Sponsored

Search This Blog

Brian Luke Community Blogger, WGRZ-TV

Friday, June 9, 2017

Coast Guard honors fallen flight crew in McKinleyville Photos




Coast Guard honors fallen flight crew in McKinleyville on 20th anniversary of helicopter crash

MCKINLEYVILLE, Calif. — The crew of Coast Guard Sector Humboldt Bay held a memorial service in McKinleyville, Thursday, in remembrance of the crew of the rescue helicopter 6549 helicopter that crashed 20 years ago during a search-and-rescue mission.
The ceremony paid tribute to the two pilots and two crewmembers who lost their lives aboard a Coast Guard MH-65 Dolphin helicopter during an effort to save five mariners stranded on a Canadian sailing vessel during a storm.

Lt. Jeffrey F. Crane, 35, of Marshfield, Massachusetts; Lt. j.g. Charles W. Thigpen IV, 26, of Riverside, California; Aviation Machinist’s Mate Petty Officer 3rd Class Richard L. Hughes, 33, from Black Canyon, Arizona; and Aviation Survivalman Petty Officer 3rd Class James G. Caines, 26, of Hinesville, Georgia, died in the line of duty.

"Flying helicopters is dangerous in any weather," said Rear Adm. Todd Sokalzuk, Coast Guard 11th District commander, during the ceremony.  "Doing so in the extremes we regularly ask of our Coast Guard crews requires courage, skill and dedication to helping others, three traits embodied by all crew members on the 6549."
Following the memorial, a Coast Guard helicopter crew laid a wreath at sea near the location

Sunday, June 4, 2017

Jury Convicts Buffalo Male for Damaging Government Property

BUFFALO, N.Y.-Acting U.S. Attorney James P. Kennedy, Jr. announced today that a federal jury found Justin Vazquez, 30, of Buffalo, NY, guilty of damaging government property. The charge carries a maximum penalty of one year in prison.
 
Assistant U.S. Attorney Michael J. Adler, who is handling the case, stated that on October 20, 2016, during a status conference prior to trial on a firearm’s charge, Vazquez carved a vulgar obscenity into a wooden table in the courtroom of Chief U.S. District Judge Joseph P. Geraci.  
 
In May of 2017, defendant was convicted of the firearm charge and sentenced to 72 months in prison.

The verdict is the result of an investigation by the U.S. Marshal’s Service, under the direction of Marshal Charles Salina.
 
Sentencing is scheduled for September 14, 2017, at 11:00 a.m. before Judge Geraci who presided over the trial. 
 

NWS Niagara County Lakeshore Flooding

Effect From Tuesday Afternoon Through wednesday Morning...The National Weather Service In Buffalo Has Issued A Lakeshoreflood Watch...Which Is In Effect From Tuesday Afternoon Throughwednesday Morning.* Locations...The Lake Ontario Shore Of Niagara, Orleans, Andmonroe Counties.* Lake Shore Flooding...The Combination Of Very High Lake Levelsand Brisk Northeast Winds May Locally Increase Lake Levels Alongthe South Shore Of Lake Ontario. Wave Action May Furtherincrease Shoreline Flooding And Erosion.* Timing...From Early Tuesday Afternoon Through Early Wednesdaymorning.* Impacts...Flooding May Worsen In Low Lying Coastal Locationsalong The Immediate Lakeshore...Especially In The Many Bays Aninlets Along The South Shore Of Lake Ontario. Wave Action Mayresult In Additional Shoreline And Beach Erosion.
A Lakeshore Flood Watch Means That Conditions Favorable Forlakeshore Flooding Are Expected To Develop. Residents On Or Nearthe Shore Should Take Action To Protect Property...And Listen Forlater Statements Or Warnings.

Friday, June 2, 2017

Andrea Swartwood Located

ANDREA SWARTWOOD has been located and is safe.   No further assistance is requested.   Sheriff's Department Photo:
 

Shelter In Place :Lifted: Hyde Park Niagara Falls

The situation at Hyde Park Blvd and Delaware Ave has been resolved     

If you are currently in this area you can resume your normal actions and the roadway is now opened.

Shelter In Place :Lifted: Hyde Park Niagara Falls

The situation at Hyde Park Blvd and Delaware Ave has been resolved     

If you are currently in this area you can resume your normal actions and the roadway is now opened.

Shelter In Place :Lifted: Hyde Park Niagara Falls

The situation at Hyde Park Blvd and Delaware Ave has been resolved     

If you are currently in this area you can resume your normal actions and the roadway is now opened.

Orange County, City of Newburgh, Sewage Discharge, 200 South Water Street

Location of Discharge: 200 Water St, Newburgh, NY 12550, USA
Additional Address Info: Combined Sewer
Name of Waterbody Affected: Hudson River
Description of Discharge: Combined Sanitary Sewer and Stormwater
Potential public area(s) impacted:
The following public areas were potentially impacted:
Park: Shoreline of Ward's Brothers Park (CSO No. 3)
Facility name: Newburgh WWTP, Facility ID: NY0026310
Date and Time of Discharge: May 16 2017 12:00PM
Duration of Discharge: 532.0 hours ongoing.
Reason for Discharge:
Pipe Break: City investigating source of unknown seepage through retaining wall
Volume or Rate of Discharge: 1 Gallons Per Minute  (Estimated)
Treated State of Discharge: Untreated
Steps Taken to Contain Discharge: Bypass Pumping of North Interceptor Sewer
For more information on this and other discharges, visit SPRTK
[Disclaimer: Daily and/or termination reports will be provided for ongoing discharges. The information provided in this message is accurate at the time of report using existing systems and models.]

The City has hired an emergency contractor to bypass pump the North Interceptor Sewer to allow the further inspection of this sewer main located behind a failing retaining wall in an effort to determine if the source of the seepage through the wall originates from a compromised sewer main.  The City will continue to update the NY-Alert website until the source of the questionable seepage is been positively identified.  Update (5-22-17): The City's emergency contractor successfully started up the temporary bypass pumping station located at the corner of Washington Street and Colden Street. The contractor also commenced cleaning of the North Interceptor along Colden Street.  It is anticipated that this cleaning work will continue for the remainder of the week.  Update (5-23-17): The City's emergency contractor continued to clean the North Interceptor today.  Cleaning will continue for the remainder of the week.  Update (5-24-17): The City's emergency contractor continued to clean the North Interceptor today.  Cleaning will continue for the remainder of the week.  Update (5-25-17): The City's emergency contractor continued to clean the North Interceptor today until approximately 1pm when wet weather prevented further progress.  Cleaning will continue for the remainder of the week.   Update (5-26-17): The City's emergency contractor continued to clean the North Interceptor today. Work will continue on Saturday.Update (5-27-17): The City's emergency contractor continued to clean the North Interceptor today. Update (5-29-17): The City's emergency contractor will continue to clean and CCTV the North Interceptor on Tuesday. Update (5-30-17): The City's emergency contractor continued to clean the North Interceptor today.  Cleaning work will continue tomorrow.  Update (5-31-17): The City's emergency contractor continued to clean the North Interceptor today.  The contractor attempted to CCTV the sewer main which revealed remaining existing pockets of debris in the pipe which prevented further televising work.  Cleaning and CCTV work will continue tomorrow.  Update (6-1-17): The City's emergency contractor continued to clean the North Interceptor today.  Cleaning work will continue tomorrow.Update (6-2-17): The City's emergency contractor continued to clean the North Interceptor today.  A section of the North Interceptor from South William Street to Washington Street was televised and found to be in good condition with a minimum of defects.  Cleaning and CCTV work will continue on Monday for the pipe section south of Renwick Street.

Update: Royalton, Accident

R
Royalton, NY - The driver of the motorcycle involved in the fatal accident on Monday, May 29th at 1656 hours has been identified as Jason W. Clark, 36 years old, from the Town of Royalton. The Investigation is continuing by the Niagara County Sheriff's Office Accident Investigation Unit.

Friday, May 26, 2017

CUBICLE COACH'S CORNER: Tonights Games on TuneIn

Buffalo Police Bike Giveaway


BUFFALO, NY: The Buffalo Police Department would like to announce to the public that we will be accepting donations of new or used bikes for a joint bike giveaway sponsored by the BPD, Go Bike Buffalo and the East Side Bike Club. These bikes will be used in workshops with officers and citizens of Buffalo, which offer basic bike maintenance and bike safety classes. Bikes in all conditions can be dropped off at all City of Buffalo Police Stations. Bike drive begins March 10th and runs till April 10th. ALL BIKES WILL DISTRIBUTED TO CHILDREN THROUGHOUT BUFFALO AT SCHEDULED EVENTS DURING THE SPRING AND SUMMER. Any donation is greatly appreciated.

