SlideShare une entreprise Scribd logo
1  sur  29
Preventing Undercover
Employment Operations
Competition
A new crime trend: stealing bull
semen Gazette Extra By TED SULLIVAN Tuesday, April 20, 2010
“In a string of recent burglaries, thieves have targeted dairy
farmers to steal a valuable commodity: bull semen. Valued at
$22,000”
“Farmers believe thieves might be selling the semen on the black
market.”
“A bull semen theft also was reported in Brodhead in July 2008.
About 100 embryos or semen samples valued at $35,000 were
stolen.
Terrorist
Their ideology or religion is more
important than anything else to
include their own lives.
Their motivation is to eliminate those
who are non-believers or those who
jeopardize the fundamentals of their
religious beliefs.
Protectionist
These groups want to protect things
they think can’t protect themselves.
Other motivations dehumanizes their
targets while protectionist groups
humanize what they are protecting.
Goals
Keep You Problem Solving
Financial Impact
Change Your Practices / End or Impact Business
Shake Consumer Confidence
Gain Media Attention
Claim Responsibility
Reduce Public Support of Industry
Increases Membership
Public Belief & Awareness of Cause
Fundraising
Empowers their efforts
Group Profiling Considerations




Location and Motivation helps
determine potential targets
Financial Backing and Education
helps determine potential capability
and range of operations
How They Get It?
Getting hired in your organization
 Social Engineering Your Group
 Undercover Tactics – Video & Pictures
 Legal Methods – OSI, Public Info,
Courts
 Sharing Their Success With Others

Knowledge Is Power
Art of War
“The Original Spy Manual”

“Probe the enemy to unmask his
strengths, weaknesses, patterns of
movement and intentions. Shape
the enemy’s perception of the world
to manipulate/ undermine his plans
and actions.”
Social Engineering


What can I figure out about you?
• Internet – Google
• Social Pages (Facebook)
Maiden Name, DOB
 Address, travel plans
 High School & College
 Hobbies & Friends


• Trash
• Phishing – 21% Increase (18,820 Attacks)
Social Engineering
Log Ins & Passwords
 Security Questions
 Cell & Computer Security

Hacking human gullibility with social
penetration:

We don't need no stinking exploits By Dan Goodin in
San Francisco

“Vulnerability stems from humans' inherent tendency to trust
one another. Survival over the millennia largely depended
on their ability to work in groups. When one person saw
that a group of his peers ate a particular berry and didn't
die, he ate the same fruit - and survived as a result.
Hackers who understand this trait can exploit it to access
companies' most precious assets.”
“David Bailey said he regularly sends client employees emails
informing them the strength of their login passwords is
being tested through a new website. They are then
instructed to follow a link and enter their credentials. The
success rate: as high as 50 per cent”
How They Use It?


Distort Public Perceptions
• Hallmark-Westland Video







Activism & Fraud
Network Access
Criminal Acts – Arson, Stalking, Criminal Mischief
Educate other Groups
Propaganda
• Funding – USDA Domestic Horse Slaughter Insp.
• Public Relations – Yellow Tail Winery - $100K
• Political – Sub-therapeutic Antibiotics Legislation
What might they do with this info?
What’s Next
Animal activists' unsettling bid for freedom Sharp Science

Short

15 March 2010
Science In Society -Andy Coghlan, reporter
-Andy

Firebombing, arson, hitting people with baseball clubs,
disinterring people's dead relatives and screaming abuse
through loudhailers all day and night
Researchers quoted in The Guardian say they're intimidated
by the tactic, fearing that exposure of their experiments,
however legal and ethically justified, would make them
targets for extremists.
Constrained in the UK, activists moved instead to the US
and the European mainland, where they have been
engaging in violent campaigns similar to those previously
confined to the UK
What Can You Do?









