Tuesday, January 8, 2013

SCAM Alerts.


Internet Crime Complaint Center's (IC3)
Scam Alerts

This report, which is based upon information from law enforcement and complaints submitted to the IC3, details recent cyber crime trends and new twists to previously-existing cyber scams.

New Twist to Online Tech Support Scam

The IC3 continues to receive complaints reporting telephone calls from individuals claiming to be with Tech Support from a well-known software company. The callers have very strong accents and use common names such as "Adam" or "Bill." Callers report the user's computer is sending error messages, and a virus has been detected. In order to gain access to the user's computer, the caller claims that only their company can resolve the issue.

The caller convinces the user to grant them the authority to run a program to scan their operating system. Users witness the caller going through their files as the caller claims they are showing how the virus has infected their computer.

Users are told the virus could be removed for a fee and are asked for their credit card details. Those who provide the caller remote access to their computers, whether they paid for the virus to be removed or not, report difficulties with their computer afterwards; either their computers would not turn on or certain programs/files were inaccessible.

Some report taking their computers to local technicians for repair and the technicians confirmed software had been installed. However, no other details were provided.

In a new twist to this scam, it was reported that a user's computer screen turned blue, and eventually black, prior to receiving the call from Tech Support offering to fix their computer. At this time, it has not been determined if this is related to the telephone call or if the user had been experiencing prior computer problems.

TDoS Attacks to Emergency Services

As some are aware, reports of pay day loan phone scams have been occurring for the last three years or more. The scam involves victims being relentlessly contacted at their residences and places of employment regarding claims they are delinquent on a payday loan. Various coercion techniques have been used by the subjects in an attempt to persuade the victim to send money. Such techniques have evolved from repeated annoying phone calls to abusive language, threats of bodily harm, and arrests.

The IC3 has become aware of increased coercion tactics used by the subjects, which have created a threat to emergency services across the nation. The threats have now escalated into a Telephony Denial of Service (TDoS) attacks against the victims' employers, which some have been emergency service agencies. The TDoS attacks have tied up the emergency services' telephone lines, preventing them from receiving and responding to legitimate emergency calls.

The other tactic the subjects are now using in order to convince the victim that a warrant for their arrest exists is by spoofing a police department's telephone number when calling the victim. The subject claims there is a warrant issued for the victim's arrest for failure to pay off the loan. In order to have the police actually respond to the victim's residence, the subject places repeated, harassing calls to the local police department while spoofing the victim's telephone number.

Most Popular 2012 Passwords Revealed

SplashData.com recently published the following information regarding the most popular 2012 passwords on the web. The ranking was based on password information from compromised accounts posted by hackers online. The article was also featured on blogs.avg.com.
This year, the list is back! So it's time to see how, if at all, users have learned their lessons about what makes a strong password.
Here's the full list and how it compares to last year's:
#PasswordChange from 2011
1.passwordUnchanged
2.123456Unchanged
3.12345678Unchanged
4.abc123Up 1
5.qwertyDown 1
6.monkeyUnchanged
7.letmeinUp 1
8.dragonUp 2
9.111111Up 3
10.baseballUp 1
11.iloveyouUp 2
12.trustno1Down 3
13.1234567Down 6
14.sunshineUp 1
15.masterDown 1
16.123123Up 4
17.welcomeNew
18.shadowUp 1
19.ashleyDown 3
20.footballUp 5
21.jesusNew
22.michaelUp 2
23.ninjaNew
24.mustangNew
25.password1New
As you can see, people haven’t changed their password habits a whole lot in a year.
If your password is included on that list, or is a close variation of these passwords, it's really important to take action now!
Fixing your password problem can be very simple;
Long is strong: The longer the password, the more difficult it will be for someone to try and crack it using brute force. So, instead of a single word, with a jumble of symbols, numbers and characters, try a string of words. Use a line of your favorite poem, song or just something memorable. Feel free to add your lucky number at the end if you like.
Something like: "withnodirectionhome1085".
A famous Dylan lyric like this will always be easy to remember, and say you were born in October 1985. This means that you've suddenly got a 23 character password, which is much harder to crack than something much harder to remember such as "Phu!R7tRjX".
Variety is the spice of life: The trouble with smaller, complex passwords is that they can be a real hassle to remember, often forcing you to use the same password for multiple accounts which is never a good idea. So another benefit of having long, easy to remember passwords is that you keep many passwords.