Parolee arrested for Attempted Sexual Assult


BUFFALO, NY:  City Police announce a parolee has been arrested for an attempted sexual assault of a woman, which occurred in late February. On February 22, 2017, Ferry-Fillmore District officers on routine patrol were flagged down by a distraught female at around 2am, on the city's east side. The victim reported she was assaulted and threatened by a male known as Langston, who was armed with a knife during the attack, and he forcibly touched her. The victim was taken by ambulance to a hospital for treatment.

Detective Mark R. Costantino of the Sex Offense Squad investigated the incident, along with Detective Jeffrey T. Banes, and tracked down the suspect at his Gibson Street home, late Wednesday night. After being brought to police headquarters for questioning, the suspect, now identified as Langston R. Austin, also known as Langston Block, 51 years old, has been charged with attempted Assault in the 2nd degree, Forcible Touching, Assault in the third degree, and Menacing. After an appearance in city Court Thursday, he was taken to the Erie County Holding Center, pending further court action.

Small Business are the first y line of Defense in Cyber Securit


NATIONAL: As we live in a society where ID theft, Credit Card scams and thievery occur on a daily basis, merchants are the first line of defense in securing a nation of consumers. Unfortunately some merchants take shortcuts and cheap fizes to save money. These shortcuts place consumers data at risk. Unfortunately the lax security of some allow criminals access. The employers are as guilty as the criminals in their complacently and professional indifference to security due to ignorance or greed. The hackers or criminals get the full brunet of blame, which is understandable, until the lax safeguards are exposed. Small businesses and family businesses  knowledgable abomay specialize in a certain product but not be able to analyse risk and understand risk. Someone may be making the best pizza, for example a family pizza place, but if that same family restaurant is tossing out their bank statements unshreaded, or repeating credit card numbers back over a phone where people can hear across a counter, things can happen. the fact of the matter is, with the economy the way it is more small busiensses will open, from UBER to Lyft to independent contractors we need to be cyber smart.

The Federal Bureau of Investigations has listed the crime of identity theft as a national security concern. What should should be done at the merchant level to ensure that they are a defender of customer service data as merchants are the first line of defense in the war against identity theft, some important issues are listed herein.

The Bureau states that “A stolen identity is a powerful cloak of anonymity for criminals and terrorists and a danger to national security and private citizens alike. For the FBI, identity theft is nothing new—we've been dealing with criminals faking IDs for decades, from check forgers to fugitives on the run. But the threat is more pervasive and the scams more sophisticated than ever, including online elements. The FBI uses both its criminal and cyber resources—along with its intelligence capabilities—to identify and stop crime groups in their early stages.”

Physical and Virtual Barriers

As a company grows a strong effort should be made to secure the workplace and require all individuals to pass through a central access point, and have their identity and business known by a trusted company representative, like a security guard, or receptionist.

The premidedator of the building may be covered by video cameras, but viodeo cameras serve as apassive manner of security to document after the fact.

All premiditer doors should be locked at all times and a pass key system should be established, where as a badge is needed to access a secsitive area of the building. The uise of a badge is easy to deactivate once a visitor leaves or an employee is terminated. Simply printing a 8 x 11 sign stating “ all visitors must report to the front door is not sufficient security in a world where individuals with a confident smile, wave and a clipboard can get into any building on Earth. This was clearly illustrated by Kevin Mitnic, security consultant, author of “The Art of Intrusion” by Mitnick and Simon, March 2005 and the “Art of Secption.” in October 2002.

Anyone who has studied cybersecurity and PCI compliance, it is good to remember that basic cyber security guidelines and P.C.I. Compliance guidence run pararell and in concert to keep consumers safe.

Some basic workplace security measures that should be deployed:

A. All employees dealing with customer sensitive and personally identifiable information (P.I.I.) should be trained in cybersecurity, anti-fraud. It is not enough to have one person whom has access to the processing gateway to be trained. In many cases, especially when new employees are hired, it is likely that training is rushed and poorly presented by an individual whom is not a certified trainer. personally

B. When customers call in, under absolutely no circumstances should credit card numbers be written down on paper. Nor should any customer information be placed in a standard garbage can. It is amazing that some employers in call center environments have separate trash cans for “Food Only” but no burn or shred boxes to shred all customer information that may be printed or written down.

  1. Customers should be forced politely to confirm their address or qualifier. Customer Service Agents should not volunteer any information. The incorrect statement would be “You still live at 123 Main Street, in Amherst, right?” This is obviously an example. The correct way to do this is “ To protect your account, can you please verify your address, please?”

Internal Controls

Once a visitor enters a building their access to critical operational areas of the property should be controlled. The use of tensabarriors, a portable barrier to indicate areas that are off limits, restricting access to floors that do not pertain to general public should be deployed and doors to internet commerce areas and channel sales should be locked.

All appointments should be made in advance and confirmed, any deviation in person who visits verses who made the appointment should be recorded and logged for future use. If patterns begin to form, it may be worth review.

Employee supervision is not enough. Once employees enter a workplace that contains consumer information, they should be required to lock their eprsonal belongings in a locker for the duration of their shift, and do not bring jackets, coats or portable media and cellular phones into the work area. Computer screens can be photographed and emailed with ease and thumbdrives containing malicious programs can damage mission critical equipment.

USB drives can be deployed from doing everything from hacking a safe, according to an article by J.Kirk on PCWorld, to converting a drive and hijack internet traffic, as per another article by theconversation.com

IT Problems and Trends

Your CRM or Customer Relationship Management software runs, on your computers, including credit card processing, so when the pc slows down, or completely shuts down, reboots, it may be a good idea to take it seriously. This is because the calls will still continue, and force the pc operator to write down credit card numbers while the pc reboots. Not a great idea. It is important to keep track of these tickers or pc issues, to determine if there is a trend, if it is time to upgrade software. If there is a problem with your Microsoft group policies or Microsoft Active Directory, then that is a serious problem, incolving the administrative rights and security settings in the registery or server on the network. If PC issues are not being repaired, and security issues are not being addressed, it may be a good idea to reassess the decision to have some tenty-something manage your IT. Reason being a customer service representative is only as good and only as safe with customer data as his or her tools allow them to be.

Users should lock their screens before leaving their cubicles.

Supervisors should receive basic security training, otherwise all they are doing is watching events unfold, forming their own opinions based on bad information and being blissfully unaware of possible cyber issues.

Losses from Logistics

Once a sales is made the product actually has to get to the customer and this is an interesting area to study called supply chain management. Orders electronically go to the wearhouse where differently skilled workers work off of manafests and pick and pack the products, load trucks. Occasionally, sometimes more than should be allowed, shipping labels “fall off” packages, Fedex or UPS or USPS labels get destroyed so products can not be found, or traced. The adhesive on a Fedex label is very strong and it takes a lot of sharpt marker to obliterate a tracer, but if a package label gets damaged or “falls off” then each and every occurance should be tracked, managed and trends should be investigated. Any missing shipments should be followed through with the appropriate carrier, or freight company. If an insurance claim is filed, it would be best to make absolutely sure the product is missing, as insurance fraud is a serious matter.

Employee Theft
If the shipments are going missing because of employees stealing your stock and blaming logistics companies, it should be investigated and those involved should be prosecuted. The cost of no-cost orders to make good shipments that were not received by customers are only part of the cost involved. There are costs to your brand in referecne to the value of the brand in the eyes of the customer and takeholder.
Companies, especially ones that are growing need to take great pause and understand that their security policy needs to include, PCI Compliance, Cyber Security and Physical Asset security, to prevent loss.

Brian Scott Luke, holds a Masters in Business Administration, Finance and Accounting, B.S. in Communications and Business from Buffalo State and is a Certified Risk Management Consultant. Mr. Luke has been reporting on Cyber Security for approximately five years and has worked for corporate and utility help desks throughout Western New York.

