www.1001TopWords.com |
Handling Weather Emergencies: Part 1 - Forward Planning Makes The Difference
Introduction At some time in our lives, many of us will face an emergency. Most will involve personal illness or injury, but severe weather, including hurricanes, thunderstorms, tornadoes and heat waves, is a very common threat. Severe weather and its after effects, such as flooding, results in numerous deaths and injuries every year, together with major property damage and loss. But we are not entirely powerless in the face of these disasters - a little time and effort now will significantly reduce the risks of death, injury and property damage. It will also help you recover much faster. Planning for emergencies is complex subject, too big for a single article. Part 1 covers identification of the threats to you and your family, how to make sure your safety is protected, and making sure everyone knows what to do, even if you are separated. The second part considers those precious few hours before the the weather becomes really threatening. Preparation is crucial to make sure your family is safe, and your home and belongings are as secure as possible. Advance Planning - It's A Drag But It Pays Off One of the hardest things about preparing for emergencies is finding the time. But if you live in North America, your weather is arguably the wildest on the planet. Your chances of being threatened by severe weather are very real. So at some stage (soon!) why not set aside an hour or so to do a little groundwork and prepare for when things get nasty. Involve your family - the more heads the better, and it is possible that one of you may be incapacitated in a serious emergency. Four big questions need to be answered before you can regard yourself as reasonably well prepared. What Are The Biggest Risks? This sounds pretty easy, because you know where you live, and what sort of weather to expect as the seasons change. But when you get down to it, severe weather is often just normal weather become stronger, or bigger, or longer lasting. When considering your home, a great shortcut is to contact your local emergency management office or the Red Cross to see what information they have on your area. You should be able to find FEMA (Federal Emergency Management Agency) hazard maps and other relevant material to help with your planning. It's also worth thinking about other places you regularly visit - the beach, the lake, relatives - and even where you go on vacation. Shelter and Evacuation Most severe weather emergencies arrive without much warning. You may need to leave your home and move to a safer area. Early warning and sound planning will reduce the stress of any emergency, and the first step is to be well informed. And there is no better way than to use the Weather Radio Service provided by NOAA (National Oceanic and Atmospheric Administration) and the EAS (Emergency Alert Service). Advisories of threats and hazards are broadcast over dedicated radio frequencies (to avoid interference from commercial broadcasts) and can be received on specially modified weather radios. More information on the Weather Radio Service and equipment can be found at http://www.home-weather-stations-guide.com/weather-radio.html Evacuations can be a matter of choice or they may be mandatory. Becoming familiar with exit routes will reduce much of the stress of having to move out fast. In some cases, such as tornadoes, you may need to use a nearby shelter. Again prior knowledge of its location and easiest access will be invaluable. Communication Between Family Members Emergencies often happen at the most inconvenient times. Your family may be scattered between home, work and school when the weather becomes threatening, and you may remain separated for some time until things return to normal. Work out in advance what procedures are likely to be followed - does the school have an emergency plan and shelter? How about the work place? It will help if each family member knows what to do, and what others will be doing and where they are likely to be during an emergency. Prepare wallet sized summaries of locations and phone numbers for each family member, while cell phones should help you to keep in touch. Long Term Plans So far everything I've suggested assumes that you will, some day, need to act fast to protect yourself against a developing emergency. This section covers preparations which should benefit you regardless of whether an emergency arises. These include
OK. Now you're prepared for the worst, and you have significantly reduced the effects a major emergency will have on you. Part 2 of this article reviews what to do as the weather becomes threatening. ©2005, Graham McClung. This article is adapted from a free special report on weather emergencies. It can be downloaded from http://www.home-weather-stations-guide.com/tyvm.html While you're there, check out the rest of the site for more information on dangerous and spectacular weather.