Java Zero-Day Exploit On Sale for 'Five Digits'

Miscreants in the cyber underground are selling an exploit for a previously undocumented security hole in Oracle's Java software that attackers can use to remotely seize control over systems running the program, KrebsOnSecurity has learned.
The flaw, currently being sold by an established member of an invite-only Underweb forum, targets an unpatched vulnerability in Java JRE 7 Update 9, the most recent version of Java (the seller says this flaw does not exist in Java 6 or earlier versions).
According to the vendor, the weakness resides within the Java class "MidiDevice.Info," a component of Java that handles audio input and output. "Code execution is very reliable, worked on all 7 version I tested with Firefox and MSIE on Windows 7," the seller explained in a sales thread on his exploit. It is not clear whether Chrome also is affected. "I will only sell this ONE TIME and I leave no guarantee that it will not be patched so use it quickly."
The seller was not terribly specific on the price he is asking for this exploit, but set the expected offer at "five digits." The price of any exploit is ultimately whatever the market will bear, but this is roughly in line with the last Java zero-day exploit that was being traded and sold on the underground. In August, I wrote about a newly discovered Java exploit being folded into the BlackHole exploit kit, quoting the author of that crimeware tool as saying that "the price of such an exploit if it were sold privately would be about $100,000."
I have repeatedly urged readers who have no use for Java to remove it from their systems entirely. This is a very complex program that is widely installed (Oracle claims that some 3 billion devices run Java), and those two qualities make it a favorite target for attackers. What’s more, Java is a cross-platform technology, meaning that applications written to run in Java can run seamlessly across multiple operating systems. Indeed, some 650,000 Mac users discovered this the hard way earlier this year, when the Flashback worm took advantage of an unpatched vulnerability that was present in Apple's version of Java.
Apple has since taken steps to unplug Java from the browser in OS X, and this is the very approach I’ve recommended for users who need Java for specific Web sites or applications (see: http://krebsonsecurity.com/how-to-unplug-java-from-the-browser), I would suggest a two-browser approach. If you normally browse the Web with Firefox, for example, consider disabling the Java plugin in Firefox, and then using an alternative browser (Chrome, IE9, Safari, etc.) with Java enabled to browse only the site that requires it.

Fake Order Confirmation Emails from American Airlines Leads to Malware

MX Lab, http://www.mxlab.eu, intercepted some samples of fake order confirmation emails from American Airlines that will lead the user to a host with an embedded Javascript that will download the malicious payload.
The email is send from the spoofed address "American Airlines" and has the following body (single image email):
Fake American Airlines email
In this case, the URL hxxp://egiser-ingenieros.com/FAHSIENFHE.html brings us to an HTML page with an embeded Javascript that will starts the download of the malicious ZIP file:
<html>(CR)(LF) <body>(CR)(LF) <script⋅language="JavaScript">(CR)(LF) <!–(CR)(LF) window.location="AA_Electronic_Ticket.zip";(CR)(LF) //–>(CR)(LF) </script>(CR)(LF) </body>(CR)(LF) </html> The ZIP file has the name AA_Electronic_Ticket.zip and contains the 60 kB large file AA_Electronic_Ticket.exe.
The trojan is known as Spyware/Win32.Zbot, Win32/TrojanDownloader.Zortob.B, Trojan.Generic.KDV.783582, W32/Kryptik.BWW.
At the time of writing, 13 of the 44 AV engines did detect the trojan at Virus Total.
Virus Total permalink and SHA256:
df95ea18dd12805419f71d33e7e8e2bd7a9c013b9799559ef288b609cc56e84f.