To understand how not to hire a plant you
must first understand them.
Understand how your business may be
vulnerable
Understand what is out there about you
Investigate complaints thoroughly and
completely (internal & external)
Suspicious Activity Reporting Process
(anonymous, easy, and free) has to be
followed up on quickly.
Facility Security Recommendations


Office & Plant Security

• The Environment Dictates the Tactic



Employee Screening

• Profile Behaviors Not People



Employee Training & Accountability

• SCAN, Reporting Process (suspicion & abuse)



Responding to Activists’ Letters
• Let the Pro’s Help You



Talking With Law Enforcement

• Explosives,Arson (ATF) $10K, Terrorism (FBI), pay (IRS)



Talking With Media

• Have a PIO – You never know when or where it will
happen
Behaviors






Temporary Positions – willing to take jobs that
only last short periods of time.
18 to 30’s
Generally Caucasians
College or University ID’s not Government ID
• University or major city within hour of you?









Over or Inappropriately (degree not related)
educated
Out of State ID or Vehicles
Willingness to come early & stay late
Attempting or accessing restricted areas not job
related. “I’ve always wanted to see that”
May indicate previous related job experience
Educate Yourself & Your Company









Need Buy-In from Top Down
Develop an understanding of the opposition
What is your companies vulnerability?
Understand how they would focus on your
vulnerabilities.
Educate your staff – SCAN, Water Cooler
Suspicions (“He doesn’t fit in”, “He’s over
educated for that job, that’s why he wants to
move up”. If company goes out of business
everyone is out of a job.
Secure your assets (facilities & Information) –
They only have to be right once, you have to be
right every day.
Develop legal hiring techniques that
identify suspected plants













Add perjury clause and have statements and
applications signed (compare signatures)
Verify past employment-ask questions and
communicate with others in industry.
Do background checks – use computer tools to
investigate (Google, E-Verify, Social Networking,
Facial Recognition Software) – Call references &
contacts
Take photos & fingerprints of them
Verify (false ID tools) & Xerox identification
(investigative asset) – keep secure so cant be
recovered by plant.
Register vehicles with access to plants
(photograph them with their vehicle)
Do a surprise home visit.
Develop policies that mandate animal care
and handling procedures
Hold employees accountable to those
policies and reporting abuses.
(Section C of AAA Facility Security
Recommendations)
 If you don’t police yourself someone
else will.
 Off Premise Monitoring
 Follow-up on complaints & back brief

Push Back
Prosecute Violations
 Make them work for it
 Be proactive
 Discipline Internal Violations

Develop Information & Intelligence Sharing
Relationships

Law Enforcement
 Other Processors & Facilities in your
area
 Organizations that track activists,
activities & proactive legislation
 Joint Training
 Share suspicious activity (Dallas)

Questions?
You have to be more passionate about
keeping this from happening than
they are about stopping it.
You have to be right every day, they
only have to get it right once.
Houston Johnson 254.534.1646
houston@genesis0103.com

Contenu connexe

Tendances

7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk   7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
Case IQ
 
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Case IQ
 
PSI Staff Report Final 5.18.2016 Update (1)
PSI Staff Report Final 5.18.2016 Update (1)PSI Staff Report Final 5.18.2016 Update (1)
PSI Staff Report Final 5.18.2016 Update (1)
Andy Polesovsky
 

Tendances (10)

7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk   7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
7 Ways to Increase Ethical Accountability and Decrease Fraud Risk
 
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionInsider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
Insider Threat: Cases and Controls to Prevent Internal Fraud and Prevention
 
Ethics of Whistleblowing
Ethics of WhistleblowingEthics of Whistleblowing
Ethics of Whistleblowing
 
Promise And Perils Of Internet Searching Job Candidates
Promise And Perils Of Internet Searching Job CandidatesPromise And Perils Of Internet Searching Job Candidates
Promise And Perils Of Internet Searching Job Candidates
 
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
 
10 Critical Mistakes in Workplace Investigation Programs and How to Avoid Them
10 Critical Mistakes in Workplace Investigation Programs and How to Avoid Them10 Critical Mistakes in Workplace Investigation Programs and How to Avoid Them
10 Critical Mistakes in Workplace Investigation Programs and How to Avoid Them
 
Under the Table: Combatting Bribery and Corruption Through Analysis and Preve...
Under the Table: Combatting Bribery and Corruption Through Analysis and Preve...Under the Table: Combatting Bribery and Corruption Through Analysis and Preve...
Under the Table: Combatting Bribery and Corruption Through Analysis and Preve...
 