Small Business are the first y line of Defense in Cyber Securit


NATIONAL: As we live in a society where ID theft, Credit Card scams and thievery occur on a daily basis, merchants are the first line of defense in securing a nation of consumers. Unfortunately some merchants take shortcuts and cheap fizes to save money. These shortcuts place consumers data at risk. Unfortunately the lax security of some allow criminals access. The employers are as guilty as the criminals in their complacently and professional indifference to security due to ignorance or greed. The hackers or criminals get the full brunet of blame, which is understandable, until the lax safeguards are exposed. Small businesses and family businesses  knowledgable abomay specialize in a certain product but not be able to analyse risk and understand risk. Someone may be making the best pizza, for example a family pizza place, but if that same family restaurant is tossing out their bank statements unshreaded, or repeating credit card numbers back over a phone where people can hear across a counter, things can happen. the fact of the matter is, with the economy the way it is more small busiensses will open, from UBER to Lyft to independent contractors we need to be cyber smart.

The Federal Bureau of Investigations has listed the crime of identity theft as a national security concern. What should should be done at the merchant level to ensure that they are a defender of customer service data as merchants are the first line of defense in the war against identity theft, some important issues are listed herein.

The Bureau states that “A stolen identity is a powerful cloak of anonymity for criminals and terrorists and a danger to national security and private citizens alike. For the FBI, identity theft is nothing new—we've been dealing with criminals faking IDs for decades, from check forgers to fugitives on the run. But the threat is more pervasive and the scams more sophisticated than ever, including online elements. The FBI uses both its criminal and cyber resources—along with its intelligence capabilities—to identify and stop crime groups in their early stages.”

Physical and Virtual Barriers

As a company grows a strong effort should be made to secure the workplace and require all individuals to pass through a central access point, and have their identity and business known by a trusted company representative, like a security guard, or receptionist.

The premidedator of the building may be covered by video cameras, but viodeo cameras serve as apassive manner of security to document after the fact.

All premiditer doors should be locked at all times and a pass key system should be established, where as a badge is needed to access a secsitive area of the building. The uise of a badge is easy to deactivate once a visitor leaves or an employee is terminated. Simply printing a 8 x 11 sign stating “ all visitors must report to the front door is not sufficient security in a world where individuals with a confident smile, wave and a clipboard can get into any building on Earth. This was clearly illustrated by Kevin Mitnic, security consultant, author of “The Art of Intrusion” by Mitnick and Simon, March 2005 and the “Art of Secption.” in October 2002.

Anyone who has studied cybersecurity and PCI compliance, it is good to remember that basic cyber security guidelines and P.C.I. Compliance guidence run pararell and in concert to keep consumers safe.

Some basic workplace security measures that should be deployed:

A. All employees dealing with customer sensitive and personally identifiable information (P.I.I.) should be trained in cybersecurity, anti-fraud. It is not enough to have one person whom has access to the processing gateway to be trained. In many cases, especially when new employees are hired, it is likely that training is rushed and poorly presented by an individual whom is not a certified trainer. personally

B. When customers call in, under absolutely no circumstances should credit card numbers be written down on paper. Nor should any customer information be placed in a standard garbage can. It is amazing that some employers in call center environments have separate trash cans for “Food Only” but no burn or shred boxes to shred all customer information that may be printed or written down.

  1. Customers should be forced politely to confirm their address or qualifier. Customer Service Agents should not volunteer any information. The incorrect statement would be “You still live at 123 Main Street, in Amherst, right?” This is obviously an example. The correct way to do this is “ To protect your account, can you please verify your address, please?”

Internal Controls

Once a visitor enters a building their access to critical operational areas of the property should be controlled. The use of tensabarriors, a portable barrier to indicate areas that are off limits, restricting access to floors that do not pertain to general public should be deployed and doors to internet commerce areas and channel sales should be locked.

All appointments should be made in advance and confirmed, any deviation in person who visits verses who made the appointment should be recorded and logged for future use. If patterns begin to form, it may be worth review.

Employee supervision is not enough. Once employees enter a workplace that contains consumer information, they should be required to lock their eprsonal belongings in a locker for the duration of their shift, and do not bring jackets, coats or portable media and cellular phones into the work area. Computer screens can be photographed and emailed with ease and thumbdrives containing malicious programs can damage mission critical equipment.

USB drives can be deployed from doing everything from hacking a safe, according to an article by J.Kirk on PCWorld, to converting a drive and hijack internet traffic, as per another article by theconversation.com

IT Problems and Trends

Your CRM or Customer Relationship Management software runs, on your computers, including credit card processing, so when the pc slows down, or completely shuts down, reboots, it may be a good idea to take it seriously. This is because the calls will still continue, and force the pc operator to write down credit card numbers while the pc reboots. Not a great idea. It is important to keep track of these tickers or pc issues, to determine if there is a trend, if it is time to upgrade software. If there is a problem with your Microsoft group policies or Microsoft Active Directory, then that is a serious problem, incolving the administrative rights and security settings in the registery or server on the network. If PC issues are not being repaired, and security issues are not being addressed, it may be a good idea to reassess the decision to have some tenty-something manage your IT. Reason being a customer service representative is only as good and only as safe with customer data as his or her tools allow them to be.

Users should lock their screens before leaving their cubicles.

Supervisors should receive basic security training, otherwise all they are doing is watching events unfold, forming their own opinions based on bad information and being blissfully unaware of possible cyber issues.

Losses from Logistics

Once a sales is made the product actually has to get to the customer and this is an interesting area to study called supply chain management. Orders electronically go to the wearhouse where differently skilled workers work off of manafests and pick and pack the products, load trucks. Occasionally, sometimes more than should be allowed, shipping labels “fall off” packages, Fedex or UPS or USPS labels get destroyed so products can not be found, or traced. The adhesive on a Fedex label is very strong and it takes a lot of sharpt marker to obliterate a tracer, but if a package label gets damaged or “falls off” then each and every occurance should be tracked, managed and trends should be investigated. Any missing shipments should be followed through with the appropriate carrier, or freight company. If an insurance claim is filed, it would be best to make absolutely sure the product is missing, as insurance fraud is a serious matter.

Employee Theft
If the shipments are going missing because of employees stealing your stock and blaming logistics companies, it should be investigated and those involved should be prosecuted. The cost of no-cost orders to make good shipments that were not received by customers are only part of the cost involved. There are costs to your brand in referecne to the value of the brand in the eyes of the customer and takeholder.
Companies, especially ones that are growing need to take great pause and understand that their security policy needs to include, PCI Compliance, Cyber Security and Physical Asset security, to prevent loss.

Brian Scott Luke, holds a Masters in Business Administration, Finance and Accounting, B.S. in Communications and Business from Buffalo State and is a Certified Risk Management Consultant. Mr. Luke has been reporting on Cyber Security for approximately five years and has worked for corporate and utility help desks throughout Western New York.

Small Business are the first y line of Defense in Cyber Securit


NATIONAL: As we live in a society where ID theft, Credit Card scams and thievery occur on a daily basis, merchants are the first line of defense in securing a nation of consumers. Unfortunately some merchants take shortcuts and cheap fizes to save money. These shortcuts place consumers data at risk. Unfortunately the lax security of some allow criminals access. The employers are as guilty as the criminals in their complacently and professional indifference to security due to ignorance or greed. The hackers or criminals get the full brunet of blame, which is understandable, until the lax safeguards are exposed. Small businesses and family businesses  knowledgable abomay specialize in a certain product but not be able to analyse risk and understand risk. Someone may be making the best pizza, for example a family pizza place, but if that same family restaurant is tossing out their bank statements unshreaded, or repeating credit card numbers back over a phone where people can hear across a counter, things can happen. the fact of the matter is, with the economy the way it is more small busiensses will open, from UBER to Lyft to independent contractors we need to be cyber smart.

The Federal Bureau of Investigations has listed the crime of identity theft as a national security concern. What should should be done at the merchant level to ensure that they are a defender of customer service data as merchants are the first line of defense in the war against identity theft, some important issues are listed herein.

The Bureau states that “A stolen identity is a powerful cloak of anonymity for criminals and terrorists and a danger to national security and private citizens alike. For the FBI, identity theft is nothing new—we've been dealing with criminals faking IDs for decades, from check forgers to fugitives on the run. But the threat is more pervasive and the scams more sophisticated than ever, including online elements. The FBI uses both its criminal and cyber resources—along with its intelligence capabilities—to identify and stop crime groups in their early stages.”

Physical and Virtual Barriers

As a company grows a strong effort should be made to secure the workplace and require all individuals to pass through a central access point, and have their identity and business known by a trusted company representative, like a security guard, or receptionist.