A Million Dollars, the Internet Crime Complaint Center and Naked Security — the Ingredients for a Scam

Naked Security released the following article on November 7, 2012.
An email scam is using a Naked Security news story about the arrest of a gang of suspected credit card fraudsters, in an attempt to scam innocent internet users.
The scam emails have the subject line "We have mandated your payment, kindly view below attachment", and claim to come from the Internet Crime Complaint Center (IC3).
Attached to the emails is a file (DETAILS.doc) which presents itself as an official communication from the IC3, explaining that criminal proceeds have been confiscated from scammers, and as the recipient's name and email address was found in the criminals' possession one million dollars in compensation is available.
Fake IC3 scam email
Part of the Word document, which uses the genuine IC3 logo, reads as follows:
We are hereby to inform you that we have been able to trap down some of the scam artists which have troubled the general public in name of helping our individuals to get their benefited fund or to indulge into business with them with the aim of defrauding our individuals.
Upon the course of our investigations, we found some documents bearing your name and your email address in the computer hard disk of the scammers. Having reported this matter to the World Bank president (Jim Yong Kim) who instructed that the assets confiscated from the scammers should be shared to those that their name and email address was found in the possession of the scam artists as refund of loosed money in the form of cash payment which you are among. You are therefore to be compensating with the sum of One Million United States Dollars (1US$Million).
Also we arrested some men who claim to be bank officials, Contract managers, Barrister and Lottery Agents from London who has been sending you bogus letters and SMS via your telephone numbers indicating that you have won a lottery which does not exist, claiming to release your fund via ATM CARD, proposing you business which never exist and those using the HSBC Bank London, South African Reserve Bank, First Commercial Bank London, Financial Intelligence Center, FBI to scam the general public.
The email then goes on to request that the recipient send over their name, address and phone number to an email address, allegedly belonging to the deputy governor of a South African bank.
It doesn't take a super-sleuth to realise that this is going to end up as a 419 scam, with the potential victim encouraged to pay a logistical fee in advance for the release of the funds. In short, anyone who falls for the ruse is going to end up out of pocket.
What caught our eye, however, was the news story link that the scammers are using to give credence to their story that funds are available after the capture of cybercriminals.
Fake IC3 scam email detail
Yes, it points to a Naked Security story from earlier this year about an FBI arrest of 24 people in a suspected credit card fraud ring.
I guess we should be flattered..\
Don't forget — just because you think it's unlikely that anyone would ever fall for an email scam like this, doesn't mean they don't succeed. There are people out there who are vulnerable or elderly who could be tricked into believing that the offer is real — and end up losing a lot of money as a result.

Monday, January 7, 2013

Internship Opportunities: USAID. Deadline January 28, 2013

Dear Global Health Colleague, 

The internship application deadline is approaching! Submit all your application materials by January 28th, 5:00 PM EST.

Make summer 2013 your career stepping stone
The Global Health Fellows Program II (GHFP-II) is pleased to announce its Summer 2013 internships with the US Agency for International Development (USAID) in the Agency's Washington, DC headquarters. We have added 4 positions since the initial announcement, for a total of 25 available summer internships!

Work with the largest development agency in the world
USAID is home to a wide range of global health professionals working on health projects of international scope and importance. Contribute your skills to specific activities in one of five offices of the USAID Bureau for Global Health: Office of the Assistant Administrator; Office of HIV/AIDS; Office of Population and Reproductive Health; Office of Health, Infectious Diseases and Nutrition; and the Office of Programming, Planning, and Policy.

These internships will provide you a unique opportunity to gain practical experience in the field of global health. You'll be working with experienced professionals on health projects of international importance.

To learn more about what it's like to be a GHFP-II intern, check out this great video made by a GHFP-II 2012 Summer Alumnus. 
Technical areas include:
  • Infectious diseases: HIV/AIDS, TB, Malaria
  • Maternal and child health
  • Reproductive health
  • Nutrition
  • Commodities and logistics
  • Youth programming
  • Demography
Positions and Applicants
A variety of competitive positions are available. While most positions are at the graduate level, some positions are also open to undergraduate students who meet certain criteria, as well as some that will be challenging for PhD candidates and mid-career changers. We are interested in people from a broad range of disciplines including:
  • Public health
  • Social work
  • Education
  • International relations/development
  • Supply chain management
  • Database technology and informatics
  • Medicine
  • Nursing/midwifery
  • Public policy
  • Pharmacy
  • Business administration
  • Social entrepreneurship
  • Population and demographic studies
  • Communications

25 Summer 2013 Internships are available, including:

NEW Office of HIV/AIDS
Orphans and Vulnerable Children (OVC) and Social Service Workforce Strengthening (SSWS) Intern

NEW Office of HIV/AIDS; Implementation Support Division
Orphans and Vulnerable Children (OVC) Psychosocial Support and Evaluation Intern

NEW Office of Health, Infectious Disease, and Nutrition
Private Sector Partnerships Intern

NEW Center to Accelerate Innovation and Impact
Saving Lives at Birth Intern


INTERNSHIP DATES: May 28, 2013 - August 20, 2013
APPLICATION DEADLINE:All applications must be submitted by 5:00 pm Eastern Time January 28, 2013.

