10 most Dangerous cities in America

Click below for the full article on their website: http://www.mylife.com/blog/the-10-most-dangerous-cities-in-america/


Episode #37 – CopTalk Podcast

    • In the News
    • Cameras and the Police – More coming in the next show….
    • NY Protests

    In The News:

    Phoenix Az brothel poses as church

    Courts–Man sues white castle over booth size

    burglar tries to claim reward money





    Gumby Robbery

    NJ police chief: Double-parking wife not above law
    The Associated Press
    Posted: 09/29/2011 10:14:13 AM PDT

    LODI, N.J.—A New Jersey police chief says no one is above the law—not even his wife.
    Lodi (LOH’-deye) Police Chief Vincent Caruso ordered an officer to ticket his wife after she double parked while dropping off their 5-year-old son at school.

    Caruso told The Record newspaper ( http://bit.ly/pksv9y) he didn’t want her to get any special treatment because of who she is. The chief paid the $54 ticket. It’s not the first time for Paula Caruso. The chief ordered another officer to ticket her two years ago after she forgot to move their vehicle for street cleaning. The chief told the newspaper he loves his wife and she’s very busy driving their four sons around. His wife couldn’t be reached for comment Thursday. The Carusos’ phone number is unlisted.

    Associated Press Posted: 10/03/2011 08:27:37 AM PDT Updated: 10/03/2011 08:29:33 AM PDT

    OAKLAND, Calif. (AP) — An Oakland officer’s city-issued video camera shows the shooting death of an armed suspect during a struggle with police. The Police Department won’t release details on what is depicted in the video of the Sept. 25 incident. The San Francisco Chronicle says the city of Oakland paid $540,000 for 350 wearable cameras last year from Vievu of Seattle. The cameras are worn on the chest of officers. Investigators say two officers pulled over a car and the passenger, who had a gun and drugs, fled on foot. One of the officers caught the suspect and shot him during a struggle. The name of the suspect and the officers has been withheld.

    A pair of Alabama conservation enforcement officers think they’ve come up with the perfect way for avid hunters to honor their loved ones for eternity. Officers Thad Holmes and Clem Parnell have launched Holy Smoke LLC, a company that will, for a price, load cremated human ash into shotgun shells, and rifle and pistol cartridges.

    It’s the perfect life celebration for someone who loves the outdoors or shooting sports, Parnell says.
    “This isn’t a joke. It’s a job that we take very seriously,” he said. “This is a reverent business. We take the utmost care in what we do and show the greatest respect for the remains.”

    The company, launched in July, shipped out its first two orders on Sept. 16 – one from Florida and one from Kentucky – Holmes says. It has established www.myholysmoke.com to promote the service and traffic on it has been growing , Holmes says.

    For $850, one pound of ash will be loaded into 250 shotgun shells. The ash is mixed in the cups that hold the shot, not the powder. The same amount of ash will fill the bullets of 100 standard caliber center-fire rifle rounds or 250 pistol rounds. For the rifle and pistol ammunition, the ash is put into the tips of hollow-point bullets with the cavity sealed with wax. Any remaining ash is shipped back to the customer, along with the loaded ammunition.
    “Some people have been concerned that a small amount of ash will remain in the animal that is shot with the ammunition, Holmes said. “But it’s just carbon, and a small amount at that. You don’t have anything to worry about.” The process takes about 48 hours from the time the ashes are received, Holmes said. “The people we use are all experienced reloaders and know exactly what we want them to do, he said. “Only one bag of ash will be opened at a time, and the equipment will be thoroughly cleaned before the next set of remains is loaded.

    Tim Godwin, a Montgomery landscaping company owner and avid hunter, says he sees no problem with the practice.

    “People have had their ashes sprinkled in rivers and the ocean, there have been ashes spread out of airplanes,” he said. “If you love hunting or the outdoors, this really isn’t much different.”

    People should take care in with how the meat that is shot with this ammunition is handled, cautions Robert Chapin, a toxicologist who worked for 18 years at the National Institute of Environmental Health Sciences.
    The animal should be killed quickly by the shot, to prevent any possibility of spreading the ashes in the animal’s blood, he says. The area around where the animal was struck should not be consumed.

    “I would expect that the ashes would pose less of a problem than any lead pellets historically used,” Chapin says.


    Serious crimes to warn people about http://www.contracostatimes.com/crime-courts/ci_18884334
    SJSU sexual assault  (Don’t walk alone, don’t take risk)


    And a recent local robbery where 2 suspects used a ruse to get an elderly couple in their 70’s to open their door at 0130 hrs, tied up the woman and beat the man until he opened a safe.


    Subject: New California law bans warrantless cell phone searches


    New law bans warrantless cell phone searches

    Editor’s note: Amy Gahran writes about mobile tech for CNN.com. She is a San Francisco Bay Area writer and media consultant whose blog, Contentious.com, explores how people communicate in the online age.

Two very helpful guides about CCW (Concealed Carry) and a Five Step guide to handgun selection

Two very helpful guides about CCW (Concealed Carry) and a Five Step guide to handgun selection

Put together by the folks at Beretta:















Click on the Image and Download the PDF



Click on the Image and Download the PDF

Online Banking & Security Q&A



Approach your online security with the right frame of mind.

Q. What’s the safest way to do my online banking: over a wired connection, powerline networking or Wi-Fi?

A. The answer doesn’t matter as much as you might think, but asking the question does mean you’re approaching your online security in the right state of mind.

Overall, a wired ethernet link is more secure than either Wi-Fi or powerline networking, in which the electrical wires in your home carry Internet data. To compromise an ethernet network, an attacker needs to get into your house and plug in a laptop, while Wi-Fi signals go beyond your home and powerline networks can leak information to adjacent dwellings.

Both Wi-Fi and powerline setups come with encryption options to scramble data flowing over the network; once you switch them on, an attacker would need to know the password to break in. But Wi-Fi’s obsolete WEP encryption can easily be defeated — and is still presented as a valid option in routers’ setup routines.

Furthermore, if you leave a router on its default administrative password, somebody who connects to your network can also monkey with the router’s settings to redirect your traffic to rogue sites. For much the same reason, you shouldn’t automatically trust third-party wireless hot spots.

Financial sites use encryption of their own to scramble data flowing to and from your computer — as reported by your browser with a lock icon in its toolbar that, when clicked, should display an info sheet including the bank’s name — and that should almost always outweigh the security of your local network.

(A determined attacker could defeat a bank’s login security by persuading a user to connect to a router running malware that subverts this encryption, but this seems to have been a theoretical exercise to date.)

Your local network, however, makes up only one part of the “attack surface” of online banking, and it may not be nearly as profitable as two others: your computer and your mind.

If an attacker can get a keylogger on your computer to record your keystrokes, the strength of your bank’s encryption and the complexity and novelty of your password won’t matter at all — each tap of the keyboard will have already been recorded and transmitted.

That’s why it’s important to keep up with security updates for both your operating system and your browser (if you haven’t disabled Oracle’s vulnerability-prone Java Web plug-in, now would be a fine time to do so).

And if an attacker can fool you into typing your username and password into a phony site by sending you a phishing e-mail, your security-fix fastidiousness won’t matter either.

You can thwart phishing attacks with the extreme measure of using a separate computer for online banking and nothing else (recommended at a panel on identity theft that I moderated earlier this month) or the lesser step of throwing a Linux LiveCD into your regular PC and booting off that for online banking sessions isolated from your usual software. But it’s just a little easier to remember this basic rule: Never log into a bank account by clicking on a link sent in an e-mail.

If you’re not sufficiently depressed about the state of financial security online, Target’s massive credit-card breach — apparently executed by exploiting the retailer’s in-store systems — offers a reminder that many account compromises happen in places we can’t control.

And the best way to watch for them is to monitor your account for unusual transactions — which means you should do more online banking, not less.


Many major sites, from Facebook to Google to Microsoft to Yahoo, now allow “two-step verification” to protect users’ logins from the loss of a password. That option requires users to vouch for all logins, or only those from strange computers or locations, by typing in a one-time password sent to their phone via text message or to a specialized app like Google Authenticator.

Most financial institutions, however, have yet to tune in to this trend. There’s Bank of America’s SafePass, CitiBank’s identification codes Ally Bank’s Security Code, and not much else. But if your bank offers this option — which may require looking around its site — you should enable it right away. And if it doesn’t, you might want to ask why.

Rob Pegoraro is a tech writer based out of Washington, D.C. To submit a tech question, e-mail Rob at rob@robpegoraro.com. Follow him on Twitter at@robpegoraro.