Archive for the 'Weird / Bizarre Safety Stuff' Category

The is the LAST May in 2018 - disheartening news as David apparently overlooked the other Mays of 2018. Perhaps he should unfollow the Mayan calendar? In this episode, Dr. Perrodin flies solo and revolves anecdotal stories to touch upon agency, purpose and situational awareness. TWO-ALARM FIRE AT SCHOOL FOR THE BLIND - THE ONE QUESTION STUDENTS WANTED US TO ANSWER. A recent 2-alarm fire at his workplace (thankfully, it was a small blaze confined to a dryer) underscores David’s belief that kids and adults tend to handle the unexpected very well when previously informed of what to anticipate during chaotic events - or situations that move them from their comfortable, typical “torus” zone into temporary chaos. In previous episodes, Dr. Perrodin has provided empirical reasoning for why chaos is actually a good thing and that numerous studies have concluded people often make *sound decisions (*sound is more appropriate as “correct” implies that a decision must be convergent to achieve the desired outcome) during highly chaotic situations. Nonetheless, he shares that a co-worker asked to return to the building to use the restroom. Four separate student focus groups revealed a single request students had about the fire - after 20-minutes of standing patiently on the sidewalk, and hearing addition fire apparatus arrive at the facility, they wanted to know what was going on. David parallels this request for basic information to other crisis situations and notes that keeping people informed neutralizes anxiety and facilitates cooperation. Dr. Perrodin discusses ways to incorporate this “informing” process throughout other aspects of life. ALARMING TREND IN EMPLOYEES BEING PUT ON LEAVE - WHAT YOU NEED TO KNOW. Dr. Perrodin, who engages in various legal expert witness consulting, closes the episode by alerting listeners to an unsettling uptick in the practice of a human resources director placing an employee on leave due to an investigation. It’s a given that allegations of embezzlement or gross violation of job duties would warrant the employee being placed on either a paid or unpaid leave during the investigation. The difference in today’s HR practices, however, is two-fold. First, employees, both in management and non-management roles, are being placed on leave for more “subjective” allegations, such as, “contributing to a hostile work environment.” (What does that actually mean??) An example could be an employee that perceives a co-worker is not supporting a newly-created “safe space” in the work setting and files a complaint to HR per whatever process is outlined in the organization. Yes, claims can be that open to interpretation - note that the recipient of the hostile work environment is making a claim upon perception of behavior and interpretation of a definition that is broad. The second concerning characteristic of this trend is that the person placed on leave is immediately separated from their work email, electronic files and paper files. Locked out! Hence, documentation and records that can support the employee’s defense are not accessible by the employee. Now what? David shares that he contacted multiple experts versed in maintaining personal communications / records and none were able to offer advice on how employees should maintain critical documentation in this emerging era of more frequent, and more subjective allegations of violations of the code of employee conduct coupled to employees being separated from their documentation. This matter will be the core of a future show as Dr. Perrodin is seeking an expert who can offer insight into how to best protect yourself in the midst of an allegation. FOLLOW DR. PERRODIN: Twitter @SafetyPhD and subscribe to The Safety Doc YouTube channel & Apple Podcasts. SAFETY DOC WEBSITE & BLOG: www.safetyphd.com David will respond to comments & emails. The Safety Doc Podcast is hosted & produced by David Perrodin, PhD. ENDORSEMENTS. Opinions are those of the host & guests and do not reflect positions of The 405 Media or supporters of “The Safety Doc Podcast”. The show adheres to nondiscrimination principles while seeking to bring forward productive discourse & debate on topics relevant to personal or institutional safety. Email David: thesafetydoc@gmail.com LOOKING FOR DR. TIMOTHY LUDWIG, PHD? Dr. Perrodin’s “Safety Doc Podcast” negotiates school and community safety. To be informed about industrial safety, please contact Appalachian State University Professor Dr. Timothy Ludwig, PhD, at www.safety-doc.com.

