School Disaster Plan
Connectivity and telecommunications will breakdown.
SECURITY - ARE YOUR PUBLIC SCHOOLS PREPARED?
THE MAIN PROBLEM
You can't prevent disaster, you can only prepare for it and mange it when and after it happens. It will happen. The only secure computer is a dead computer. The only secure community in a hurricane zone is a dead community.
I've tried over and over to through the years to promote the integration of technology into the K12 classroom with Educational Tech folks the importance of having someone in every high school who gets their license and can operate a ham radio during disasters. No one listens!!!! and I'm disgusted.
#STEM Middle School and High school projects with Technology.
#STEM #SECURITY#edtech #edchat #edutech #edtechchat
WHEN CELL PHONES FAIL:
As you know in a true emergency when your cell phone doesn't work and there is no electricity you won't be able to charge your phone or use your computer or watch TV.
EVERY SCHOOL ADMINISTRATOR IN EVERY STATE SHOULD REQUIRE
THE SCHOOL COMPUTER LABS ARE FILLED WITH
MICROSOFT & APPLE
COMPUTERS WHICH WON'T WORK !!
DOES YOUR SCHOOL OWN A
HAM RADIO THAT WILL WORK?
NO? ... WHY NOT?
BECAUSE YOU CAN'T BUY ONE!!
DO YOU KNOW HOW TO OPERATE A HAM RADIO?
CIVIL DEFENSE SCIENCE CURRCULUM
LEARN THE ELEMENTS AND THE PERIODIC TABLE
There have been School Disasters that devastated whole school districts because they don't have a plan.
If you are a government agency or nonprofit community service: (local, state, or federal) You CAN send emergency notification broadcasts on the Emergency Email Network to citizens in your area.
Almost every cell phone available today is able to send and receive SMS text messages. SMS infrastructure generally holds up better in times of crisis than email, and it automatically appears on your phone's screen when you receive one.
ANYONE CAN GET THESE MESSAGES
NIST SECURITY CONFIGURATION CHECK LIST
THREAT ASSESSMENT IN SCHOOLS: over 70 pages A GUIDE TO MANAGING THREATENING SITUATIONS AND TO CREATING SAFE SCHOOL CLIMATES UNITED STATES SECRET SERVICE AND UNITED STATES DEPARTMENT OF EDUCATION
This was done when ROD PAGE was the Secretary of Education! May 2002 revised in 2004
This document only mentions the telephone 1x on pg 73 and doesn't speak to cell phone use at all.
pg 73 Implementing a Threat Assessment Program:
1. A principal, superintendent, school board member, or other school official initiates a request to develop a process to evaluate and respond to threatening situations. The request is forwarded to the school board or other responsible oversight entity for policy approval. Threatening situations might include: threats made directly against students, teachers, or other school officials; threats made indirectly by telephone, in writing, over the Internet, or through interpersonal contacts; communications or behaviors suggesting a student’s intent to mount an attack at school; and allegations of bombmaking or that a student possesses a firearm.
All Johnston Schools to be Closed Tuesday after students and parents received anonymous messages “threatening the safety and security” of students. Police: Johnston School Text Threats ‘Not Credible’ The Johnston Police Department is working with the FBI to further investigate the threats but have not determined their source at this point. Chief Dennis McDaniel says people can expect more threatening texts and phone calls however he says they will likely be from a different phone number.
“It’s very complex how all these things interact, and attackers use that complexity to their benefit,” says Iowa State University cyber security expert Doug Jacobson. Jacobson says there are countless ways to a person can hide a cell phone number, including through social media apps. ~ Google “There's apps you can get for your phone where you can get a second number for a week or two to send text messages off of a second number.” Digital detectives say it isn't as easy as tracing a number back to its account holder. In many cases, those tracks are covered. It takes the help federal mobile forensics to comb through data, but even then, it's not always successful “It's very difficult and may be impossible to track this person down, depending on what technologies they used.” example Unlimited Virtual Phone Numbers and google free disposable phone number.
Countywide Law enforcement Alerting and Safety System (CLASS)
Montgomery County PA - installed the Countywide Law enforcement Alerting and Safety System (CLASS) in schools. Wireless silent alarm "panic buttons" alert police. It is possible for dispatchers to upload specific school floor-plans to responding officers on their car laptops. Principals can wear wireless transmitters. This will not require the signal be received by as private alarm company. It cost 1 million.
How Much Time Do We Have??
(Disaster on a Big Scale): 
How much time do we have, minutes, days, months, years? We don't know. But this we do know – Civil Defense is everybody's business! It's a big job, getting Civil Defense organized to operate efficiently, but then, atomic attack is disaster on a big scale. We can and must get the job done if we are to survive! Just imagine if only one atom bomb were to be dropped on an American city, say it's your city. Thousands of persons would be killed instantly! Many would be trapped or buried in wreckage. Streets would be blocked by rubble. Great fires would start, dozens of fires in a matter of minutes in many places at once. Then too, a large part of the city's food supply might be knocked out. The water supply might be cut off. Normal communications might stop; certainly transportation would. How much time do we have to prepare? We don' know. But this we do know! Civil Defense is everybody's business! It's your business!
