Saturday, July 29, 2017

Armed Robber Plagues West Michigan



I'm sure many of you that reside in the west Michigan area are aware of the news stories of an armed robber striking multiple gas stations/convenience stores in the area. An unknown subject in west Michigan is responsible for three armed robberies, first in Muskegon county (occurring on 7/10), second in Oceana county (occurring on 7/19), and the last in Newaygo county (also occurring on 7/19).

As many are wondering, what can we do to prevent further attacks like this from happening? The lack of an accurate description appears to be impeding this investigation. As the picture shows below, the suspect covered his face and wore similar clothing in each robbery. All witnesses have stated they believe it is a white male between 5’ to 5’4”. That however, is the only description available. With such insignificant details as these, it's almost impossible to begin an investigation on who is responsible. suspect.jpg


It's important that third shift retail clerks in these types of environments are trained in safely retaining descriptions of robbery suspects. The situation can be very frightening in the moment but it's important that people committing robberies do not get away with them. First, in many stores there is an height measure next to the door. They allow you to quickly look at the approximate height of someone as they enter or exit. This is a great tool to utilize.

Next, look for some insignificant details they can lead investigators on to the right path. For example, maybe a tattoo or scar on their hand, eye color, skin tone, etc. Sometimes you can tell what someone's ethnicity is just by hearing their voice. Lastly, remember that people who commit these crimes often talk to others about committing them. If someone around the area states that they have details on who did it. Be sure to contact the police and get the information where it needs to go.


These situations are incredibly unfortunate, but we are happy to hear that there were no reported injuries. Remember to stay safe and to be vigilant. You never know what you may witness or encounter.


Friday, July 21, 2017

What is considered Terrorism?

Terrorism Targets

Terrorism is the use of force or violence against persons or property in violation of the criminal laws of the United States for purposes of intimidation, coercion, or ransom. Terrorists often use threats to:
  • Create fear among the public
  • Try to convince citizens that their government is powerless to prevent terrorism
  • Get immediate publicity for their causes Acts of terrorism include threats of terrorism; assassinations; hijackings; bomb scares and bombings; cyber attacks (computer-based); and the use of chemical, biological, nuclear and radiological weapons. High-risk targets for acts of terrorism include military and civilian government facilities, international airports, large cities, and high-profile landmarks. Terrorists might also target large public gatherings, water and food supplies, chemical plants, utilities, and corporate centers. Further, terrorists are capable of spreading fear by sending explosives or chemical and biological agents through the mail.

Homeland Security Begins With Hometown Security

The Justice Department recently launched the Nationwide SAR (Suspicious Activity Reporting) Initiative—NSI—a program that sets up “fusion centers” where reports of suspicious activities made by citizens and local police are collected and analyzed. NSI establishes a uniform process for gathering and sharing information among federal, state, local and tribal agencies with the aim of detecting underlying patterns of “precursor conduct”—activities that may signal a potential terrorist attack. The public plays a large part in the NSI program. Authorities are depending upon ordinary citizens to provide the dots to connect. As Department of Homeland Security Secretary Janet Napolitano put it, “Homeland security begins with hometown security.” But what exactly should the public be looking for?

See Something, Say Something

Certain kinds of activities can indicate terrorist plans are in the works, especially when they occur at or near high-profile sites or places where large numbers of people gather. The FBI urges citizens to keep an eye out for such precursor conduct—like that listed below—and to report it immediately.
Surveillance: Are you aware of anyone recording or monitoring activities, taking notes, using cameras, maps, binoculars or other observation equipment near a key facility? Deploying Assets: Have you observed abandoned vehicles, stockpiling of suspicious materials, or persons being deployed near a key facility?
Suspicious Persons: Are you aware of anyone who does not appear to belong in the workplace, neighborhood, business establishment, or near a key facility?
Suspicious Questioning: Are you aware of anyone attempting to gain information in person, by phone, mail, email or other communication method regarding a key facility or its personnel?
Acquiring Supplies: Are you aware of anyone attempting to improperly acquire explosives, weapons, ammunitions, dangerous chemicals, uniforms, badges, flight manuals, access cards or identification for a key facility, or to legally obtain items under suspicious circumstances that could be used in a terrorist act?
Dry Runs: Have you observed any behavior that appears to be preparation for terrorist activity, such as mapping out routes, playing out scenarios with other people, monitoring key facilities, timing traffic lights or traffic flow, or other suspicious activities?
Tests of Security: Are you aware of any attempts to penetrate or test physical security or procedures at a key facility or event? Recognizing and reporting precursor intelligence-gathering activities can interrupt potential terrorist events, crimes and other threats before they occur. While on the job, security officers should follow post orders for reporting suspicious activity. Otherwise, the FBI encourages citizens to contact local police, the FBI or the nearest Joint Terrorism Task Force (JTTF) to report suspicious activity or behavior. If there is an emergency or immediate threat, call 911.
For more information on the NSI program go to http://nsi.ncirc.gov/.
For additional resources on detecting and reporting indicators of terrorist attacks, and for guidelines on preparedness and response to terrorism threats, visit

Source: Samantha Dutcher

Tuesday, July 11, 2017

Vacation Security Risks

Vacation Security Risks

Most of us have pledged to unplug while on a vacation—a “digital detox”—only to back-pedal on that promise at the onset. Staying connected, however, can expose travelers to more than a less-than-relaxing excursion.
Security risks are high for vacationers. They are especially vulnerable because they are less inclined to be vigilant while on vacation.
Security experts recommend vacationers remain on alert for thieves targeting smartphones, as well as to secure devices that may otherwise give cyber criminals access to personal data.
To lessen the impact should your phone be stolen, back it up before you travel, and set up a password or PIN code for added protection, the security experts suggest.Avoid posting information about your vacation on social media before and during the trip. This is type of information can give thieves and cyber criminals the green light to burglarize your home and/or attack your devices.
While on vacation, avoid using Bluetooth or Wi-Fi. Connecting to an unprotected network could inadvertently give cyber criminals access to your data, including private work-related files you may be viewing while traveling.

Do not unplug, however, when it comes to your finances, security experts advise. Monitor your accounts for suspicious activity. If you believe you have been victimized by a cyber criminal, take action immediately to recover any losses.