|
RELATED ARTICLES
Alarm Systems & Automobile Tires? What do alarm systems and automobile tires have in common? This may sound like a strange question to the untrained ear, but lend me yours and I will make sense of it. Is Big Brother Watching You? Or Are You Watching Big Brother? Isn't technology a wonderful thing? I thought this as I received the text to my mobile phone telling me that my home security camera had detected movement. Someone or something was where they shouldn't be at the rear of my house and I was 2000 miles away on vacation ? yet I still knew they were there. Fortunately the text wasn't followed up by another from one of the sensors on my windows telling me that someone was breaking in and it was urgent I did something about it. How to Buy a Safe for Your Home The first step is to determine who or where you will buy your safe from. There are many places to buy a safe today, you can buy from a "big box store", an office supply store, a furniture store, a hardware store, online, or even from a professional safe retailer or locksmith. Who Abducted the Missing Child? What is going on with these people who feel they can walk onto your property or in front of your home and abduct your child? If those parents had installed a hidden camera in their home, the police could use the recordings from the camera and have a quick lead to find the child and return them safely. Being prepared for the unthinkable act of your child being abducted by installing hidden cameras is much better than wishing later you had installed cameras! Alarm System: Glass Break Detectors Alarm System Glass-break detectors- Glass-break detectors are also known as "Audio Discriminators".They are a perimeter device because they catch a burglar attempting to make entry into your home or business as opposed to walking around the interior and being picked up by a motion detector. They are available in both hardwired and wireless versions. The detector mounts in a wall or ceiling and listens to an area approximately 35 feet in all directions. They do not hear through walls or around corners or into a room because the door is open. The more windows you have in a device's area of protection, the better the value. Some examples of good coverage are as follows. How to Keep Your Postal Mail Private and Secure Surreptious opening of most envelopes sent through the mail takeslittle effort and only minimal skill. Instructions are readily available on the Internet and in books suc as "CIA Flaps and Seals Manual"(Paladin Press). Protect Your Family From Solar Flares Protect your family from solar flares. Solar flares emit dangerous gamma radiation, which affects everything from gravity waves to the Earth's tectonic system. These solar flares are dangerous to human life. The Gamma Radiation is dangerous to the human bio system. Many severe solar flares can cause cancer and It heats up the atmosphere and can drastically change weather patterns too. We have had some serious solar flares in the last few years, which have affected our lives. Some say that Earthquakes are in part due to the disruption of the natural electromagnetic distribution of the Earth along with causing disruptions in gravity waves. Avoiding Pickpockets Every year, thousands of senior citizens fall prey to the quick and clever tactics of pickpockets and thieves. What may take thieves a moment to "lift" from your pockets (passports, credit cards, and airline tickets) may take weeks to replace. It is difficult to recognize these changeling thieves sometimes the well dressed businessman standing next to you who just dropped some coins, at other times the "friendly" group of young children with newspapers approaching you in a city subway. A thief may be hard to recognize, but their time tested tactics are not. When traveling or in your home area you can prevent the majority of common thefts by arming themselves with the knowledge of typical scams, following some basic travel safety tips. Alarm System: Contacts (Window & Door Switches) Alarm Contacts- Contact switches are magnetic switches used to protect doors and windows for the most part. There are three main styles that are used by most alarm companies. They are recessed contacts, surface mount contacts and roller-ball contacts. Alarm System: Sirens Alarm Sirens- There is both inside and outside sirens. Many towns have a noise ordinance, which should prevent your installer from putting yours outside, unless you are on a ranch where you need to know what's going on while your out in the barn. You would not want a neighbor running over to your place during an alarm as they might be confronting a dangerous situation. It is better to let the police do that instead. Home Security: Your Yard is the First Line of Defense You may not believe it but most burglars do not plan their break ins. They are crimes of opportunity. They pick what appears to be a simple target. If they see a greater risk than they anticipated, they move onto a safer target. Therefore the more effort you take to keep your home from seeming to be a simple target, the safer you will be. Surveillance Camera Positioning It is a known fact that advertising is made to attract our eyes. Marketers work very hard to plant visual memories in your mind. They use anomaly phrases, rhetorical questions, sexy images and ironic text. There are many reasons why this is done but the biggest reason is that it works. Our eyes are often caught and our brains captured for a moment while we digest the advertisement. Since the advertising world has done such a good job in making us look and think there is a slight hesitation in our gaze and direction of sight. This of course is the world's best time to snap a shot or grab an image of a human on a surveillance camera. Fire Safety Tips Did you know that fire is the third leading cause of accidental deaths in the United States, yet most people ignore it. More than 150 workplace fires occur every day. So many of theses untimely deaths could have been prevented if they only had a plan. Where Does Safety & Security Begin? Security Expert Explains Personal safety begins with you. It is widely accepted that a wide-ranging personal safety strategy must incorporate prevention, deterrence and defiance. How To Turn Thirty Dollar Web Camera Into Home Surveillance System Web