TO APPLY, please find detailed instructions at www.ghfp.net.

NOTE: All internships require US citizenship or permanent resident status. We are proud to be an EEO/AA Employer.

Applicants can apply for up to two internship positions. If you apply for a Winter On-Demand Internship, you will only be allowed to apply for one Summer 2013 Internship.

To learn more about USAID, please visit www.usaid.gov.
To learn more about GHFP-II, please visit www.ghfp.net.

Friday, January 4, 2013

HHS Center for Faith-Based and Neighborhood Partnerships January 2013 Webinars


The HHS Partnership Center continues to host a series of webinars for faith and community leaders. All webinars are open to the public and include a question and answer session where you can ask HHS staff any questions you may have. We also encourage you to submit questions you would like to have answered on the webinars to ACA101@hhs.gov.
To participate in one of the webinars, please select your preferred topic from the list below and submit the necessary information. After registering you will receive an e-mail confirmation containing information about joining the webinar. Please contact us at ACA101@hhs.gov if you have registration problems.

January 10th at 2:00 p.m. ET
A presentation on the main provisions in the Affordable Care Act, the health care law, and how to access care in your community.

January 16 at 12:30 pm ET
Text4Baby is a free texting service that helps improve maternal and child health and reduce infant mortality. The presentation will highlight how Text4Baby works, why it is effective and how to share this resource with others.

January 22 at 2:00 p.m. ET
A presentation on the main provisions in the Affordable Care Act, the health care law, and how to access care in your community in Spanish. 

International Critical Incident Stress Foundation


International Critical Incident Stress Foundation, Inc.

A  Message from the ICISF Executive Director

January 4, 2013
It is our desire to continue to broaden our educational capabilities as well as offer new services available to ICISF Members, ICISF Registered Teams and all of those with an interest in Critical Incident Stress Management.

ICISF is excited to announce several new programs to be introduced during calendar year 2013. Click on the links below for additional information or to email ICISF staff. Throughout the coming months, more details will be posted on the ICISF website.
12TH WORLD CONGRESS ON STRESS TRAUMA & COPING
  • Be sure to register on or before January 27 to take advantage of Advance registration rates. Fees increase on January 28.
  • Just added: 2-Day Post-Congress Workshop, ICISF's "Managing School Crises: From Theory to Application", taught by Barbara J. Ertl, LPC, CTS. Scheduled for February 25 & 26, 8:00am-4:30pm, the Hilton Baltimore. Go to the Post-Congress Workshop page of the 12th World Congress website for full details and registration information.
  • The deadline to nominate a deserving individual or organization for an ICISF award is Monday, January 7. Award categories and nominating instructions are posted on the Award Nominations page of the 12th World Congress website.
NEW ICISF COURSES: 
Send questions to Terri Pazornick
  • "ICISF/NOVA Bridge Program" (2 days) - For those with NOVA training - This course meets curriculum requirements of ICISF's "Group Crisis Intervention" course and ICISF's "Individual Crisis Intervention and Peer Support" course.
  • "Delivering Bad News" (1 day)
  • "Suicide Awareness for Non- Mental Health Professionals" (1 day)
  • "Advanced Individual Crisis Intervention and Peer Support" 
  • "Resilience in Healthcare: Performance, Meaning and Connection"  (1day)
NEW APPROVED INSTRUCTOR (AI) CANDIDATE TRAINING PROGRAMS: 
Send questions to Kate Looram 
  • "Suicide Awareness for Non-Mental Health Professionals AI Program"  
  • "NOVA to ICISF Bridge AI Program"   
  • "Workplace Violence AI Program"
  • "Advanced Individual Crisis Intervention and Peer Support AI Program" 
  • "Psychological First Aid"
NEW CERTIFICATE OF SPECIALIZED TRAINING PROGRAM TRACK: 
Send questions to Michelle Parks 
  • Health Care Track
2013 REGIONAL CONFERENCE SCHEDULE:
  • New courses to be scheduled
  • Core, Specialty & Elective courses at every location
  • Schedule will be posted on the ICISF website soon. 
CONTINIUNG EDUCATION OPPORTUNITIES: 
Send questions to Michelle Parks 
  • CEUs for Nursing pending
  • Does your profession have a national organization that offers CEUs? Please let Michelle Parks know. ICISF already offers CEUs for Psychologists (through APA), Social Workers & Marriage & Family Therapists (through the California Board of Behavioral Sciences), EAP Professionals (through EACC), and Addiction Counselors (through NAADAC).
ICISF WEB SITE NEW POSTINGS 
Send us information to post on our website, such as:
  • ICISF Partner Events: Training programs, awards programs that will be open for registration/attendance
  • Links to CISM team websites (send questions to George Grimm)
  • Posting of Crisis Management related articles
  • International participation
  • Send questions and/or items you'd like to have posted to Don Howell 
ICISF CISM TEAM MEMBERSHIP: 
Send questions to Michelle Parks 
Membership is now available to all active members of CISM teams.