The premidedator of the building may be covered by video cameras, but viodeo cameras serve as apassive manner of security to document after the fact.

All premiditer doors should be locked at all times and a pass key system should be established, where as a badge is needed to access a secsitive area of the building. The uise of a badge is easy to deactivate once a visitor leaves or an employee is terminated. Simply printing a 8 x 11 sign stating “ all visitors must report to the front door is not sufficient security in a world where individuals with a confident smile, wave and a clipboard can get into any building on Earth. This was clearly illustrated by Kevin Mitnic, security consultant, author of “The Art of Intrusion” by Mitnick and Simon, March 2005 and the “Art of Secption.” in October 2002.

Anyone who has studied cybersecurity and PCI compliance, it is good to remember that basic cyber security guidelines and P.C.I. Compliance guidence run pararell and in concert to keep consumers safe.

Some basic workplace security measures that should be deployed:

A. All employees dealing with customer sensitive and personally identifiable information (P.I.I.) should be trained in cybersecurity, anti-fraud. It is not enough to have one person whom has access to the processing gateway to be trained. In many cases, especially when new employees are hired, it is likely that training is rushed and poorly presented by an individual whom is not a certified trainer. personally

B. When customers call in, under absolutely no circumstances should credit card numbers be written down on paper. Nor should any customer information be placed in a standard garbage can. It is amazing that some employers in call center environments have separate trash cans for “Food Only” but no burn or shred boxes to shred all customer information that may be printed or written down.

  1. Customers should be forced politely to confirm their address or qualifier. Customer Service Agents should not volunteer any information. The incorrect statement would be “You still live at 123 Main Street, in Amherst, right?” This is obviously an example. The correct way to do this is “ To protect your account, can you please verify your address, please?”

Internal Controls

Once a visitor enters a building their access to critical operational areas of the property should be controlled. The use of tensabarriors, a portable barrier to indicate areas that are off limits, restricting access to floors that do not pertain to general public should be deployed and doors to internet commerce areas and channel sales should be locked.

All appointments should be made in advance and confirmed, any deviation in person who visits verses who made the appointment should be recorded and logged for future use. If patterns begin to form, it may be worth review.

Employee supervision is not enough. Once employees enter a workplace that contains consumer information, they should be required to lock their eprsonal belongings in a locker for the duration of their shift, and do not bring jackets, coats or portable media and cellular phones into the work area. Computer screens can be photographed and emailed with ease and thumbdrives containing malicious programs can damage mission critical equipment.

USB drives can be deployed from doing everything from hacking a safe, according to an article by J.Kirk on PCWorld, to converting a drive and hijack internet traffic, as per another article by theconversation.com

IT Problems and Trends

Your CRM or Customer Relationship Management software runs, on your computers, including credit card processing, so when the pc slows down, or completely shuts down, reboots, it may be a good idea to take it seriously. This is because the calls will still continue, and force the pc operator to write down credit card numbers while the pc reboots. Not a great idea. It is important to keep track of these tickers or pc issues, to determine if there is a trend, if it is time to upgrade software. If there is a problem with your Microsoft group policies or Microsoft Active Directory, then that is a serious problem, incolving the administrative rights and security settings in the registery or server on the network. If PC issues are not being repaired, and security issues are not being addressed, it may be a good idea to reassess the decision to have some tenty-something manage your IT. Reason being a customer service representative is only as good and only as safe with customer data as his or her tools allow them to be.

Users should lock their screens before leaving their cubicles.

Supervisors should receive basic security training, otherwise all they are doing is watching events unfold, forming their own opinions based on bad information and being blissfully unaware of possible cyber issues.

Losses from Logistics

Once a sales is made the product actually has to get to the customer and this is an interesting area to study called supply chain management. Orders electronically go to the wearhouse where differently skilled workers work off of manafests and pick and pack the products, load trucks. Occasionally, sometimes more than should be allowed, shipping labels “fall off” packages, Fedex or UPS or USPS labels get destroyed so products can not be found, or traced. The adhesive on a Fedex label is very strong and it takes a lot of sharpt marker to obliterate a tracer, but if a package label gets damaged or “falls off” then each and every occurance should be tracked, managed and trends should be investigated. Any missing shipments should be followed through with the appropriate carrier, or freight company. If an insurance claim is filed, it would be best to make absolutely sure the product is missing, as insurance fraud is a serious matter.

Employee Theft
If the shipments are going missing because of employees stealing your stock and blaming logistics companies, it should be investigated and those involved should be prosecuted. The cost of no-cost orders to make good shipments that were not received by customers are only part of the cost involved. There are costs to your brand in referecne to the value of the brand in the eyes of the customer and takeholder.
Companies, especially ones that are growing need to take great pause and understand that their security policy needs to include, PCI Compliance, Cyber Security and Physical Asset security, to prevent loss.

Brian Scott Luke, holds a Masters in Business Administration, Finance and Accounting, B.S. in Communications and Business from Buffalo State and is a Certified Risk Management Consultant. Mr. Luke has been reporting on Cyber Security for approximately five years and has worked for corporate and utility help desks throughout Western New York.

Small Business are the first y line of Defense in Cyber Securit


NATIONAL: As we live in a society where ID theft, Credit Card scams and thievery occur on a daily basis, merchants are the first line of defense in securing a nation of consumers. Unfortunately some merchants take shortcuts and cheap fizes to save money. These shortcuts place consumers data at risk. Unfortunately the lax security of some allow criminals access. The employers are as guilty as the criminals in their complacently and professional indifference to security due to ignorance or greed. The hackers or criminals get the full brunet of blame, which is understandable, until the lax safeguards are exposed. Small businesses and family businesses  knowledgable abomay specialize in a certain product but not be able to analyse risk and understand risk. Someone may be making the best pizza, for example a family pizza place, but if that same family restaurant is tossing out their bank statements unshreaded, or repeating credit card numbers back over a phone where people can hear across a counter, things can happen. the fact of the matter is, with the economy the way it is more small busiensses will open, from UBER to Lyft to independent contractors we need to be cyber smart.

The Federal Bureau of Investigations has listed the crime of identity theft as a national security concern. What should should be done at the merchant level to ensure that they are a defender of customer service data as merchants are the first line of defense in the war against identity theft, some important issues are listed herein.

The Bureau states that “A stolen identity is a powerful cloak of anonymity for criminals and terrorists and a danger to national security and private citizens alike. For the FBI, identity theft is nothing new—we've been dealing with criminals faking IDs for decades, from check forgers to fugitives on the run. But the threat is more pervasive and the scams more sophisticated than ever, including online elements. The FBI uses both its criminal and cyber resources—along with its intelligence capabilities—to identify and stop crime groups in their early stages.”

Physical and Virtual Barriers

As a company grows a strong effort should be made to secure the workplace and require all individuals to pass through a central access point, and have their identity and business known by a trusted company representative, like a security guard, or receptionist.

The premidedator of the building may be covered by video cameras, but viodeo cameras serve as apassive manner of security to document after the fact.

All premiditer doors should be locked at all times and a pass key system should be established, where as a badge is needed to access a secsitive area of the building. The uise of a badge is easy to deactivate once a visitor leaves or an employee is terminated. Simply printing a 8 x 11 sign stating “ all visitors must report to the front door is not sufficient security in a world where individuals with a confident smile, wave and a clipboard can get into any building on Earth. This was clearly illustrated by Kevin Mitnic, security consultant, author of “The Art of Intrusion” by Mitnick and Simon, March 2005 and the “Art of Secption.” in October 2002.

Anyone who has studied cybersecurity and PCI compliance, it is good to remember that basic cyber security guidelines and P.C.I. Compliance guidence run pararell and in concert to keep consumers safe.

Some basic workplace security measures that should be deployed:

A. All employees dealing with customer sensitive and personally identifiable information (P.I.I.) should be trained in cybersecurity, anti-fraud. It is not enough to have one person whom has access to the processing gateway to be trained. In many cases, especially when new employees are hired, it is likely that training is rushed and poorly presented by an individual whom is not a certified trainer. personally

B. When customers call in, under absolutely no circumstances should credit card numbers be written down on paper. Nor should any customer information be placed in a standard garbage can. It is amazing that some employers in call center environments have separate trash cans for “Food Only” but no burn or shred boxes to shred all customer information that may be printed or written down.