cameras are really inexpensive these days. With no technical knowledge, you can hook up one or several camerass to your PC and create own surveillance system, much like CCTV (closed curcuit television). But you'll need the right tools first. Neighborhood Mobile Watch Patrol Have you found yourself disgusted with the crime lately. You know much of it is gang and drug related yet cannot understand how it has infiltrated your quiet town or how it has become such a menus in your city? Have you recently been a victim of a crime, vandalism or petty theft. Have you just about had enough of this? There is something you can do and it won't cost you a dime to do it. Start a Neighborhood Mobile Watch Patrol in your area today. Eavesdropping and Counter-Measures: Technology and Techniques You need to know how to protect yourself, since your security department or any consultant may not be truly aware of these threats and therefore not dependable. Since September 11th, a number of businesses entered the security field with little to no knowledge of the trade itself; only of its profit potential. Even outfits that have been around for some time and well-established have not been able to stay current with the latest innovations.Realistically, viewing your threat level has to be considered since everyone should expect some sort of impending privacy issue no matter how small. Thanks largely to the Internet you can arm yourself with much of the knowledge and equipment that the so-called experts use. If a respected agent of computer crimes for the Secret Service in NYC had his T-Mobile Sidekick hacked, who knows what else happens out there to others in any business.Realistically, viewing your threat level has to be considered since everyone should expect some sort of impending privacy issue no matter how small. Thanks largely to the Internet you can arm yourself with much of the knowledge and equipment that the so-called experts use. If a respected agent of computer crimes for the Secret Service in NYC had his T-Mobile Sidekick hacked, who knows what else happens out there to others in any business.We'll start acoustic ducting evaluation is the inspection of air ducts, baseboard heaters, coffee rooms, lounges, bathrooms or any way the architecture of a building can transfer sound. A simple example is to put your ear to a wall and listen. Basically anything that requires the use of the naked ear is called an acoustic bug. Softer surfaces can help muffle sounds but there are more efficient means out there. So be aware that the way an office site is designed can act as a conduit for conversations. Also, be aware of any changes can have adverse affects. Simply playing music can do wonders for masking conversations.Inspection of telephone equipment and wiring is called line analysis. This is trickier than it seems since sometimes a possible weakness has an actual purpose to the telecommunication system. Especially if it requires constant maintenance and software upgrades.All instruments should be opened and inspected. Ideally they should be compared with a known safe phone or device. If you're not sure, just remove that piece of loose components and wiring and see if the phone still works. The wiring can be modified in a switch within the handset that essentially turns it into a microphone. If you bypass this hook switch, you can listen in from anywhere on the landline. Technicalequipment won't be able to detect this. Time Domain Reflectometry is the sending of a pulse down a telephone line. If there is some sort of disruption; a wall outlet or wiretap; a portion of the pulse will besent back to the device called a Time Domain Reflectometer (TDR). Then the time difference between the reflection and the continuous run is measured. This helps in determining the distance to the anomaly.These devices can perform all sorts of diagnostics including mapping a wire network. That can be useful in locating a hidden phone. Hidden phones have several obvious uses such as making long distance phone calls to being placed in an office across the street to receive betting requests by bookies; a practice called back strapping. If you open up the modular jacks where you connect your phone, you'll usually see four wires. In most cases only two wires are connected; commonly known as ring and tip. If you see all four connected, be aware that is not usually consistent for most wiring situations, especially in homes. The other two wires could be used for a bugging device.For instance, the microphone you use in a voice recorder can be cut in half. Connect the mike head to one set of unused wires anywhere on the phone wire. Then, so long as there are no breaks in the wire, connect the other end to the jack that connects to your recorder. Now place your recorder to be VOX (voice) activated and now you have an extremely reliable bug. By the way, this should be manually inspected for since using a specialized bug detector may see nothing wrong or inconsistent. A bug such as this that connects to a wire is called a direct tap. The other general type is called an inductive tap. This is when an instrument is outside a wire but can still distinguish what's transacting over a wire. They are harder to detect since they don't draw power from the line such a standard telephone would. These are referred to as snuffle bugs. A simple probe used in hunting wire signals has a speaker, which can display sounds. Byaccident one day I was working on an apartment intercom system while using a probe. I could hear conversations throughout the building quite clearly just through the intercom boxes mounted on walls from the master unit in the basement.If you're using wireless headsets or cordless phones, the radio signals can be intercepted. A cordless phone acts like a radio, but depending on the frequency and a few other factors, can make interception extremely difficult. With some manufacturers, you can buy the same model as your neighbors or the office and have it join their phone system. Double check Caller ID boxes to see if they also record numbers dialed besides obviously those being received. If you're using VOIP (Voice Over IP), remember that calls can be recorded in a fashion identical to intercepting data between two computers. These packets of data can reassemble an audio file. Obviously electronic