QUARTERLY LIFENET NEWSLETTER: 
Send questions to Michelle Parks 
Looking for articles and team spotlights.

NEW SHINING STAR ACKNOWLEDGEMENT PROGRAM: 
Send questions to Michelle Parks 
Quarterly acknowledgement of a "Shining Star" within the field of CISM.

ICISF FACEBOOK PAGE:
Send questions to Don Howell    
In our efforts to reach out to our ever-expanding community on every possible level, we're establishing a social media presence. We hope this will open up two-way communication, help to keep you better informed about our programs, and help you to reach out to us with questions, ideas and comments. 

2012-2014 STRATEGIC PLAN 
Visit the ICISF website to download and review this document. 
We look forward to hearing from you with any questions about the new initiatives we have planned for 2013, and to meeting your CISM training and education needs in the coming months. Happy New Year!

Sincerely, 

Donald R.  Howell
Executive Director
International Critical Incident Stress Foundation, Inc.
3290 Pine Orchard Ln, Ste 106
Ellicott City MD 21042-2272
Tel: 410/750-9600
Fax: 410/750-9601

                                                  

National Day of Service during the 57th Presidential Inauguration weekend, which coincides with the Martin Luther King, Jr. Day of Service

National Service News (banner)
Dear National Service Communicators and CNCS Colleagues,
We skipped this message last week to spend a little time with our friends and family, and we hope you did the same. Of course, national service never takes a day off. We're happy to share that we're working with the Presidential Inaugural Committee (PIC) to plan and host the National Day of Service during the 57th Presidential Inauguration weekend, which coincides with the Martin Luther King, Jr. Day of Service.
As today's Washington Post reports, "The committee, whose inaugural theme is 'Our People, Our Future,' has teamed up with the Corporation for National and Community Service and hired staff around the country to help organize events for the National Day of Service." Stay tuned for more information about how you can get involved.
Below please find other recent media clips about our programs and initiatives.
Thanks and enjoy your weekend.
The External Affairs Team

AmeriCorps NCCC member Katherine Wiley discusses Hurricane Sandy response

Media Highlight

In an interview with a Fox affiliate in St. Louis, Missouri, AmeriCorps NCCC member Katherine Wiley shares her experiences on the front lines of the Hurricane Sandy relief effort in storm-ravaged New York. 

National Service in the News


Volunteering and Civic Life in America

Volunteering and civic life- the backbone of a better AmericaMcClatchy (Washington, DC), December 27, 2012
Overall, one in four adults volunteered almost 8 billion hours through an organization, providing an estimated economic value of $171 billion. In addition to volunteering through organizations, two out of three Americans serve informally by helping out their neighbors, an increase of 9.5 percentage points from last year. The findings come from Volunteering and Civic Life in America, a report issued last week by the Corporation for National and Community Service and the National Conference on Citizenship.