BERT THE TURTLE
"DUCK AND COVER"
"Civil Defense for Schools"
Alerted Not Alarmed: 1951
Film star Mia Farrow
7-year-old Maria de Lourdes (as Mia was known at the time), participated, along with her siblings, in an astoundingly well covered Cold War media stunt that was a certifiable stroke of PR genius on the part of Archer Productions, the company that produced
DUCK AND COVER  a 1950's civil defense film starring Bert the Turtle written by Ray J. Mauer. Bert the Turtle, the animated star of the first civil defense film produced for children by for the U.S. government AND THE National Education Association.
RAY: "Seems to me there were about 50 reps from the NEA — teachers throughout the country who came and filled us in with the information that was very important because I didn't know anything about school kids anymore. I participated both days, but had nothing to do with organizing the meeting. It took place in a sizeable hall, with the Civil Defense people and us (Langlois and Mauer) seated facing the educational group.
CONELRAD: Did the teachers seem to appreciate what was being done?
RAY:They seemed quite pleased that we were interested in getting their ideas and getting things right.
CONELRAD:The working title for DUCK AND COVER was "Civil Defense for Schools" correct?
RAY: Those titles were given to us by the government. Those were the working titles. DUCK AND COVER was our concept, I mean we got it from the teacher (Helen Seth-Smith of The Potomac School). Because one group in particular said that's what they called doing the exercise. You know, the kids dove under their desk and what not. One of the women (Seth-Smith) called it "Duck and Cover" so it sounded good. And I thought that's as good as anything.
CONELRAD: Do you recall what the government's reaction was to DUCK AND COVER when it was submitted?
RAY: Only in a very general way. They were very pleased with it. They should have been. It didn't cost them anything and it was a damn sight better than any other films in that series. And it was better than the other one we had done by far (OUR CITIES MUST FIGHT)
CONELRAD: When you were bidding on the opportunity to produce the civil defense films did you take OUR CITIES MUST FIGHT by default?
RAY: I think we took the clunker in order to get "Civil Defense for Schools" (the working title for DUCK AND COVER). We worked harder than hell on the other one, but it never came to life.
CELL PHONE USED TO SCARE A SCHOOL
Cyber Security Expert: ‘May be Difficult or Impossible to Track Down Johnston Threat Maker’
DES MOINES, Iowa -- Johnston police have not directly blamed a cyber security breach for Monday night's text threat, but the search for whoever gained access to the school district's personal information won't be easy. “It’s very complex how all these things interact, and attackers use that complexity to their benefit,” says Iowa State University cyber security expert Doug Jacobson. Jacobson says there are countless ways to a person can hide a cell phone number, including through social media apps. “There's apps you can get for your phone where you can get a second number for a week or two to send text messages off of a second number.” Digital detectives say it isn't as easy as tracing a number back to its account holder. In many cases, those tracks are covered. It takes the help federal mobile forensics to comb through data, but even then, it's not always successful “It's very difficult and may be impossible to track this person down, depending on what technologies they used.” Jacobson says it doesn't take a genius to gain sensitive information, thanks to internet tutorials. He says as cyber security continues to be stretched to its limits, local police departments are struggling keep up. Experts remind online and mobile users anything they submit or post could be used against them. "Anything online, assume it can be shared with pretty much anybody."
Number spoofing. When speaking of telephony, the term ‘spoofing’ is generally used to describe the act of hiding a real number with a fake one on caller ID. Number spoofing can be easily achieved, and because caller ID technology has been around for a long time, with no real way to secure it,
- Android burner Burner, The One-Click Disposable Phone Number App, Comes To Android
- Covert Calling
- The 67 Vertical Service code masks your number so that the recipient of your call sees your number as either “Blocked,” “Unavailable,” or “Private.” You can use the 67 code by simply dialing the numbers 67 right before your recipient’s phone number. For instance, if you are calling the number 555-433-4343 and wish to keep your number hidden, you would dial 675554334343. Some government agencies, like law enforcement offices and 911 services, will be able to find your cell phone number even if you dial *67. Do not attempt to disguise your cell phone number when calling these agencies.
- Telephone harassment laws forbid disguising your cell phone number when making annoying or nuisance telephone calls. If you disguise your cell phone number, even through a proxy service, you may be subject to civil and criminal penalties if you make unwanted, obscene, harassing or nuisance telephone calls.
- SpoofCard, which allows you to mask both your phone number and your voice.
PUBLIC SERVICE ANNOUNCEMENTS (PSAs) SCARING US FOREVER!!
Hundreds of 30-to-60 second "atomic safety" PSAs were produced and aired during the Cold War (thousands if you count the Emergency Broadcast System test announcements). These audio postcards from another era are fascinating reminders of how seriously the subject of survival was taken. This subgenre is also notable for the number of celebrities who pitched in for the cause of survival. Examples include the intentionally humorous Psychiatrist (Shelter Signs) and the unintentionally hilarious Excellent Chances with announcer Groucho Marx. Sometimes, as in the case of the long running civil defense radio program, Stars for Defense STARS FOR DEFENSE, such PSAs were folded into the content of a show—not unlike the once common practice of broadcasters doing on-set commercials for various products.