devices possess semiconductor components such as diodes, resistors and such. The method to hunt for these components is called Non-Linear Junction Detection (NLJD). The NLJD unit emits a radio signal while listening for the return signal from an electronic device. This becomes very useful when a bug is embedded in a picture frame or wall. The eavesdropping device doesn't have to be active for it to be discovered. If a device is active and transmitting wirelessly (or even on a wire), you can detect it with a Radio Frequency Spectrum Analyzer. Depending on the detection device used, you can determine whether voice, data or video is being sent, and possibly listen to the data. Try to use different size antennas or buy one that collapses. Different frequencies can be detected more efficiently by using various sizes. The use of filters with antennas can also help pinpoint devices on specific frequencies. Electronics such as computers, FAX machines and especially CRT monitors can radiate electromagnetic signals or pulses that can be received by other equipment. This is known TEMPEST. One way to complicate the surveillance of this is to use certain fonts and line walls or equipment with different gauges of copper mesh wire. You can further enhance this posture by using special paints, which block radio transmissions. Radio waves will look for a leak or break, so be careful of defensive applications. One-way window tints can help in blocking signals. Since an electronic device could generate some heat they can be detected in another way. The use of a thermal imagery device can detect and actually see minute amounts of heat radiated for your viewing. You can hide the heat signatures by using creams or neoprene. Technology exists to collect information from blinking LEDs of modems, routers, print servers and similar devices. You can only see some general blinking but with the use of properly tuned optics, filters, oscilloscopes and good timing you can discern much more. One of the LEDs on your keyboard can be altered to blink while you are typing in a fashion similar to Morse Code. You can also use a tap in the keyboard that sends out radio waves again similar to Morse Code and no anti-virus software will ever be able to find it. Even when a CRT computer monitor is facing a wall the light can be in a sense read by its flickering emanations from some distance. A good defensive measure is to buy new LCD flat panel types.Another approach to attacking FAX machines is to simply record the noises it makes and play it back to another machine. I used to do this for a client so they could keep a record of all the faxes they made and received. There are creative and potentially illegal defenses against wiretappers and Peeping Toms. One is to transmit an extremely high pitch down the wire, thereby rupturing the listener's eardrums. I knew someone who once sent a powerful electrical spike down his phone wire thereby destroying his divorced wife's recorder. By the way, this leads to another topic-expect the device to be discovered someday. Don't leave your fingerprints on it. He found it and had it dusted, thereby producing some prints. My friend used this as leverage against the Private Investigator that planted it. Advice to Private Investigators, a word to the wise: if you do this part-time, hire someone who does this full-time. This P.I. lost his license and almost went to jail. The lawyer who recommended him got into a lot of trouble as well. He received some unwanted attention from the Feds because of his telephone dealings went across state lines and also happened to involve the Post Office. There is another budding field related to this topic called Protective Intelligence. Currently there are only a few experts who do this kind of work.A laser or an infrared beam can be used at a considerable distance from a target building. Conversational sounds can vibrate unto solid objects such as windows. The beam's reflection varies in relation to the movement to the window, which is received and converted back into something audible. To mask the sounds, you could attach a vibrating device (basically an altered electric razor) to the window.Of course if the window is open, then a laser can target another object instead of the window. A beam of light or laser can be directed to go through a window onto a solid object thereby nullifying such defensive measures again. Generally you really can't detect such attacks unless the laser, infrared or light beam is being used that moment. Certain materials can be used to detect IR emissions, as well as the use of passive night vision gear. Certain fabrics or even a curtain may actually show the spot where a beam of light or laser is being focused. Unless the room is dusty or you have an artificial can smoke, you can follow the beam up to a point and guesstimate it's location. One type of optical bug is an infrared transmitter. When placed in the area of interest for transmission of the conversation to an infrared receiver which will then translate the conversation into an audible format.Many of these same procedures used can be applied to locating hidden cameras. A relatively new device uses a series of lasers to seek out optics. This wasoriginally intended to locate snipers by bodyguards.I have listed the techniques, counter-measures and then the counter to the counter-measures to prevent any false sense of security. Usually constant vigilance is your best weapon besides knowing what to look for. Even if you find a "bug sweeper" with good credentials, certifications and experience, ask them detailed questions. Not just to test them but also for your own peace-of-mind. This makes our job easier and we appreciate greatly when dealing with knowledgeable customers. Alarm Systems: Not Just For The Wealthy Anymore! Over the last 22 years that I have been involved in the security alarm industry, I have seen quite an evolution. Changes have not only taken place in what type of equipment is available, but also in how the consumer buys and use's the equipment. What is Your Security Awareness IQ? Are you aware of the need for security? Alarm System Keypads The keypad is the device you and your loved ones will interface with daily. It is typically placed at one or more of the following locations: |
© Athifea Distribution LLC - 2013 |