AmeriCorps

Your kids can warm up with a cool bookKNDO 25 (Washington), January 2, 2012
The Regional Service Corps-AmeriCorps this week is holding afternoon reading activities at the Mid-Columbia Libraries branches. Corp member Valery Tolle says children of all ages can play games and take part in arts and crafts all aimed at inspiring them to read.

AmeriCorps VISTA

Brooklyn ‘A’ kicks off new years with arrival of new staff
Brooklyn Daily Eagle (New York), January 3, 2012
Brooklyn Legal Services Corporation A, more commonly known as “Brooklyn A,” the long-term provider of free legal services to low-income residents and community organizations in the neighborhoods of North and East Brooklyn, is celebrating the new year with the arrival of an extraordinary group of nine VISTA volunteers and law graduate fellowship winners.


AmeriCorps NCCC

St. Louisan On The Front Lines Of Hurricane Sandy ReliefFox 2 Now (Missouri), December 23, 2012
It’s been quite a homecoming for Katherine Wiley, 21, a recent college graduate from St. Louis, who just returned from the front lines of the Hurricane Sandy relief effort in storm-ravaged New York. She shared her unforgettable experiences and pictures with Fox 2 Sunday. That tortured place where flood gave way to fire and all hope seemed lost became home to Wiley and her team of 10 fellow AmeriCorps volunteers.


Senior Corps

Making a Difference for kids: School literacy program: A win-win for volunteers and childrenTimes Standard (California), December 28, 2012
”The nickname doesn't really fit until I do the face that makes kindergartners laugh,” he said. “I tell them there’s no smiling in school, but can’t get them to do the grumpy face. All they can do is smile and laugh.” Davis is among the 96 volunteers placed with 280 kindergarten through second-grade students as part of the Early Literacy Partners Program coordinated by the Humboldt County Office of Education and United Way.


Social Innovation Fund 

Scaling Smarter, Scaling for KeepsStanford Social Innovation Review (California), December 28, 2012
In his first term, President Obama committed to “seeking out creative, results-oriented programs … and helping them replicate their efforts across America.” In 2011, the federal Social Innovation Fund (SIF) made one of its first awards to the Local Initiatives Support Corporation (LISC), a national community development intermediary dedicated to the revitalization of low-income neighborhoods, to expand itsFinancial Opportunity Center (FOC) program.


Serve.gov Blog

National Mentoring Month Celebrates Adults Who Inspire
Serve.gov, January 3, 2013
Each new year draws millions to make resolutions designed to change their lives. And while the focus on self-improvement is fine, the arrival of National Mentoring Month gives us an opportunity to recognize men and women who channel their energy to helping and inspiring young people toward a brighter future.

Thursday, January 3, 2013

4 Powerful Words Employees Need to Hear


http://www.inc.com/jeff-haden/4-powerful-words-employees-need-to-hear.html

There are lots of ways to make a positive impact on your staff. But the best involves four simple words.

 

Here's how.Four simple words, used correctly and with the right intent, can make a powerful impact on your business, your life, and other people.

When you need help, start by using these four--and only these four--words:

"Can you help me?"

And then, for a moment, stop there.

Here's why.

You're not a kid anymore. You're an adult. You're smart and experienced and savvy. You've accomplished things. You've earned your place in the world.

So when you ask for help you also tend to unconsciously add image enhancers. For example, if you need help with a presentation you might go to someone and say, "I'm meeting with investors next week and my slides need a few formatting tweaks."

The problem is that wording serves to frame and signal your importance and ensure your ego is protected. Okay, you may need a little assistance with some trivial matter like a PowerPoint layout, but still: You are the one presenting to investors. You do the heavy lifting around here. You are the big dog in this particular hunt.

Plus you haven't really asked--you've stated. (When you're in charge and accustomed to directing others, turning requests into directives is a really easy habit to fall into.)

Here's a better way.

When you need help--no matter the kind of help you need or the person you need it from--take the bass out of your voice and the stiffness out of your spine and the captain out of your industry and just say, with sincerity and humility, "Can you help me?"

I guarantee the other person will say, "Sure," or, "I can try," or, "What do you need?" No one will never say "no," even a stranger. "Can you help me?" speaks powerfully to our instinctive desire to help other people.

