand how not to hire a plant you must first understand them. Understand how your business may be vulnerable Understand what is out there about you Investigate complaints thoroughly and completely (internal & external) Suspicious Activity Reporting Process (anonymous, easy, and free) has to be followed up on quickly.
  • 22. Facility Security Recommendations  Office & Plant Security • The Environment Dictates the Tactic  Employee Screening • Profile Behaviors Not People  Employee Training & Accountability • SCAN, Reporting Process (suspicion & abuse)  Responding to Activists’ Letters • Let the Pro’s Help You  Talking With Law Enforcement • Explosives,Arson (ATF) $10K, Terrorism (FBI), pay (IRS)  Talking With Media • Have a PIO – You never know when or where it will happen
  • 23. Behaviors     Temporary Positions – willing to take jobs that only last short periods of time. 18 to 30’s Generally Caucasians College or University ID’s not Government ID • University or major city within hour of you?      Over or Inappropriately (degree not related) educated Out of State ID or Vehicles Willingness to come early & stay late Attempting or accessing restricted areas not job related. “I’ve always wanted to see that” May indicate previous related job experience
  • 24. Educate Yourself & Your Company       Need Buy-In from Top Down Develop an understanding of the opposition What is your companies vulnerability? Understand how they would focus on your vulnerabilities. Educate your staff – SCAN, Water Cooler Suspicions (“He doesn’t fit in”, “He’s over educated for that job, that’s why he wants to move up”. If company goes out of business everyone is out of a job. Secure your assets (facilities & Information) – They only have to be right once, you have to be right every day.
  • 25. Develop legal hiring techniques that identify suspected plants        Add perjury clause and have statements and applications signed (compare signatures) Verify past employment-ask questions and communicate with others in industry. Do background checks – use computer tools to investigate (Google, E-Verify, Social Networking, Facial Recognition Software) – Call references & contacts Take photos & fingerprints of them Verify (false ID tools) & Xerox identification (investigative asset) – keep secure so cant be recovered by plant. Register vehicles with access to plants (photograph them with their vehicle) Do a surprise home visit.
  • 26. Develop policies that mandate animal care and handling procedures Hold employees accountable to those policies and reporting abuses. (Section C of AAA Facility Security Recommendations)  If you don’t police yourself someone else will.  Off Premise Monitoring  Follow-up on complaints & back brief 
  • 27. Push Back Prosecute Violations  Make them work for it  Be proactive  Discipline Internal Violations 
  • 28. Develop Information & Intelligence Sharing Relationships Law Enforcement  Other Processors & Facilities in your area  Organizations that track activists, activities & proactive legislation  Joint Training  Share suspicious activity (Dallas) 
  • 29. Questions? You have to be more passionate about keeping this from happening than they are about stopping it. You have to be right every day, they only have to get it right once. Houston Johnson 254.534.1646 houston@genesis0103.com

Hinweis der Redaktion

  1. Ohio – Livestock Care Standards – HSUS filed bill supporting stricter standards on Confined Livestock Production. Dave White (Ohio Livestock Coalition)
  2. Ohio – Livestock Care Standards – HSUS filed bill supporting stricter standards on Confined Livestock Production. Dave White (Ohio Livestock Coalition)