00:0000:00

Read Full Post »

Trip Elix has worked as an investigator and associated with business leaders along with the computer underground. He has been a computer forensic technician; security consultant, administrator, programmer, and system analyst, who has used or owned almost every version of every operating system used since the 1980’s. He currently attends security conferences held by the computer underground including Defcon, Hope, and Bsides. Learn more about Trip at www.tripelix.com and download his free guide “Browse Without Being Tracked” – which is discussed during this episode of The Safety Doc Podcast. HACKERS ARE NOT THE BAD GUYS. Trip states, “People often forget that Facebook itself was written and maintained by hackers. For the most part they do the right thing.” He regularly attends conferences for hackers and shares that the emphasis of such events is to find vulnerabilities in software – including a “capture the flag” challenge. The goal, as some in the general public might assume, is not to trade industry secrets on how to harvest personal data or extort individuals or companies. This is a misperception. Many companies, including the popular computer security firm Malwarebytes, openly welcomes and encourages independent researchers to report vulnerabilities in products and often reward the researchers with hundreds or even thousands of dollars. Mr. Elix notes that there are “bad actors” in any profession, but for the most part, we should recognize that computer hackers are well-meaning individuals that alert companies to gaps in their electronic security protocols. I recall the 1983 fictional movie WarGames in which a high school student unwittingly hacks into a military supercomputer while searching for new video games. He ultimately contributes to closing a system loophole that could have brought upon the rogue launch of ballistic missiles.  With all of this being said, Trip certainly brings awareness to the intersection of large corporations and harvesting personal data. YOUR CHILD’S DATA IS FOR SALE AT A BARGAIN PRICE. Trip works extensively to protect the privacy of children and in 2017 released “Protecting Kids Online!: Keeping Them Safe from Perverts, Stalkers, Data Thieves and Scammers.” The book is available in multiple formats on Amazon or from his website. He states, “Being spooked by your own devices is not OK. The sanctuary of our homes is being invaded by companies that sell what we do and it not just what you do online. Children’s information is for sale. Anyone can the buy the name, address, and phone number of the children in your neighborhood. The same companies that bring us spam, harassing telephone calls and junk mail are now endangering our children. You don’t have to put up with any of it there are things you can do.” Mr. Elix exposes the abuses of those that are using big data to threaten our lives and are the direct causes of Identity theft for millions. He explains to Dr. Perrodin that for the price of a few postage stamps, a parent can become empowered by mailing the primary data brokers a letter directing them to not sell their child’s information. YOU STILL NEED A SOCIAL MEDIA PROFILE. Dr. Perrodin identified a trend in school safety to encourage youth to abandon, or greatly limit, use of social media. While such a measure might seem to have surface merit, Mr. Elix quickly counters that the absence of a social media profile could be detrimental to youth during the college admission or job application process. Instead, he lays out a plan to build a robust, social-media-competent profile for youth including a non-political blog – perhaps about a hobby, cooking or anything that won’t be subject to a skewed interpretation due to the shifting sands of time. He also offers a blueprint for developing a safer social media profile for children under the age of 14. This is absolutely vital knowledge decreasing the risk that a child might become the target of a groomer. A RIGHT TO PROPERTY. Trip begins the show with the story of how his entire neighborhood had been the target of an identity thief. This admission seems counter-intuitive given Mr. Elix’s deft knowledge of privacy protection, yet it reveals that countless companies collect our information and sell it to the highest bidder. And, that information is then packaged per specific subset characteristics and legally re-sold to data miners for as little as $15. He urges people to explore the website “Mailing List Finder” to discover that over 60,000 postal, email and telephone mailing lists from more than 1,400 vendors are for sale to anyone. Your personal data is on those lists! The site address is https://lists.nextmark.com/  Trip’s 2015 book, “A Right to Property – It is your information” has received glowing reviews. It is available in multiple formats on Amazon or his website. LEARN THE SECRETS THAT THE HACKERS USE TO LIVE UNDER THE RADAR.  Several of these questions and points are discussed during this punchy episode: (1) Who is tracking us and why, it is not only our own government; (2) Why privacy isn’t about hiding anything and how apathy can make you a victim; (3) What’s the first sign that your personal and private info is at risk; (4) What is a data pimp; (5) How is artificial intelligence going to affect us; (6) Are government agencies, our leaders, America’s infrastructure, the corporate world doing anything to protect us; (7) What’s the single most effective thing people can do to protect themselves; (8) What do you think of those loyalty cards given out by everyone from gas stations to casinos; (9) How can you stop companies from selling your info; (10) Why do you say that hackers are actually protecting us? FOLLOW DR. PERRODIN: Twitter @SafetyPhD and subscribe to The Safety Doc YouTube channel & Apple Podcasts RSS feed. SAFETY DOC WEBSITE & BLOG: www.safetyphd.com David will respond to comments & emails. The Safety Doc Podcast is hosted & produced by David Perrodin, PhD. ENDORSEMENTS. Opinions are those of the host & guests and do not reflect positions of The 405 Media or supporters of “The Safety Doc Podcast”. The show adheres to nondiscrimination principles while seeking to bring forward productive discourse & debate on topics relevant to personal or institutional safety. Email David: thesafetydoc@gmail.com LOOKING FOR DR. TIMOTHY LUDWIG, PHD? Dr. Perrodin’s “Safety Doc Podcast” negotiates school and community safety. To be informed about industrial safety, please contact Appalachian State University Professor Dr. Timothy Ludwig, PhD, at www.safety-doc.com. LEARN MORE ABOUT THIS EPISODE'S GUEST: www.tripelix.com  