Then make sure not to frame your request. Don't imply that you place yourself above the other person. Don't make your request too specific. And don't say what you need.

Instead, say what you can't do. Say, "I'm awful at PowerPoint and my slides look terrible." Say, "We absolutely have to ship this order by Tuesday and I have no idea how to make that happen." Say, "I'm lost and I can't find my hotel."

When you ask that way several powerful things immediately occur--especially for the other person:

One, you instantly convey respect. Without actually saying it, you've said, "You know more than I do." You've said, "You can do what I can't." You've said, "You have experience (or talents or something) that I don't have."

You've said, "I respect you." That level of respect is incredibly powerful--and empowering.

Two, you instantly convey trust. You show vulnerability, you admit to weakness, and you implicitly show that you trust the other person with that knowledge.

You've said, "I trust you." That level of trust is incredibly powerful--and empowering.

Three, you instantly convey you're willing to listen. You haven't tried to say exactly how people should help you. You give them the freedom to decide.

You've said, "You don't have to tell me what you think I want to hear; tell me whatyou think I should do." That level of freedom is incredibly powerful--and empowering.

By showing you respect and trust other people, and by giving them the latitude to freely share their expertise or knowledge, you don't just get the help you think you want.

You might also get the help you really need.

You get more--a lot more.

And so do other people, because they gain a true sense of satisfaction and pride that comes from being shown the respect and trust they--and everyone--deserves. Plus you make it easier for them to ask you for help when they need it. You've shown it's okay to express vulnerability, to admit a weakness, and to know when you need help.

And then, best of all, you get to say two more incredibly powerful words:

"Thank you."

And you get to truly mean them.

The Roles of Fire and EMS Personnel in Armed Attacks

Posted on January 3, 2013 by U.S. Deputy Fire Administrator Glenn Gaines

More than two hundred and sixty five people have been killed in multiple death armed attacks since the Littleton, Colorado Columbine High School shootings in 1999 through the most recent armed attack at the Sandy Hook Elementary School in Newtown, Connecticut.

As members of the fire service we now know that no-notice events such as Aurora, Colorado; Portland, Oregon and Sandy Hook have and will occur anywhere, at any place, to anyone or demographic. There is not one among us who hasn't been touched by the more recent events in Webster, New York where firefighters became the target of a planned armed attack.

Accordingly, the U.S. Fire Administration (USFA) is undertaking a study of these events in both this country and internationally to identify risk commonalities and best practices to successfully respond to these diverse incidents. The topical report will be released later this month and is currently undergoing extensive peer reviews. Extraordinary efforts on the part of local fire/rescue and EMS agencies have to be taken in order to protect fire and EMS personnel and experience maximum success in saving civilian lives. These events may play out over an extended period of time, requiring large EMS triage, treatment and transportation efforts, under dangerous and unfamiliar conditions to fire and EMS personnel.

In the interim, USFA offers these universal steps to ensure fire and EMS personnel are best prepared to meet this unique and challenging threat.

The most important action we can take is to determine the lead agency for these incidents. In the vast majority of cases, law enforcement will serve in this capacity. Regardless of lead agency declaration, make contact with local or state law enforcement officials and special operations team leadership to become familiar with their strategies and tactical operations.  Some possible subjects for discussion and planning follow:
  • Potential roles and equipment law enforcement expects from fire and EMS assets (e.g., forcible entry, lights, aerial devices, etc.).
  • Review command, control and communications operations.
  • Review of NIMS terminology along with any technical law enforcement terminology fire and EMS personnel may have a need to know.
  • A discussion of how survivor triage will occur and if law enforcement desires training in same.
  • How will injured law enforcement officers be managed? Early on in the incident a protected area should be declared and communicated to EMS leadership.
  • Casualty collection points for citizens, EMS triage and how transportation and communications with area hospitals occur.
  • What steps should be taken at high risk occupancies to mitigate the loss of life and coordinate with first response personnel.
  • Once the plan is developed, it should be exercised and updated annually.
There is much more valuable information to be learned from past events and the best practices created by those who have experienced one of these incidents. We encourage you to go to the following sources for more information.
http://www.usfa.fema.gov/about/chiefs-corner/010313.shtm

RECOMMENDED READING LIST

Search This Blog

ARCHIVE List 2011 - Present