Whistle blowing
Whistle blowing  Whistle blowing
Whistle blowing
 
PSI Staff Report Final 5.18.2016 Update (1)
PSI Staff Report Final 5.18.2016 Update (1)PSI Staff Report Final 5.18.2016 Update (1)
PSI Staff Report Final 5.18.2016 Update (1)
 
Identity theft protection company keepmy id.org
Identity theft protection company   keepmy id.orgIdentity theft protection company   keepmy id.org
Identity theft protection company keepmy id.org
 

En vedette

En vedette (20)

Bryn Jensson - Leading by example - showing we care at the barn level
Bryn Jensson - Leading by example - showing we care at the barn levelBryn Jensson - Leading by example - showing we care at the barn level
Bryn Jensson - Leading by example - showing we care at the barn level
 
Mike Zumwinkle - What’s Happening on the Legislative Front - State
Mike Zumwinkle - What’s Happening on the Legislative Front - StateMike Zumwinkle - What’s Happening on the Legislative Front - State
Mike Zumwinkle - What’s Happening on the Legislative Front - State
 
Ms. Susan Vaughn Grooters - Consumer Perceptions-Superbugs In Our Food Supply
Ms. Susan Vaughn Grooters - Consumer Perceptions-Superbugs In Our Food SupplyMs. Susan Vaughn Grooters - Consumer Perceptions-Superbugs In Our Food Supply
Ms. Susan Vaughn Grooters - Consumer Perceptions-Superbugs In Our Food Supply
 
Dr. Robert Tauxe - Public Health Concerns About Resistant Foodborne Infections
Dr. Robert Tauxe - Public Health Concerns About Resistant Foodborne InfectionsDr. Robert Tauxe - Public Health Concerns About Resistant Foodborne Infections
Dr. Robert Tauxe - Public Health Concerns About Resistant Foodborne Infections
 
Chris Herr - Bridging the Divide, Finding Common Ground
Chris Herr - Bridging the Divide, Finding Common GroundChris Herr - Bridging the Divide, Finding Common Ground
Chris Herr - Bridging the Divide, Finding Common Ground
 
Dr. Dane Goede - Update on Porcine Epidemic Diarrhea Virus Studies
Dr. Dane Goede - Update on Porcine Epidemic Diarrhea Virus StudiesDr. Dane Goede - Update on Porcine Epidemic Diarrhea Virus Studies
Dr. Dane Goede - Update on Porcine Epidemic Diarrhea Virus Studies
 
Dr. Joni Scheftel - The human animal interface at Minnesota fairs and live an...
Dr. Joni Scheftel - The human animal interface at Minnesota fairs and live an...Dr. Joni Scheftel - The human animal interface at Minnesota fairs and live an...
Dr. Joni Scheftel - The human animal interface at Minnesota fairs and live an...
 
Crystal Mackay - Cleaning Up the Bad Actors
Crystal Mackay - Cleaning Up the Bad ActorsCrystal Mackay - Cleaning Up the Bad Actors
Crystal Mackay - Cleaning Up the Bad Actors
 
Agriculture is Using Social Media, How and Why
Agriculture is Using Social Media, How and Why Agriculture is Using Social Media, How and Why
Agriculture is Using Social Media, How and Why
 
Guia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOCGuia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOC
 
Oral Fluid Testing: Field Applications and Work In Progress
Oral Fluid Testing: Field Applications and Work In ProgressOral Fluid Testing: Field Applications and Work In Progress
Oral Fluid Testing: Field Applications and Work In Progress
 
Dr. Leah Dorman - 2013 Antibiotic Symposia Welcome/Recap of Chicago, IL 2011 ...
Dr. Leah Dorman - 2013 Antibiotic Symposia Welcome/Recap of Chicago, IL 2011 ...Dr. Leah Dorman - 2013 Antibiotic Symposia Welcome/Recap of Chicago, IL 2011 ...
Dr. Leah Dorman - 2013 Antibiotic Symposia Welcome/Recap of Chicago, IL 2011 ...
 
Dr. Mark Engle - What Else Is On Our Radar Screen?
Dr. Mark Engle - What Else Is On Our Radar Screen?Dr. Mark Engle - What Else Is On Our Radar Screen?
Dr. Mark Engle - What Else Is On Our Radar Screen?
 