  1. Customers should be forced politely to confirm their address or qualifier. Customer Service Agents should not volunteer any information. The incorrect statement would be “You still live at 123 Main Street, in Amherst, right?” This is obviously an example. The correct way to do this is “ To protect your account, can you please verify your address, please?”

Internal Controls

Once a visitor enters a building their access to critical operational areas of the property should be controlled. The use of tensabarriors, a portable barrier to indicate areas that are off limits, restricting access to floors that do not pertain to general public should be deployed and doors to internet commerce areas and channel sales should be locked.

All appointments should be made in advance and confirmed, any deviation in person who visits verses who made the appointment should be recorded and logged for future use. If patterns begin to form, it may be worth review.

Employee supervision is not enough. Once employees enter a workplace that contains consumer information, they should be required to lock their eprsonal belongings in a locker for the duration of their shift, and do not bring jackets, coats or portable media and cellular phones into the work area. Computer screens can be photographed and emailed with ease and thumbdrives containing malicious programs can damage mission critical equipment.

USB drives can be deployed from doing everything from hacking a safe, according to an article by J.Kirk on PCWorld, to converting a drive and hijack internet traffic, as per another article by theconversation.com

IT Problems and Trends

Your CRM or Customer Relationship Management software runs, on your computers, including credit card processing, so when the pc slows down, or completely shuts down, reboots, it may be a good idea to take it seriously. This is because the calls will still continue, and force the pc operator to write down credit card numbers while the pc reboots. Not a great idea. It is important to keep track of these tickers or pc issues, to determine if there is a trend, if it is time to upgrade software. If there is a problem with your Microsoft group policies or Microsoft Active Directory, then that is a serious problem, incolving the administrative rights and security settings in the registery or server on the network. If PC issues are not being repaired, and security issues are not being addressed, it may be a good idea to reassess the decision to have some tenty-something manage your IT. Reason being a customer service representative is only as good and only as safe with customer data as his or her tools allow them to be.

Users should lock their screens before leaving their cubicles.

Supervisors should receive basic security training, otherwise all they are doing is watching events unfold, forming their own opinions based on bad information and being blissfully unaware of possible cyber issues.

Losses from Logistics

Once a sales is made the product actually has to get to the customer and this is an interesting area to study called supply chain management. Orders electronically go to the wearhouse where differently skilled workers work off of manafests and pick and pack the products, load trucks. Occasionally, sometimes more than should be allowed, shipping labels “fall off” packages, Fedex or UPS or USPS labels get destroyed so products can not be found, or traced. The adhesive on a Fedex label is very strong and it takes a lot of sharpt marker to obliterate a tracer, but if a package label gets damaged or “falls off” then each and every occurance should be tracked, managed and trends should be investigated. Any missing shipments should be followed through with the appropriate carrier, or freight company. If an insurance claim is filed, it would be best to make absolutely sure the product is missing, as insurance fraud is a serious matter.

Employee Theft
If the shipments are going missing because of employees stealing your stock and blaming logistics companies, it should be investigated and those involved should be prosecuted. The cost of no-cost orders to make good shipments that were not received by customers are only part of the cost involved. There are costs to your brand in referecne to the value of the brand in the eyes of the customer and takeholder.
Companies, especially ones that are growing need to take great pause and understand that their security policy needs to include, PCI Compliance, Cyber Security and Physical Asset security, to prevent loss.

Brian Scott Luke, holds a Masters in Business Administration, Finance and Accounting, B.S. in Communications and Business from Buffalo State and is a Certified Risk Management Consultant. Mr. Luke has been reporting on Cyber Security for approximately five years and has worked for corporate and utility help desks throughout Western New York.

Small Business are the first y line of Defense in Cyber Securit


NATIONAL: As we live in a society where ID theft, Credit Card scams and thievery occur on a daily basis, merchants are the first line of defense in securing a nation of consumers. Unfortunately some merchants take shortcuts and cheap fizes to save money. These shortcuts place consumers data at risk. Unfortunately the lax security of some allow criminals access. The employers are as guilty as the criminals in their complacently and professional indifference to security due to ignorance or greed. The hackers or criminals get the full brunet of blame, which is understandable, until the lax safeguards are exposed. Small businesses and family businesses  knowledgable abomay specialize in a certain product but not be able to analyse risk and understand risk. Someone may be making the best pizza, for example a family pizza place, but if that same family restaurant is tossing out their bank statements unshreaded, or repeating credit card numbers back over a phone where people can hear across a counter, things can happen. the fact of the matter is, with the economy the way it is more small busiensses will open, from UBER to Lyft to independent contractors we need to be cyber smart.

The Federal Bureau of Investigations has listed the crime of identity theft as a national security concern. What should should be done at the merchant level to ensure that they are a defender of customer service data as merchants are the first line of defense in the war against identity theft, some important issues are listed herein.

The Bureau states that “A stolen identity is a powerful cloak of anonymity for criminals and terrorists and a danger to national security and private citizens alike. For the FBI, identity theft is nothing new—we've been dealing with criminals faking IDs for decades, from check forgers to fugitives on the run. But the threat is more pervasive and the scams more sophisticated than ever, including online elements. The FBI uses both its criminal and cyber resources—along with its intelligence capabilities—to identify and stop crime groups in their early stages.”

Physical and Virtual Barriers

As a company grows a strong effort should be made to secure the workplace and require all individuals to pass through a central access point, and have their identity and business known by a trusted company representative, like a security guard, or receptionist.

The premidedator of the building may be covered by video cameras, but viodeo cameras serve as apassive manner of security to document after the fact.

All premiditer doors should be locked at all times and a pass key system should be established, where as a badge is needed to access a secsitive area of the building. The uise of a badge is easy to deactivate once a visitor leaves or an employee is terminated. Simply printing a 8 x 11 sign stating “ all visitors must report to the front door is not sufficient security in a world where individuals with a confident smile, wave and a clipboard can get into any building on Earth. This was clearly illustrated by Kevin Mitnic, security consultant, author of “The Art of Intrusion” by Mitnick and Simon, March 2005 and the “Art of Secption.” in October 2002.

Anyone who has studied cybersecurity and PCI compliance, it is good to remember that basic cyber security guidelines and P.C.I. Compliance guidence run pararell and in concert to keep consumers safe.

Some basic workplace security measures that should be deployed:

A. All employees dealing with customer sensitive and personally identifiable information (P.I.I.) should be trained in cybersecurity, anti-fraud. It is not enough to have one person whom has access to the processing gateway to be trained. In many cases, especially when new employees are hired, it is likely that training is rushed and poorly presented by an individual whom is not a certified trainer. personally

B. When customers call in, under absolutely no circumstances should credit card numbers be written down on paper. Nor should any customer information be placed in a standard garbage can. It is amazing that some employers in call center environments have separate trash cans for “Food Only” but no burn or shred boxes to shred all customer information that may be printed or written down.

  1. Customers should be forced politely to confirm their address or qualifier. Customer Service Agents should not volunteer any information. The incorrect statement would be “You still live at 123 Main Street, in Amherst, right?” This is obviously an example. The correct way to do this is “ To protect your account, can you please verify your address, please?”

Internal Controls

Once a visitor enters a building their access to critical operational areas of the property should be controlled. The use of tensabarriors, a portable barrier to indicate areas that are off limits, restricting access to floors that do not pertain to general public should be deployed and doors to internet commerce areas and channel sales should be locked.

All appointments should be made in advance and confirmed, any deviation in person who visits verses who made the appointment should be recorded and logged for future use. If patterns begin to form, it may be worth review.

Employee supervision is not enough. Once employees enter a workplace that contains consumer information, they should be required to lock their eprsonal belongings in a locker for the duration of their shift, and do not bring jackets, coats or portable media and cellular phones into the work area. Computer screens can be photographed and emailed with ease and thumbdrives containing malicious programs can damage mission critical equipment.

USB drives can be deployed from doing everything from hacking a safe, according to an article by J.Kirk on PCWorld, to converting a drive and hijack internet traffic, as per another article by theconversation.com

IT Problems and Trends

Your CRM or Customer Relationship Management software runs, on your computers, including credit card processing, so when the pc slows down, or completely shuts down, reboots, it may be a good idea to take it seriously. This is because the calls will still continue, and force the pc operator to write down credit card numbers while the pc reboots. Not a great idea. It is important to keep track of these tickers or pc issues, to determine if there is a trend, if it is time to upgrade software. If there is a problem with your Microsoft group policies or Microsoft Active Directory, then that is a serious problem, incolving the administrative rights and security settings in the registery or server on the network. If PC issues are not being repaired, and security issues are not being addressed, it may be a good idea to reassess the decision to have some tenty-something manage your IT. Reason being a customer service representative is only as good and only as safe with customer data as his or her tools allow them to be.

