Houston Johnson - Preventing Undercover Employment Operations
Upcoming SlideShare
Loading in...5
×
 

Houston Johnson - Preventing Undercover Employment Operations

on

  • 348 views

Preventing Undercover Employment Operations - Houston Johnson, Uniform Patrol and Tactical Team Commander, Harker Heights (TX) Police Department, from the 2010 Animal Ag Alliance Stakeholder's ...

Preventing Undercover Employment Operations - Houston Johnson, Uniform Patrol and Tactical Team Commander, Harker Heights (TX) Police Department, from the 2010 Animal Ag Alliance Stakeholder's Summit: Truth, Lies and Videotape: Is Activism Jeopardizing Our Food Security?, April 28 - 29, 2010, Washington, DC, USA.

More presentations at http://www.trufflemedia.com/home/conference/2010-animal-ag-alliance-stakeholders-summit

Statistics

Views

Total Views
348
Views on SlideShare
348
Embed Views
0

Actions

Likes
0
Downloads
2
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Ohio – Livestock Care Standards – HSUS filed bill supporting stricter standards on Confined Livestock Production. <br /> Dave White (Ohio Livestock Coalition) <br />
  • Ohio – Livestock Care Standards – HSUS filed bill supporting stricter standards on Confined Livestock Production. <br /> Dave White (Ohio Livestock Coalition) <br />

Houston Johnson - Preventing Undercover Employment Operations Houston Johnson - Preventing Undercover Employment Operations Presentation Transcript

  • Preventing Undercover Employment Operations
  • Competition A new crime trend: stealing bull semen Gazette Extra By TED SULLIVAN Tuesday, April 20, 2010 “In a string of recent burglaries, thieves have targeted dairy farmers to steal a valuable commodity: bull semen. Valued at $22,000” “Farmers believe thieves might be selling the semen on the black market.” “A bull semen theft also was reported in Brodhead in July 2008. About 100 embryos or semen samples valued at $35,000 were stolen.
  • Terrorist Their ideology or religion is more important than anything else to include their own lives. Their motivation is to eliminate those who are non-believers or those who jeopardize the fundamentals of their religious beliefs.
  • Protectionist These groups want to protect things they think can’t protect themselves. Other motivations dehumanizes their targets while protectionist groups humanize what they are protecting.
  • Goals Keep You Problem Solving Financial Impact Change Your Practices / End or Impact Business Shake Consumer Confidence Gain Media Attention Claim Responsibility Reduce Public Support of Industry Increases Membership Public Belief & Awareness of Cause Fundraising Empowers their efforts
  • Group Profiling Considerations   Location and Motivation helps determine potential targets Financial Backing and Education helps determine potential capability and range of operations
  • How They Get It? Getting hired in your organization  Social Engineering Your Group  Undercover Tactics – Video & Pictures  Legal Methods – OSI, Public Info, Courts  Sharing Their Success With Others 
  • Knowledge Is Power Art of War “The Original Spy Manual” “Probe the enemy to unmask his strengths, weaknesses, patterns of movement and intentions. Shape the enemy’s perception of the world to manipulate/ undermine his plans and actions.”
  • Social Engineering  What can I figure out about you? • Internet – Google • Social Pages (Facebook) Maiden Name, DOB  Address, travel plans  High School & College  Hobbies & Friends  • Trash • Phishing – 21% Increase (18,820 Attacks)
  • Social Engineering Log Ins & Passwords  Security Questions  Cell & Computer Security 
  • Hacking human gullibility with social penetration: We don't need no stinking exploits By Dan Goodin in San Francisco “Vulnerability stems from humans' inherent tendency to trust one another. Survival over the millennia largely depended on their ability to work in groups. When one person saw that a group of his peers ate a particular berry and didn't die, he ate the same fruit - and survived as a result. Hackers who understand this trait can exploit it to access companies' most precious assets.” “David Bailey said he regularly sends client employees emails informing them the strength of their login passwords is being tested through a new website. They are then instructed to follow a link and enter their credentials. The success rate: as high as 50 per cent”
  • How They Use It?  Distort Public Perceptions • Hallmark-Westland Video      Activism & Fraud Network Access Criminal Acts – Arson, Stalking, Criminal Mischief Educate other Groups Propaganda • Funding – USDA Domestic Horse Slaughter Insp. • Public Relations – Yellow Tail Winery - $100K • Political – Sub-therapeutic Antibiotics Legislation
  • What might they do with this info?
  • What’s Next Animal activists' unsettling bid for freedom Sharp Science Short 15 March 2010 Science In Society -Andy Coghlan, reporter -Andy Firebombing, arson, hitting people with baseball clubs, disinterring people's dead relatives and screaming abuse through loudhailers all day and night Researchers quoted in The Guardian say they're intimidated by the tactic, fearing that exposure of their experiments, however legal and ethically justified, would make them targets for extremists. Constrained in the UK, activists moved instead to the US and the European mainland, where they have been engaging in violent campaigns similar to those previously confined to the UK
  • What Can You Do?      To understand how not to hire a plant you must first understand them. Understand how your business may be vulnerable Understand what is out there about you Investigate complaints thoroughly and completely (internal & external) Suspicious Activity Reporting Process (anonymous, easy, and free) has to be followed up on quickly.
  • Facility Security Recommendations  Office & Plant Security • The Environment Dictates the Tactic  Employee Screening • Profile Behaviors Not People  Employee Training & Accountability • SCAN, Reporting Process (suspicion & abuse)  Responding to Activists’ Letters • Let the Pro’s Help You  Talking With Law Enforcement • Explosives,Arson (ATF) $10K, Terrorism (FBI), pay (IRS)  Talking With Media • Have a PIO – You never know when or where it will happen
  • Behaviors     Temporary Positions – willing to take jobs that only last short periods of time. 18 to 30’s Generally Caucasians College or University ID’s not Government ID • University or major city within hour of you?      Over or Inappropriately (degree not related) educated Out of State ID or Vehicles Willingness to come early & stay late Attempting or accessing restricted areas not job related. “I’ve always wanted to see that” May indicate previous related job experience
  • Educate Yourself & Your Company       Need Buy-In from Top Down Develop an understanding of the opposition What is your companies vulnerability? Understand how they would focus on your vulnerabilities. Educate your staff – SCAN, Water Cooler Suspicions (“He doesn’t fit in”, “He’s over educated for that job, that’s why he wants to move up”. If company goes out of business everyone is out of a job. Secure your assets (facilities & Information) – They only have to be right once, you have to be right every day.
  • Develop legal hiring techniques that identify suspected plants        Add perjury clause and have statements and applications signed (compare signatures) Verify past employment-ask questions and communicate with others in industry. Do background checks – use computer tools to investigate (Google, E-Verify, Social Networking, Facial Recognition Software) – Call references & contacts Take photos & fingerprints of them Verify (false ID tools) & Xerox identification (investigative asset) – keep secure so cant be recovered by plant. Register vehicles with access to plants (photograph them with their vehicle) Do a surprise home visit.
  • Develop policies that mandate animal care and handling procedures Hold employees accountable to those policies and reporting abuses. (Section C of AAA Facility Security Recommendations)  If you don’t police yourself someone else will.  Off Premise Monitoring  Follow-up on complaints & back brief 
  • Push Back Prosecute Violations  Make them work for it  Be proactive  Discipline Internal Violations 
  • Develop Information & Intelligence Sharing Relationships Law Enforcement  Other Processors & Facilities in your area  Organizations that track activists, activities & proactive legislation  Joint Training  Share suspicious activity (Dallas) 
  • Questions? You have to be more passionate about keeping this from happening than they are about stopping it. You have to be right every day, they only have to get it right once. Houston Johnson 254.534.1646 houston@genesis0103.com