00:0000:00

Read Full Post »

Paranormal Investigator Jim Malliard and host David Perrodin discuss the puzzling inconsistencies of the January 13, 2018 notification that Hawaii was minutes from a ballistic missile impact.  Although the alert was an error, the circumstances of the event are convoluted and information released since the flub only adds to the confusion.  Jim and David smoke out some of the possible truths of this rapidly hushed incident.  THE EVENT.  "An early-morning emergency alert mistakenly warning of an incoming ballistic missile attack was dispatched to cellphones across Hawaii on Saturday, setting off widespread panic in a state that was already on edge because of escalating tensions between the United States and North Korea. The alert, sent by the Hawaii Emergency Management Agency, was revoked 38 minutes after it was issued, prompting confusion over why it was released — and why it took so long to rescind. State officials and residents of a normally tranquil part of the Pacific, as well as tourists swept up in the panic, immediately expressed outrage." (NYT - January 13, 2018)  HOW ALERTS ARE SUPPOSED TO WORK.  To describe the steps in issuing an inbound missile to the United States, Dr. Perrodin extracted upon his personal research of the 9/11 attacks and the change that day in national DEFCON status from a 5 (lowest state of readiness) to 3 (Air Force ready to mobilize in 15 minutes). The DEFense readiness CONdition (DEFCON) is an alert state used by the United States Armed Forces and is controlled by the President and Secretary of Defense.  David argued that his interpretation has always been that the (1) North American Aerospace Defense Command (NORAD) would detect the threat through satellites, seismic or other sensors. (2) US Strategic Command (STRATCOMM) would then verify the threat through various tracking and confirmation measures, (3) STRATCOMM would inform the President and Secretary of Defense and a decision would be made regarding the US response, which might result in a change of the DEFCON status which then triggers a prescribed sequence of readiness and offensive tactics.  It is at this step that the Emergency Broadcast System (EBS) would be activated by the President and messages would be delivered via EBS as an expeditious method of communicating with the American public in the event of a war, threat of war, or grave national crisis.  Hence, the Hawaii alert warning should not have been possible as any such warning would have been per directive of the President.  THE STORY ISN’T MAKING SENSE.  Jim Malliard pointed out several discrepancies with the missile alert and subsequent actions, including:

  1. Why wasn’t it possible to immediately send a corrective message from the same system that sent the false alert?
  2. If this was a drill, why not just send out a message stating that this is a test of the emergency alert system – and only a test – there would be no need to state that it was a missile warning?
  3. The corrective measures now includes a second verify that the alert should be issued – this seems woefully inadequate relative to the degree of the threat.
  4. Why is the employee responsible for this not responding to questing and why was he re-assigned?  This suggests that the act might have been a prank that got out of hand, but wouldn’t that result in immediate termination? If this was a flaw in the system, then this mistake could have been made by any employee, so why re-assign this person?
  5. Could this have been a hack? If so, the lack of media coverage certainly supports a narrative of wanting to bury this incident.
  6. Why hasn’t NORAD or STRATCOMM chimed in on this – perhaps denoting the standard operating procedures, sans guarded information, of how the American public would be warned of an inbound missile?

FOLLOW DR. PERRODIN: Twitter @SafetyPhD and subscribe to The Safety Doc YouTube channel & Apple Podcasts RSS feed. SAFETY DOC WEBSITE & BLOG: www.safetyphd.com David will respond to comments & emails. The Safety Doc Podcast is hosted & produced by David Perrodin, PhD. ENDORSEMENTS. Opinions are those of the host & guests and do not reflect positions of The 405 Media or supporters of “The Safety Doc Podcast”. The show adheres to nondiscrimination principles while seeking to bring forward productive discourse & debate on topics relevant to personal or institutional safety. Email David: thesafetydoc@gmail.com LOOKING FOR DR. TIMOTHY LUDWIG, PHD? Dr. Perrodin’s “Safety Doc Podcast” negotiates school and community safety. To be informed about industrial safety, please contact Appalachian State University Professor Dr. Timothy Ludwig, PhD, at www.safety-doc.com.  Learn more about episode guest Jim Malliard and subscribe to his newsletter at www.malliard.com

00:0000:00

Read Full Post »

- Older Posts »