Users should lock their screens before leaving their cubicles.

Supervisors should receive basic security training, otherwise all they are doing is watching events unfold, forming their own opinions based on bad information and being blissfully unaware of possible cyber issues.

Losses from Logistics

Once a sales is made the product actually has to get to the customer and this is an interesting area to study called supply chain management. Orders electronically go to the wearhouse where differently skilled workers work off of manafests and pick and pack the products, load trucks. Occasionally, sometimes more than should be allowed, shipping labels “fall off” packages, Fedex or UPS or USPS labels get destroyed so products can not be found, or traced. The adhesive on a Fedex label is very strong and it takes a lot of sharpt marker to obliterate a tracer, but if a package label gets damaged or “falls off” then each and every occurance should be tracked, managed and trends should be investigated. Any missing shipments should be followed through with the appropriate carrier, or freight company. If an insurance claim is filed, it would be best to make absolutely sure the product is missing, as insurance fraud is a serious matter.

Employee Theft
If the shipments are going missing because of employees stealing your stock and blaming logistics companies, it should be investigated and those involved should be prosecuted. The cost of no-cost orders to make good shipments that were not received by customers are only part of the cost involved. There are costs to your brand in referecne to the value of the brand in the eyes of the customer and takeholder.
Companies, especially ones that are growing need to take great pause and understand that their security policy needs to include, PCI Compliance, Cyber Security and Physical Asset security, to prevent loss.

Brian Scott Luke, holds a Masters in Business Administration, Finance and Accounting, B.S. in Communications and Business from Buffalo State and is a Certified Risk Management Consultant. Mr. Luke has been reporting on Cyber Security for approximately five years and has worked for corporate and utility help desks throughout Western New York.

Buffalo Marathon: NFTA Schedule Changes

RE: Buffalo Marathon
SUNDAY, MAY 28, 2017
TO: ALL OPERATORS


Effective Sunday, May 28, 2017 at 4:30 AM until approximately 1:30 PM the following streets will be
closed: Niagara Square between Delaware between Eagle and Huron, Niagara between So. Elmwood
and Niagara Square; Perkins between So. Elmwood and Niagara Square; Niagara between Franklin and
Niagara Square; West Genesee between Franklin and Niagara Square; Mohawk between Franklin and
Elmwood, Jerge between Niagara Square and Elmwood.
NOTE: Amherst will be closed between Parkside and Starin. All other reroutes will
be as needed if the streets are blocked we will then use the appropriate reroutes.
When closed the following reroute will be as follows:
INBOUND
1,2,4 BUS LINES
REGULAR ROUTE to Broadway and Washington, right
Washington, left Huron, left Pearl, left Court and layover n/s of Main.
OUTBOUND
1,2,4 BUS LINES
LEAVE COURT N/S OF MAIN, five (5) minutes later than scheduled
leaving time from Busti and Carolina and then regular route.
INBOUND
3 –GRANT
REGULAR ROUTE to_Elmwood and Huron, continue South
Elmwood, right Church, left to 190 South, exit Elm, left Swan,
right Ellicott, continue to Ellicott Loop.
OUTBOUND
3 -GRANT
REGULAR ROUTE to_Church and Franklin, continue Church, right
190 North, exit Niagara, right Niagara, left Elmwood and continue
regular route.
INBOUND
6-SYCAMORE
REGULAR ROUTE to Washington and South Division, left South
Division, left into Ellicott Loop and layover.
OUTBOUND
6-SYCAMORE
LEAVE Ellicott Loop five (5) minute later than scheduled leaving
time from Waterfont Village, left North Division, right Ellicott and
continue regular route.
INBOUND
8-MAIN
REGULAR ROUTE TO Pearl and Church, left Church, continue
South Division, left into Ellicott Loop and layover.
OUTBOUND
8-MAIN
LEAVE Ellicott Loop five (5) minute later than scheduled leaving
time from Waterfont Village, left North Division, right Ellicott and
continue regular route.
INBOUND
11 - COLVIN
REGULAR ROUTE to Colvin and Hertel, right Hertel, left Delaware,
right Amherst, left Elmwood, continue South Elmwood, right Church,
left to 190 South, exit Elm, left Swan, right Ellicott, continue to Ellicott
Loop.
OUTBOUND
11 - COLVIN
REGULAR ROUTE to_Church and Franklin, continue Church, right
190 North, exit Niagara, right Niagara, left Elmwood, right Amherst,
left Delaware, right Hertel, left Colvin and continue regular route.
NOTICE
Buffalo Marathon
Page Two
INBOUND
25 - DELAWARE
REGULAR ROUTE to Delaware and Amherst, right Amherst, left
Elmwood, continue south Elmwood, right Church, left to 190 South,
exit Elm, left Swan, right Ellicott, continue to Ellicott Loop.
OUTBOUND
25 – DELAWARE
REGULAR ROUTE to_Church and Franklin, continue Church, right
190 North, exit Niagara, right Niagara, left Elmwood, right Amherst,
left Delaware and continue regular route.
INBOUND
14 & 16 BUS LINES
REGULAR REROUTE AND THEN CONTINUE REGULAR ROUTE.
OUTBOUND
14 & 16 BUS LINES
REGULAR ROUTE to Washington and South Division, left South
Division, right Michigan and continue regular route.
INBOUND
20-ELMWOOD
REGULAR ROUTE to_Elmwood and Huron, continue South
Elmwood, right Church, left to 190 South, exit Elm, left Swan,
right Ellicott, continue to Ellicott Loop
OUTBOUND
20-ELMWOOD
REGULAR ROUTE to_Church and Franklin, continue Church, right
190 North, exit Niagara, right Niagara, left Elmwood and continue
regular route.
INBOUND
5 & 40 BUS LINES
REGULAR ROUTE between the hours of 7:30 a.m. and 9:00 a.m.
Police will let through when there are breaks.
OUTBOUND
5 & 40 BUS LINES
REGULAR ROUTE between the hours of 7:30 a.m. and 9:00 a.m.
Police will let buses through when there are breaks.
INBOUND
22-SUMMER/BEST
REGULAR ROUTE to Main and Best, right Main, left Utica, left
Elmwood, right Allen, continue Wadsworth, left Pennsylvania, and
layover along-side Kleinhans.
OUTBOUND
22-SUMMER/BEST
Leave Kleinhans five (5) minutes after the scheduled leaving
time, via Pennsylvania, left West, left Hudson, right Wadsworth,
continue Allen, left Elmwood, right Utica, right Main, left Best and
continue regular route.
INBOUND
32-AMHERST
REGULAR ROUTE to Amherst and Parker, right Parker, left Hertel,
left Delaware, right Amherst and continue regular route
OUTBOUND
32-AMHERST
REGULAR ROUTE to Amherst and Delaware, left Delaware, right
Hertel, right Parker, left Amherst and continue regular route

Tuesday, May 23, 2017

Press Release - Injury Accident on Nash Rd, Town of Wheatfield


Wheatfield, NY - On Wednesday May 10, 2017, at approximately 1100 hours, Niagara County Communications received several 911 calls reporting an injury accident on Nash Road in the Town of Wheatfield involving a school bus and another vehicle. Patrol units responded and found the bus on the west shoulder, and the other vehicle in a driveway on Nash Road. The investigation reveals that a northbound vehicle slowly started to drift into the southbound lane, sideswiping the school bus. The vehicle, driven by Donald McGuire Jr, 36, from Ransomville, continued northbound striking a Verizon pole and then coming to rest in a driveway just north of the pole and against a fence. McGuire was transported by ambulance to Mount St Mary's Hospital for treatment of a non-life threatening injury. Five students on the bus were also injured, with two being transported by ambulance to DeGraff Hospital for treatment, and three being transported by private vehicle.  The driver of the bus, John Rusac, 55, from Tonawanda, as well as the remaining 20 students, were uninjured.
 The school bus had students from the North Tonawanda School District onboard and were en route back to the North Tonawanda High School from Orleans/Niagara BOCES.
 McGuire was charged with Unlawful Possession of Marijuana and several Vehicle and Traffic violations. He is due in Town of Wheatfield court on June 14 at 1330 hrs, with other charges pending.