Dr. Nate Hagens - Feeding the World in the 21st Century- A Wide Boundary Pers...
Dr. Nate Hagens - Feeding the World in the 21st Century- A Wide Boundary Pers...Dr. Nate Hagens - Feeding the World in the 21st Century- A Wide Boundary Pers...
Dr. Nate Hagens - Feeding the World in the 21st Century- A Wide Boundary Pers...
 
Lela Perez and John Blue - Social Media Engagement Dos and Don’ts
Lela Perez and John Blue - Social Media Engagement Dos and Don’tsLela Perez and John Blue - Social Media Engagement Dos and Don’ts
Lela Perez and John Blue - Social Media Engagement Dos and Don’ts
 
Dr. Andres Perez - Spatial Epidemiology of PED Virus
Dr. Andres Perez - Spatial Epidemiology of PED VirusDr. Andres Perez - Spatial Epidemiology of PED Virus
Dr. Andres Perez - Spatial Epidemiology of PED Virus
 
Ttest
TtestTtest
Ttest
 
Msute Andry Bonilla
Msute Andry BonillaMsute Andry Bonilla
Msute Andry Bonilla
 
Audible visible notification
Audible visible notificationAudible visible notification
Audible visible notification
 
Cadvr 04 08-16_d
Cadvr 04 08-16_dCadvr 04 08-16_d
Cadvr 04 08-16_d
 

Similaire à Houston Johnson - Preventing Undercover Employment Operations

Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
Russell Publishing
 
Session 1 - Vero (Catch Me if You Can) event presentation with video
Session 1 - Vero (Catch Me if You Can) event presentation with videoSession 1 - Vero (Catch Me if You Can) event presentation with video
Session 1 - Vero (Catch Me if You Can) event presentation with video
Hr NETWORK Magazine
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
jsnyder40
 
Case study on whistleblowing
Case study on whistleblowingCase study on whistleblowing
Case study on whistleblowing
Parveen Bano
 
Confessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data BrokerConfessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data Broker
metanautix
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
ZakiAhmed70
 

Similaire à Houston Johnson - Preventing Undercover Employment Operations (20)

Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
whistle blowing.
whistle blowing.whistle blowing.
whistle blowing.
 
Nonprofits & Fraud: Protecting the People You Serve
Nonprofits & Fraud: Protecting the People You ServeNonprofits & Fraud: Protecting the People You Serve
Nonprofits & Fraud: Protecting the People You Serve
 
Session 1 - Vero (Catch Me if You Can) event presentation with video
Session 1 - Vero (Catch Me if You Can) event presentation with videoSession 1 - Vero (Catch Me if You Can) event presentation with video
Session 1 - Vero (Catch Me if You Can) event presentation with video
 
Straight Talk for Lawyers About Social Media
Straight Talk for Lawyers About Social MediaStraight Talk for Lawyers About Social Media
Straight Talk for Lawyers About Social Media
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
Case study on whistleblowing
Case study on whistleblowingCase study on whistleblowing
Case study on whistleblowing
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
 
Confessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data BrokerConfessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data Broker
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
The Ethics Of The Whistle Blower Essay
The Ethics Of The Whistle Blower EssayThe Ethics Of The Whistle Blower Essay
The Ethics Of The Whistle Blower Essay
 
ACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity Webcast
 
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
 
Kid Safe Democracy Work
Kid Safe Democracy WorkKid Safe Democracy Work
Kid Safe Democracy Work
 
Whistle blowing Policy-1.pptx
Whistle blowing Policy-1.pptxWhistle blowing Policy-1.pptx
Whistle blowing Policy-1.pptx
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 

Plus de John Blue

Plus de John Blue (20)

Jordan Hoewischer - OACI Farmer Certification Program
Jordan Hoewischer - OACI Farmer Certification ProgramJordan Hoewischer - OACI Farmer Certification Program
Jordan Hoewischer - OACI Farmer Certification Program
 
Fred Yoder - No-till and Climate Change: Fact, Fiction, and Ignorance
Fred Yoder - No-till and Climate Change: Fact, Fiction, and IgnoranceFred Yoder - No-till and Climate Change: Fact, Fiction, and Ignorance
Fred Yoder - No-till and Climate Change: Fact, Fiction, and Ignorance
 
Dr. John Grove - Fifty Years Of No-till Research In Kentucky
Dr. John Grove - Fifty Years Of No-till Research In KentuckyDr. John Grove - Fifty Years Of No-till Research In Kentucky
Dr. John Grove - Fifty Years Of No-till Research In Kentucky
 
Dr. Warren Dick - Pioneering No-till Research Since 1962
Dr. Warren Dick - Pioneering No-till Research Since 1962Dr. Warren Dick - Pioneering No-till Research Since 1962
Dr. Warren Dick - Pioneering No-till Research Since 1962
 
Dr. Christine Sprunger - The role that roots play in building soil organic ma...
Dr. Christine Sprunger - The role that roots play in building soil organic ma...Dr. Christine Sprunger - The role that roots play in building soil organic ma...
Dr. Christine Sprunger - The role that roots play in building soil organic ma...
 
Dr. Leonardo Deiss - Stratification, the Role of Roots, and Yield Trends afte...
Dr. Leonardo Deiss - Stratification, the Role of Roots, and Yield Trends afte...Dr. Leonardo Deiss - Stratification, the Role of Roots, and Yield Trends afte...
Dr. Leonardo Deiss - Stratification, the Role of Roots, and Yield Trends afte...
 
Dr. Steve Culman - No-Till Yield Data Analysis
Dr. Steve Culman - No-Till Yield Data AnalysisDr. Steve Culman - No-Till Yield Data Analysis
Dr. Steve Culman - No-Till Yield Data Analysis
 
Alan Sundermeier and Dr. Vinayak Shedekar - Soil biological Response to BMPs
Alan Sundermeier and Dr. Vinayak Shedekar - Soil biological Response to BMPs Alan Sundermeier and Dr. Vinayak Shedekar - Soil biological Response to BMPs
Alan Sundermeier and Dr. Vinayak Shedekar - Soil biological Response to BMPs
 
Dr. Curtis Young - Attracting And Protecting Pollinators
 Dr. Curtis Young - Attracting And Protecting Pollinators Dr. Curtis Young - Attracting And Protecting Pollinators
Dr. Curtis Young - Attracting And Protecting Pollinators
 
Garth Ruff - Alternative Forages
Garth Ruff - Alternative Forages Garth Ruff - Alternative Forages
Garth Ruff - Alternative Forages
 
Sarah Noggle - Cover Crop Decision Tool Selector
 Sarah Noggle - Cover Crop Decision Tool Selector Sarah Noggle - Cover Crop Decision Tool Selector
Sarah Noggle - Cover Crop Decision Tool Selector
 
Jim Belt - Hemp Regulations
Jim Belt - Hemp RegulationsJim Belt - Hemp Regulations
Jim Belt - Hemp Regulations
 
John Barker - UAVs: Where Are We And What's Next
John Barker - UAVs: Where Are We And What's NextJohn Barker - UAVs: Where Are We And What's Next
John Barker - UAVs: Where Are We And What's Next
 
Dr. Rajbir Bajwa - Medical uses of Marijuana
 Dr. Rajbir Bajwa - Medical uses of Marijuana Dr. Rajbir Bajwa - Medical uses of Marijuana
Dr. Rajbir Bajwa - Medical uses of Marijuana
 
Dr. Jeff Stachler - Setting up a Corn and Soybean Herbicide Program with Cove...
Dr. Jeff Stachler - Setting up a Corn and Soybean Herbicide Program with Cove...Dr. Jeff Stachler - Setting up a Corn and Soybean Herbicide Program with Cove...
Dr. Jeff Stachler - Setting up a Corn and Soybean Herbicide Program with Cove...
 
Dr. Chad Penn - Developing A New Approach To Soil Phosphorus Testing And Reco...
Dr. Chad Penn - Developing A New Approach To Soil Phosphorus Testing And Reco...Dr. Chad Penn - Developing A New Approach To Soil Phosphorus Testing And Reco...
Dr. Chad Penn - Developing A New Approach To Soil Phosphorus Testing And Reco...
 
Jim Hoorman - Dealing with Cover Crops after Preventative Planting
Jim Hoorman - Dealing with Cover Crops after Preventative PlantingJim Hoorman - Dealing with Cover Crops after Preventative Planting
Jim Hoorman - Dealing with Cover Crops after Preventative Planting
 
Dr. Sjoerd Duiker - Dealing with Poor Soil Structure and Soil Compaction
Dr. Sjoerd Duiker - Dealing with Poor Soil Structure and Soil Compaction Dr. Sjoerd Duiker - Dealing with Poor Soil Structure and Soil Compaction
Dr. Sjoerd Duiker - Dealing with Poor Soil Structure and Soil Compaction
 
Christine Brown - Canadian Livestock Producers Efforts to Improve Water Quality
Christine Brown - Canadian Livestock Producers Efforts to Improve Water QualityChristine Brown - Canadian Livestock Producers Efforts to Improve Water Quality
Christine Brown - Canadian Livestock Producers Efforts to Improve Water Quality
 
Dr. Lee Briese - Details Matter (includes details about soil, equipment, cove...
Dr. Lee Briese - Details Matter (includes details about soil, equipment, cove...Dr. Lee Briese - Details Matter (includes details about soil, equipment, cove...
Dr. Lee Briese - Details Matter (includes details about soil, equipment, cove...
 

Dernier

Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
instagramfab782445
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
laloo_007
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Abortion pills in Kuwait Cytotec pills in Kuwait
 

Dernier (20)

Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 

Houston Johnson - Preventing Undercover Employment Operations

  • 2. Competition A new crime trend: stealing bull semen Gazette Extra By TED SULLIVAN Tuesday, April 20, 2010 “In a string of recent burglaries, thieves have targeted dairy farmers to steal a valuable commodity: bull semen. Valued at $22,000” “Farmers believe thieves might be selling the semen on the black market.” “A bull semen theft also was reported in Brodhead in July 2008. About 100 embryos or semen samples valued at $35,000 were stolen.
  • 3. Terrorist Their ideology or religion is more important than anything else to include their own lives. Their motivation is to eliminate those who are non-believers or those who jeopardize the fundamentals of their religious beliefs.
  • 4. Protectionist These groups want to protect things they think can’t protect themselves. Other motivations dehumanizes their targets while protectionist groups humanize what they are protecting.
  • 5. Goals Keep You Problem Solving Financial Impact Change Your Practices / End or Impact Business Shake Consumer Confidence Gain Media Attention Claim Responsibility Reduce Public Support of Industry Increases Membership Public Belief & Awareness of Cause Fundraising Empowers their efforts
  • 6. Group Profiling Considerations   Location and Motivation helps determine potential targets Financial Backing and Education helps determine potential capability and range of operations
  • 7. How They Get It? Getting hired in your organization  Social Engineering Your Group  Undercover Tactics – Video & Pictures  Legal Methods – OSI, Public Info, Courts  Sharing Their Success With Others 
  • 8. Knowledge Is Power Art of War “The Original Spy Manual” “Probe the enemy to unmask his strengths, weaknesses, patterns of movement and intentions. Shape the enemy’s perception of the world to manipulate/ undermine his plans and actions.”
  • 9. Social Engineering  What can I figure out about you? • Internet – Google • Social Pages (Facebook) Maiden Name, DOB  Address, travel plans  High School & College  Hobbies & Friends  • Trash • Phishing – 21% Increase (18,820 Attacks)
  • 10.
  • 11. Social Engineering Log Ins & Passwords  Security Questions  Cell & Computer Security 
  • 12.
  • 13.
  • 14. Hacking human gullibility with social penetration: We don't need no stinking exploits By Dan Goodin in San Francisco “Vulnerability stems from humans' inherent tendency to trust one another. Survival over the millennia largely depended on their ability to work in groups. When one person saw that a group of his peers ate a particular berry and didn't die, he ate the same fruit - and survived as a result. Hackers who understand this trait can exploit it to access companies' most precious assets.” “David Bailey said he regularly sends client employees emails informing them the strength of their login passwords is being tested through a new website. They are then instructed to follow a link and enter their credentials. The success rate: as high as 50 per cent”
  • 15.
  • 16. How They Use It?  Distort Public Perceptions • Hallmark-Westland Video      Activism & Fraud Network Access Criminal Acts – Arson, Stalking, Criminal Mischief Educate other Groups Propaganda • Funding – USDA Domestic Horse Slaughter Insp. • Public Relations – Yellow Tail Winery - $100K • Political – Sub-therapeutic Antibiotics Legislation
  • 17.
  • 18. What might they do with this info?
  • 19.
  • 20. What’s Next Animal activists' unsettling bid for freedom Sharp Science Short 15 March 2010 Science In Society -Andy Coghlan, reporter -Andy Firebombing, arson, hitting people with baseball clubs, disinterring people's dead relatives and screaming abuse through loudhailers all day and night Researchers quoted in The Guardian say they're intimidated by the tactic, fearing that exposure of their experiments, however legal and ethically justified, would make them targets for extremists. Constrained in the UK, activists moved instead to the US and the European mainland, where they have been engaging in violent campaigns similar to those previously confined to the UK
  • 21. What Can You Do?      To understand how not to hire a plant you must first understand them. Understand how your business may be vulnerable Understand what is out there about you Investigate complaints thoroughly and completely (internal & external) Suspicious Activity Reporting Process (anonymous, easy, and free) has to be followed up on quickly.
  • 22. Facility Security Recommendations  Office & Plant Security • The Environment Dictates the Tactic  Employee Screening • Profile Behaviors Not People  Employee Training & Accountability • SCAN, Reporting Process (suspicion & abuse)  Responding to Activists’ Letters • Let the Pro’s Help You  Talking With Law Enforcement • Explosives,Arson (ATF) $10K, Terrorism (FBI), pay (IRS)  Talking With Media • Have a PIO – You never know when or where it will happen
  • 23. Behaviors     Temporary Positions – willing to take jobs that only last short periods of time. 18 to 30’s Generally Caucasians College or University ID’s not Government ID • University or major city within hour of you?      Over or Inappropriately (degree not related) educated Out of State ID or Vehicles Willingness to come early & stay late Attempting or accessing restricted areas not job related. “I’ve always wanted to see that” May indicate previous related job experience
  • 24. Educate Yourself & Your Company       Need Buy-In from Top Down Develop an understanding of the opposition What is your companies vulnerability? Understand how they would focus on your vulnerabilities. Educate your staff – SCAN, Water Cooler Suspicions (“He doesn’t fit in”, “He’s over educated for that job, that’s why he wants to move up”. If company goes out of business everyone is out of a job. Secure your assets (facilities & Information) – They only have to be right once, you have to be right every day.
  • 25. Develop legal hiring techniques that identify suspected plants        Add perjury clause and have statements and applications signed (compare signatures) Verify past employment-ask questions and communicate with others in industry. Do background checks – use computer tools to investigate (Google, E-Verify, Social Networking, Facial Recognition Software) – Call references & contacts Take photos & fingerprints of them Verify (false ID tools) & Xerox identification (investigative asset) – keep secure so cant be recovered by plant. Register vehicles with access to plants (photograph them with their vehicle) Do a surprise home visit.
  • 26. Develop policies that mandate animal care and handling procedures Hold employees accountable to those policies and reporting abuses. (Section C of AAA Facility Security Recommendations)  If you don’t police yourself someone else will.  Off Premise Monitoring  Follow-up on complaints & back brief 
  • 27. Push Back Prosecute Violations  Make them work for it  Be proactive  Discipline Internal Violations 
  • 28. Develop Information & Intelligence Sharing Relationships Law Enforcement  Other Processors & Facilities in your area  Organizations that track activists, activities & proactive legislation  Joint Training  Share suspicious activity (Dallas) 
  • 29. Questions? You have to be more passionate about keeping this from happening than they are about stopping it. You have to be right every day, they only have to get it right once. Houston Johnson 254.534.1646 houston@genesis0103.com

Notes de l'éditeur

  1. Ohio – Livestock Care Standards – HSUS filed bill supporting stricter standards on Confined Livestock Production. Dave White (Ohio Livestock Coalition)
  2. Ohio – Livestock Care Standards – HSUS filed bill supporting stricter standards on Confined Livestock Production. Dave White (Ohio Livestock Coalition)