Reporting Suspicious Activities at iWatchTX.org

Report Suspicious Activity At iWatchTx.orgIn the wake of the Boston Marathon bombing, the Texas Department of Public Safety (DPS) is now encouraging residents to report suspicious behaviors that might indicate criminal or terrorist activity to the department’s iWATCH website at www.iwatchTX.org.

The DPS website collects citizen-sourced information to help thwart illegal endeavors, including terrorist actions.

“DPS works with federal, state and local law enforcement to combat crime and terrorism within Texas and beyond. With the help of the public, we can be even more successful,” said DPS Director Steven McCraw. “Residents can join our crime-fighting efforts – and possibly save lives – by remaining vigilant and promptly reporting any suspicious or criminal activities they might witness.”

Citizens can fill out reports on the website about a particular incident, usually in fewer than five minutes. Once submitted, each report is reviewed by law enforcement analysts.

Examples of the behaviors and activities that DPS is interested in include:

  • Strangers asking questions about building security features and procedures.
  • Briefcase, suitcase, backpack or package is left behind.
  • Cars or trucks are left in no-parking zones at important buildings.
  • Chemical smells or fumes that are unusual for the location.
  • People requesting sensitive information, such as blueprints, security plans or VIP travel schedules, without a need to know.
  • Purchasing supplies that could be used to make bombs or weapons, or purchasing uniforms without having the proper credentials.
  • Taking photographs or videos of security features, such as cameras or check points.

Preparations for Terrorist Attacks Often Seen but Seldom Reported

DPS urges residents who see something unusual to simply speak up. Preparations for terrorist attacks are often seen, but rarely reported. When in doubt, report the suspicious activity through iWATCH. For more information on the iWATCH program or to submit a report, visit www.iwatchTX.org.

The iwatchTX.org website is part of the DPS Intelligence and Counterterrorism Division (ICT), which serves as the central clearinghouse for the collection, management, analysis and dissemination of law enforcement and homeland security intelligence in Texas.

Assisting 1500 Law Enforcement Agencies

The intelligence gathered assists more than 1,500 local law enforcement agencies including the Counterterrorism Analysis Program; State Intelligence Assessment Program; Texas 10 Most Wanted Fugitive and Sex Offender programs; Operation Drawbridge border camera program; Missing and Exploited Children Unit; Interdiction for the Protection of Children Program; Gang Analysis Section; and Critical Infrastructure and Key Resource Tracking and Assessment Program; Texas Rangers. The information also assists in   investigations involving cartels, gangs, human trafficking and sex offenders.

Weather Apps Can Be Lifesavers When Tornadoes Approach

This blog is dedicated to exploring the side effects of new communication technologies. Often those unintended side effects are negative. In the last 24 hours, as killer tornadoes swarmed across Oklahoma, several positive side effects of the new technologies became apparent.

Extra Warning Time

Perhaps the most striking examples are weather apps for smartphones. ABC News last night interviewed a survivor of the devastating tornado packing 200 mile per hour winds that devastated Moore, Oklahoma. The survivor talked about how a weather app on his iPhone warned him of the approaching storm 15 to 20 minutes before it struck his location, giving him time to get out of its path.

It appeared that he used my favorite weather app, one called RadarScope. This powerful app enables users to see storms coming at them in real time from more than 100 miles away. Many other apps can do that too. What makes this one so powerful is its stunning accuracy and range of measurement tools.

I’ve found that RadarScope’s accuracy can be measured in city blocks and minutes. In addition to reporting storms’ reflectivity, it also reports velocity, rainfall amounts, storm height, movement at different levels within storms, and much more. It’s a tool designed for professional meteorologists that amateurs can also appreciate.

As I write this 12 hours after the storm struck Moore, the death toll there has already reached 91 and is expected to climb even higher. One can only wonder how much worse the tragedy would have been were it not for weather apps that gave people time to evacuate or reach storm shelters.

Lost-and-Found Role for Social Media

Social media are also already playing a role in the recovery from this storm. As people find mementos, they are posting images of them online, turning the Internet into the world’s largest lost-and-found system.

Advocacy Advertising and Political Debate

Let’s talk about advocacy advertising today. You’ve all seen television commercials attempting to swing public opinion. They’re designed to sway Congressional votes on important issues, such as gun control, abortion, trade, energy, health care and more.

Both sides of important issues employ research in these epic struggles. Typically, researchers read a series of one-sentence “sales” propositions to respondents. Respondents rate each proposition on a scale. Researchers then rank the propositions based on their average ratings.

For those producing and targeting commercials, these rankings reveal which arguments work best among groups people are for issues, against them or undecided. So far, so good. When we get to the next step in the process, however, a dark consequence of advocacy advertising begins to emerge.

Solving Health Care Reform in 65 Words?

The average 30-second television commercial contains just 65 words. That’s about four to six sentences depending on their length. Now you understand why so much effort was thrown into research designed to identify compelling sound bites.

Addressing Multidimensional Issues with Single-Minded Discussions

The medium of television advertising forces multidimensional issues into single-minded “discussions.” Each side hurls its sound bites at each other without ever truly addressing each others’ arguments. It feels like the movie Groundhog Day in which Bill Murray replays the same bad dreams over and over again in an endless series of looping nightmares. The usual results:

  • Political stalemate
  • Perpetual disagreement

Frustrating Progress

Most advocacy advertising lowers the level of public debate to that of two shrill cockatoos parroting the same soundbites at each other, over and over. We rarely seem to get past the opening volley in the debate.

Progress is the casualty. Frustration is the winner.

Cell Phones and Identity Theft

shutterstock_85529755Identity theft has been called the fastest growing crime in America. And one of the fastest growing means of identity theft is theft of cell phones.

Two thirds of Americans now own cell phones. ABC news ran a story this week about cell phone robberies. According to ABC, one out of every three robberies in America now involve cell phones. Thieves literally rip them out of victim’s hands, steal unprotected data, turn them off so they can’t be tracked, then wipe the data, and resell them.

According to the FCC:

  • More than 40% of all robberies in New York City involve smartphones and other cell phones
  • The situation is getting worse: In Washington, D.C., cell phones were taken in 54% more robberies in 2011 than in 2007, and cell phones are now taken in 38% of all DC robberies.
  • Other major cities have similar statistics, with robberies involving cell phones comprising 30-40% of all robberies.
  • Robberies are, by definition, violent crimes, and there are many instances of robberies targeting cell phones resulting in serious injury or even death.
  • Loss or theft of an unsecured smartphone often results in access to sensitive personal data.

A web site specializing in compiling statistics on identity theft, IdentityTheft.info points out that:

  • 15 million Americans have their identities used fraudulently each year with financial losses exceeding $50 billion.
  • That represents 7% of all adults with an average loss of $3,500.
  • Close to 100 million additional Americans have their personal identifying information placed at risk of identity theft each year when records maintained in government and corporate databases are lost or stolen.

The FCC, police and legislators have launched initiatives to halt the epidemic of cell phone thefts. They include:

  • Creating a global database to prevent use of stolen smartphones.
  • Teaching users to lock their phones with passwords and educating them about lock/locate/wipe applications.
  • Introducing Federal legislation to criminalize tampering with unique hardware IDs on cell phones.

Making it a crime to tamper with the unique hardware identifiers built into cell phones has been a key part of successful foreign initiatives to deter cell phone theft by creating databases of stolen cell phones which carriers could then block.