Breaking: MI5 Director General Makes statement on Terrirust Attack



Everyone at MI5 is revolted by the disgusting terrorist attack in Manchester last night. Our hearts go out to the families of the victims, the injured and everyone affected by it.

Our teams have been working with the police through the night to assist the investigation. We remain relentlessly focused, in numerous current operations, on doing all we can to combat the scourge of terrorism and keep the country safe.


Andrew Parker
23 May 2017

Press Release - Injury Accident on Nash Rd, Town of Wheatfield


Wheatfield, NY - On Wednesday May 10, 2017, at approximately 1100 hours, Niagara County Communications received several 911 calls reporting an injury accident on Nash Road in the Town of Wheatfield involving a school bus and another vehicle. Patrol units responded and found the bus on the west shoulder, and the other vehicle in a driveway on Nash Road. The investigation reveals that a northbound vehicle slowly started to drift into the southbound lane, sideswiping the school bus. The vehicle, driven by Donald McGuire Jr, 36, from Ransomville, continued northbound striking a Verizon pole and then coming to rest in a driveway just north of the pole and against a fence. McGuire was transported by ambulance to Mount St Mary's Hospital for treatment of a non-life threatening injury. Five students on the bus were also injured, with two being transported by ambulance to DeGraff Hospital for treatment, and three being transported by private vehicle.  The driver of the bus, John Rusac, 55, from Tonawanda, as well as the remaining 20 students, were uninjured.
 The school bus had students from the North Tonawanda School District onboard and were en route back to the North Tonawanda High School from Orleans/Niagara BOCES.
 McGuire was charged with Unlawful Possession of Marijuana and several Vehicle and Traffic violations. He is due in Town of Wheatfield court on June 14 at 1330 hrs, with other charges pending.

Update: Attempt to Locate Runaway Dylan O'Hara has been located.

Niagara County Sheriff's Department announces that runaway O'Hara has been located.

\

Niagara County Sheriff Cites Welfare Claiments



Sheriff James R. Voutour announces the arrests of the following individuals on welfare fraud related charges in the City of Niagara Falls this week:

Cheryl Ninham, 55, of Niagara Falls, was charged with ten counts of Offering a False Instrument for Filing 1st degree and Grand Larceny 4th degree. Ninham has a return court date of June 7, 2017 at 9:30 a.m.in Lockport City Court.

Alan Grounds, 55, of Niagara Falls, was charged with three counts of Offering a False Instrument for Filing 1st degree and Grand Larceny 4th degree. Grounds has a return court date of June 7, 2017 at 9:30 a.m. in Lockport City Court.

Jennie Hauck, 52, of Niagara Falls was charged with Grand Larceny 4th degree and Offering a False Instrument for Filing 1st degree. Hauck has a return court date of June 14, 2017 at 9:30 a.m.in Lockport City Court.

All three defendants were released on appearance tickets.

Niagara County Sheriff's Requesting Information: Missing Person

NCSD Photo / Missing Person

Request for assistance in locating Tamiyah Penn

Date of Birth:  11/21/2004
Race: Black
Gender:  Female
Height:  5’2’’
Weight:  130lbs
Hair Color:  Black
Eye Color:  Brown
      Last seen wearing:  Unknown

Activity Summary:
On 5/17/2017 Tamiyah Penn was reported missing from the Town of Lockport.  If you have information regrading Tamiyah’s whereabouts please contact the Niagara County Sheriff’s Office Dispatch at 438-3393 (24hours) or Criminal Investigation Bureau at 438-3327 (during normal business hours).

Niagara County Sheriff's Department Seeks Missing


                               Request for assistance in locating Erika Burr

Date of Birth:  04/16/2001
Race: White
Gender:  Female
Height:  5’1’’
Weight:  105lbs
Hair Color:  Blond
Eye Color:  Hazel
      Last seen wearing:  Unknown

Activity Summary:
On 05/17/2017 Erika Burr was reported missing from 6395 Old Niagara Road Lockport.  If you have information regarding Erika’s whereabouts please contact the Niagara County Sheriff’s Office at 438-3393 (24hours) or during normal business hours the Criminal Investigation Bureau at 438-3327.

Niagara County Sheriff Announces Attempted Burflary SuspectGeneric

Generic Picture
Sheriff James R. Voutour announces the arrest of Hugh R. Jackson, 61, of Gasport on charges of attempted burglary in the second degree, possession of burglar's tools, criminal mischief in the fourth degree, criminal possession of a controlled substance in the seventh degree and possession of marihuana. Jackson attempted to force entry into a residence on Locust Street when he was observed by the homeowner. The homeowner called 911 as Jackson fled the scene on a bicycle. Multiple Niagara County Sheriff and State Police patrols were dispatched. The suspect's bicycle was located in the 6300 block of Hamm Road and a track was immediately started by Lieutenant James Hildreth and K9 Taz. K9 Taz tracked Jackson to an area of a nearby bike path approximately 700 yards behind George Southard School where Lt. Hildreth and Deputy Joseph Shanley took Jackson into custody. Jackson was arraigned in front of Justice Tilney in a Town of Lockport Court. Jackson was held without bail until his next court date of May 25th 2017 at 1:00 pm in Town of Lockport Court.

Saturday, April 29, 2017

ROCHESTER MAN PLEADS GUILTY TO ARMED COCAINE TRAFFICKING

ROCHESTER, N.Y.-Acting U.S. Attorney James P. Kennedy, Jr. announced today
that Michael Oliver, 26, of Rochester, NY, pleaded guilty to possession with intent to
distribute cocaine and carrying a firearm during a drug trafficking crime, before U.S. District
Judge Charles J. Siragusa. The charges carry a mandatory minimum penalty of five years in
prison, a maximum of life, a fine of $1,000,000, or both.
Assistant U.S. Attorney Charles E. Moynihan, who is handling the case, stated that
on September 18, 2016, a Rochester Police Department officer was on patrol in the Joseph
Avenue area in Rochester. The officer saw a 2014 Ford Focus almost strike someone on a
bicycle when it was turning right onto William Warfield Drive. A records check revealed that
the vehicle had been reported stolen. 
A short while later, the officer approached the parked car which was still running.
Oliver was in the driver’s seat. As he approached the driver’s side door, the officer could smell
burnt marijuana. He asked Oliver about the smell and the defendant motioned to a burnt
marijuana cigarette located in the center console. The officer then instructed Oliver to get out
of the car, which he did. Once out of the car, the officer placed the defendant in handcuffs
and then lifted Oliver’s shirt and found a loaded handgun hanging out of his right pants
pocket. A search of Oliver’s car recovered 13 individual glassine bags of cocaine. 
The plea is the result of an investigation by the Rochester Police Department, under
the direction of Chief Michael Ciminelli, and the Bureau of Alcohol, Tobacco, Firearms, and
Explosives, under the direction of Special Agent-in-Charge Ashan Benedict.
Sentencing is scheduled for July 11, 2017, at 10:00 a.m. before Judge Siragusa.

ROCHESTER DRUG DEALER SENTENCED FOR HIS ROLE IN THREE MURDERS

ROCHESTER, N.Y.—Acting U.S. Attorney James P. Kennedy, Jr. announced today that Pablo "Paul" Plaza, who was convicted by a federal jury of the murder of Francisco Santos, conspiracy to possess with intent to distribute and to distribute large quantities of illegal narcotics, and possession and discharge of a firearm in furtherance of the drug conspiracy, was sentenced to life in prison plus 10 years by Chief U.S. District Judge Frank P. Geraci, Jr.
 
Acting U.S. Attorney Kennedy, crediting his trial team of AUSAs Rodriguez and Marangola and the ATF Agents and RPD Officers who worked tirelessly to put this case together, noted that “although justice was a long-time coming in this case, it is fitting that, in the end, it was delivered with a measure of permanence.”
 
ATF Special Agent in Charge Ashan M. Benedict said, “The sentencing of Pablo Paul Plaza to life imprisonment plus 10 years for his role in three murders while engaged in a drug trafficking conspiracy demonstrates that though justice may at times be delayed, it will not be denied. The passage of time will not lessen the resolve of ATF and our law enforcement partners to ensure that violent criminals meet their inevitable fate of a cell in a State or Federal penitentiary. It is our sincerest hope that Plaza’s sentencing, and the expected sentencings of his co-conspirators, brings some solace and closure to Ms. Harmon’s family, and the families of the other victims of this violent organization.”
 
Assistant U.S. Attorneys Everardo A. Rodriguez and Melissa M. Marangola, who handled the prosecution of the case, stated that Plaza and his brother James Kendrick spearheaded a long term, violent narcotics trafficking ring in the City of Rochester between 1993 through and including March 2011. To protect the conspiracy and its members from other drug dealers and those deemed to be disloyal workers, Plaza, Kendrick, and others in the conspiracy resorted to violence including beatings and murder.  
 
Specifically, Francisco Santos, a/k/a “Cisco,” was murdered in October 1998. Santos’ body was found in May 1999 buried on the Cattaraugus Indian Reservation in Erie County, NY. Santos was a worker for Plaza and Kendrick and was murdered because the defendants believed he betrayed the organization by stealing drugs, cash and guns. Plaza and Kendrick initially retaliated by conducting a drive-by shooting at the residence of Santos’ father, step-mother and sisters, who were four and six years old at the time.
 
During the trial, the Government presented evidence of additional acts of violence including the murder of Jose Troche on January 14, 2010. The Government’s proof established that Plaza and Kendrick planned and executed the murder of Troche because they feared that Troche, also a member of the conspiracy, was planning to cooperate in the prosecution of the defendants. In connection with the Troche murder, Plaza and Kendrick decided that Kendrick, in an effort to fabricate an alibi, would go to a local supermarket and be seen on camera at the time of Troche’s murder. 
 
In addition, the Government presented evidence that Plaza directed co-conspirators Damion Colabatistto, Angelo Ocasio and others to murder a rival drug dealer who injured Plaza in a fight. Colabatistto and Ocasio went to 137 Cameron Street looking for the rival drug dealer. When they arrived at the house, the two men shot and killed Meosha Harmon, erroneously believing her to be the rival drug dealer, when she came to the upstairs window of the residence. Colabatistto and Ocasio were tried in separate trials and both were convicted for their roles in the conspiracy and murder of Harmon and are awaiting sentencing.
 
James Kendrick was also convicted of drug conspiracy and the murders of Francisco Santos and of Ryan Cooper. Nine other defendants involved in the drug conspiracy were charged and convicted of various drug and firearms offenses and of other violent crimes.  Plaza’s younger brother, also named Pablo, was previously convicted of participating in the murder of Francisco Santos.
 
The sentencing of Pablo “Paul” Plaza is the result of a joint investigation consisting of the Federal Bureau of Alcohol, Tobacco, Firearms and Explosives, under the direction of Ashan Benedict, Special Agent-in-Charge, New York Field Division, and the Rochester Police Department, Violent Crime Team/Firearms Suppression Unit, under the direction of Chief Michael Ciminelli. 

Advertiser

NETC LRC News and Information

Advertiser

Technology Headlines

The TSA Blog

FEMA Blog

White House.gov Video Feed

NYSDOT Recent Press Releases

Indian Point Press Releases

Indian Point Nuclear Power Plant EAS Messages

Indian Point Nuclear Power Plant

New York State-Wide RSS

Department of Homeland Security News

Department of Homeland Security Podcasts

Erie County RSS Feed

Erie County Emergency Management

The Weather Channel: Your Local Weather Outlook--Niagara Falls, NY (14304)

FEMA: New York Federal Disaster Declarations

Niagara County RSS Feed

National Weather Service

Albany County RSS Feed

Allegany County RSS Feed

Bronx County RSS Feed

Broome County RSS Feed

Cattaraugus County RSS Feed

Chemung County RSS Feed

Cayuga County RSS Feed

Ontario County RSS Feed

Warren County RSS Feed

City of Toronto News Releases

US Consumer Product Safety Commission - Recent Recalls and Product Safety News

Center for Missing & Exploited Children: NY Missing

Lead Photos - U.S. Dept. of Defense

CBP.gov: Alert - Maritime - Gulf of Mexico Oil Spill

Contract - U.S. Dept. of Defense

Speech - U.S. Dept. of Defense

Transcript - U.S. Dept. of Defense

The Grill Sergeants

FBI Extra

NASA Breaking News

NASA Ames Research Center News and Features

NASACast Video

USGS Earthquake ShakeMaps

City of Toronto news releases, Emergency Medical Services

City of Toronto news releases, Fire Services

Speeches

Advertiser

City of Toronto news releases, Fire Services

Visitor Snapshot

Royalty Free Music.com News

RoyaltyFreeMusic.com Music Reviews

Automobile RSS Feed

Speed and Accuracy Statement

The information you find here is in the form of raw data, usually delivered via RSS feeds. The information is delivered via website in the most rapid manner possible. Usually this is the manner of delivery of information to media. Therefore, this service gets the audience information to the public more rapidly then any media outlet that has to re-write the information for their email club or SMS feeds.

In some cases, cases, from time to time, updates and correctons are offered by the authors of this information, Motioncenter.info is not responisble for the content of RSS feeds, press releases, or any other content. The content of the information presented is the responsiblity of the producer of the content.

There are many reasons for presenting the information as the page does. The public really never has had a view of the raw data before now. Most cases we see news packaged, polished and prioritized. This blog network offers a wide audience a variety of news, some of it is produced by Motioncenter and some by the government or other sources.

Read what you like, ignore what doesn't interest you, but at least Motioncenter doesn;t tell you what the news is, you choose.

Material Connection Disclosure

You should assume that the owner of this website has an affiliate relationship and/or another material connection to the providers of goods and services mentioned on this site and may be compensated when you purchase from a provider. You should always perform due diligence before buying goods or services from anyone via the internet or offline. THIS IS A BLOG. A NON-COMMERCIAL WEBPAGE At no time does commerce transact on this site. If it had then it would require a Secure Sockets Layer certificate and a merchant account. Being a non-commercial site there are some licensing privledges that this site will participate in. Mystuffnow is an online radio station broadcasting twenty four hours daily. This station can be bet described as a hybrid format of adult contemporary, international and ad popular music. In a sense it may, be compared to compared random radio format, but mystuffnow has three dedicated day parts. These day parts include a morning, evening and overnight separate music selection. The morning and afternoon have a selection of classic rock and current hot hits. To make the station more unique a new track, or tracks from the overnight day part have been added to make the station stand out from traditional stations that broadcast locally. The overnight day part is called “After Hours” and mimics the general principals of a quiet storm programming style where as there are fewer commercials and the music is more adult in nature, not just in lyrics but the music is more unique, offering international and slower tracks. This is meant for relaxation or whatever you may be doing in the late night hours. This station is run by computerized traffic software. At any moment a live deejay can broadcast and a morning show or news programming is possible, all playlists are run automatically. One positive of this is the fact that the software ensures that all artists get paid their royalties and this station avoids any fines for digital media issues. Update: Mystuffnow is currently off the air.

No Endorsement Statement

No endorsement is implied nor should it be inferred. No government agency, or organization has endorsed Motioncenter.Info. Motioncenter.info is a media organization with a mission of offering unbiased information as it becomes available, without any form of bias.

Privacy Policy

This is a website run by Group Speeddog Results Marketing, L.L.C... We take our readers privacy very seriously. Promotions through Third Party Merchants While this site is not endorsed or owned by any of the third party merchants appearing on this site, this site may at times receive various types of compensation when a viewer makes a purchase or clicks on a link appearing on this site. This site is not responsible for any claims or warranties associated with any third-party merchant link or website. This site does not directly collect any information regarding its viewers without your prior knowledge and permission; nor does it share their information with third-party vendors or merchants . It is not now, nor ever will be, our practice to sell your information to any third-party under any circumstance. We use third-party advertising companies to serve ads when you visit our website. These companies may use information (not including your name, address, email address, or telephone number) about your visits to this and other websites in order to provide advertisements about goods and services of interest to you. Google Advertising Cookie and Privacy Policies What is the DoubleClick DART cookie? The DoubleClick DART cookie is used by Google in the ads served on the websites of its partners, such as websites displaying AdSense ads or participating in Google certified ad networks. When users visit a partner’s website and either view or click on an ad, a cookie may be dropped on that end user’s browser. The data gathered from these cookies will be used to help better serve and manage ads on the publisher’s site(s) and across the web. *Google, as a third party vendor, uses cookies to serve ads on your site. *Google’s use of the DART cookie enables it and its partners to serve ads to your users based on their visit to your sites and/or other sites on the Internet. *Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy.