Colorado Rockies forgotten players: Todd Zeile

Todd Zeile is a regularly overlooked Colorado Rockies player just as probably the best player that is frequently disregarded, by and large.

Todd Zeile played pieces of 16 seasons in the significant classes for an amazing 11 MLB groups. Maybe, that is a piece of the motivation behind why he is extraordinary compared to other MLB players that never made an All-Star group, a player that is an overlooked Colorado Rockies player, and overlooked by quite a bit of baseball fans today.

Zeile spent most of his profession with the St. Louis Cardinals (portions of seven seasons) and New York Mets (portions of three seasons). For one entire season, however, he called Denver home as he played with the Rockies in the 2002 season.

Zeile began as a catcher in the Cardinals framework however then-director Joe Torre needed to move Todd Zeile out from behind the plate to another position since he figured his vocation would last more.

As the truism goes, “It takes one to know one” and Torre knew in light of the fact that that is actually what occurred in his own playing profession.

Both Torre and Zeile figured out how to play a respectable starting point and later, third base. For the Rockies in ’02, he was their regular third baseman. Despite the fact that he was never an All-Star, he despite everything was an awesome player.

He was obtained by the Colorado Rockies in a major three-group bargain on January 21, 2002. This is what the arrangement resembled.

Entering the 2002 season, Zeile had seven seasons with at least 80 RBI and another season with 79 RBI (2000). Five of those seasons were somewhere in the range of 90 and 103 RBI. Notwithstanding, in the center of the steroid time, those numbers didn’t take a gander at large as they did even only 10 years earlier. His profession slice line to that point was .267/.349/.429 with an OPS+ of 107 out of 1,777 vocation games.

He likewise had 29 rounds of postseason experience, hitting .292/.362/.460 of every 127 plate appearances. He hit .400/.429/.500 for the Mets in 21 plate appearances in the 2000 World Series.

In his solitary season with the Rockies, he batted fifth for a large portion of the period, behind Larry Walker and Todd Helton in the lineup, remembering for Opening Day. In 144 games, he hit .273/.353/.425 with 18 homers, 87 RBI, and an OPS+ of 93.

Zeile was conceded free office and marked with the New York Yankees for the 2003 season. They discharged him mid-season and he completed the season with the since-moved Montreal Expos. He completed his profession with the Mets in 2004. With playing for 11 groups, he is the main MLB player to hit a grand slam for at least ten groups. He likewise completed his vocation with 2,004 profession hits, 253 vocation homers, and 1,110 profession RBI.

Subsequent to resigning, he established his own creation organization (named Green Diamond Entertainment, as a gesture to his baseball vocation) and he went into Hollywood as a maker and on-screen character. He is most popular for being a co-official maker for the FX show Anger Management, which featured Charlie Sheen and Selma Blair.

Sesame Street Live! Let’s Party! Coming to Wolstein Center in April

Sesame Street Live! Let’s Party!, the debut visiting creation under Feld Entertainment’s new association with the non-benefit instructive association, will include most loved Sesame Street buddies Elmo, Abby Cadabby, Big Bird and more in a fresh out of the plastic new tangible experience.

Sesame Street Live Lets Party

On April 4 and 5, the visit visits Cleveland for five exhibitions at Wolstein Center. Tickets go discounted on Jan. 16.

Related Article:

The public statement for the visit guarantees you’ll find a workable pace to melodies, for example, “I Love Trash” and “C is for Cookie,” with Oscar the Grouch and Cookie Monster. Elmo, Big Bird, Abby Cadabby and Rosita will all show up as well. A “one of a kind, very close pre-show understanding” will be offered at an extra charge earlier for select exhibitions, permitting families the chance to investigate the set preceding the beginning of the show.

Sesame Street Live Lets Party Tickets start at $70. All seats are saved, and tickets are accessible online at or face to face at the Wolstein Center Box Office.

Why See Once On This Island Chicago?

This Beautiful Story Heads Out on Tour:

In the wake of opening to a lot of basic and open approval back in December 2017, the new Broadway crush and 2018 Tony Award victor for Best Revival of a Musical, Once On This Island is taking off on visit in 2019! Following the account of one island’s street to a more promising time to come the Broadway production manufactured another and clever showy stage to recount to its story.

Once On This Island Chicago Tickets

In this vivid experience, spectators are cleared away with the emotions of the story. Inundated with shading, an incredible score and a story that has risen above time, Once On This Island is a definitive vibe great melodic while giving a social message that everyone could regard. So before they are sold out get your Once On This Island Chicago Tickets. Tickets4Chicago is selling them cheaper than most of the ticket vendors. With secure payment methods and on-time delivery, we are indeed your best choice. To top it all, we also offer Once On This Island Chicago Tickets Discount.

What’s Once on This Island About?

Occurring on Haiti in the mid twentieth century, the population of this little island are part between the darker-cleaned ‘workers’ and the lighter-cleaned wealthier population. In an abrupt blaze flood, a little youngster (Ti Moune) is washed away, anyway the island divine beings look merciful upon her and spare her life, solidifying her significant fate.

A long time later, Ti Moune’s predetermination happens as intended as she protects a youthful rich man from a comparable situation that be-falled her in her adolescence. Anyway Ti Moune has a decision, so as to spare this youngster’s life she should exchange her spirit.

Cheap Potted Potter Chicago Tickets
American Ballet Theatre Chicago

Florida Georgia Line Nab Three ACM Decade Awards: ‘These Are Massive Honors’

Florida Georgia Line have a progression of new grants to add to their accumulations. The couple’s Brian Kelley and Tyler Hubbard have been enlivened with three new grants from the Academy of Country Music, made to pay tribute to the their trailblazing endeavors.

Florida Georgia Line

FGL have been named as the primary beneficiaries of the ACM Breakout Artist of the Decade Award, while their profession characterizing hit “Journey,” which went through 24 weeks at No. 1 on the Billboard Hot Country Songs outline in 2013, has been perceived with the ACM Single of the Decade Award. Moreover, their record-breaking two part harmony with Bebe Rexha, “Intended to Be,” which sat at No. 1 on the Hot Country Songs outline for 50 weeks, has been respected with the ACM Music Event of the Decade Award.

“This is amazing. These are three immense, huge distinctions,” Kelley said when he and Hubbard were amazed with the trophies behind the stage at the last show on their Can’t Say I Ain’t Country Tour at the FivePoint Amphitheater in Irvine, Calif. “It truly means a great deal – it’s an astonishing, lowering approach to end this period of life and this visit.”

“It’s been an unfathomable year, staggering visit – there’s been a family, a bond, and a fraternity that is occurred around here, [and I] couldn’t envision a superior method to complete this visit out,” Hubbard includes.

The new honors give the “Basic” artists an aggregate of nine ACM Awards. Their three ACM Decade Awards are among a progression of new decade-explicit distinctions the association has made to respect down home music’s most significant specialists. Ticket2concert is a well-known Cheap Florida Georgia Line Chicago Concert Tickets selling site with amazing deals at Tickets4Chicago. You get access to inventory full of most up and coming artists with details like that of concert dates and times. Kenny Chesney, Florida Georgia Line & Old Dominion are doing concert in Chicago together. Cheap Kenny Chesney Chicago tickets are also available.

Avalanches: A Slippery Slope to Danger

Extreme Skiing Mixed with Extreme Conditions Warrant Extreme Preparedness. According to the National Ski Patrol, the growing interest in free skiing and riding is pushing more skiers and snowboarders to venture outside of ski area boundaries in search of perfect powder. However beautiful the backcountry may be, those pristine slopes come with multiple risks, and one of the most significant is the risk of avalanche.
Snow conditions in the backcountry are far more unpredictable than those where the snow is groomed snow, such as that found at ski resorts. Backcountry areas are also not patrolled.

Although, snow experts use a wide variety of advanced technology to track and predict avalanche conditions the risk still remains.  So, before you hit those pristine alpine glades this season take a minute to brush up on avalanche safety tips and check out the resources here in Colorado designed to help you stay informed.

Basic Avalanche Safety Tips

  • 30 Degree Slopes: The key to avoiding avalanches is to stay away from terrain where those conditions exist.  Avalanche terrain exists on any slope steeper than 30 degrees. It doesn’t matter if it is a big slope or a very small slope. It doesn’t matter if it is an open slope or one with trees. If it is steeper than 30 degrees it can produce an avalanche.
  • Runout Zones:  Avalanches have caught many people unaware because they were below avalanche terrain in what is called a runout zone (the place where avalanche debris like trees and rocks typically come to rest).  These slopes are as steep as expert black diamond runs and some intermediate blue runs. Even if the slope doesn’t appear that steep it is considered avalanche terrain if the slope above it is steep.
  • Frequency:   Avalanches do not occur every day. It all depends on snow conditions and the weather.  Generally, most avalanches occur during storms or during the 24-48 hours following one.
  • Check Conditions: Because avalanche conditions can change rapidly from one day to the next check current conditions and get avalanche danger ratings from a regional avalanche center.
  • Triggers:  An avalanche will not occur without a trigger. This trigger could be weight from additional snow or weight from a person traveling on the snow.
    • Instability:  Avalanches are more likely to occur after a heavy snowfall as this increases snow instability.
    • Melting Snow:  Wet avalanches are likely to occur in warmer temperatures. Melting snow adds moisture which weakens the bond between snow layers.
    • Recent Activity:  Recent avalanche activity in the same area is an indicator of snow instability. It’s also a sign that more avalanches are likely to occur.
    • Wind:  Wind can create dangerous snow slabs. If there has recently been high wind, an avalanche is more likely to occur.
    • Cracks:  Cracks in the snow surface and/or “whoomping” sounds mean that a weak layer is collapsing and the snowpack is unstable.

Saf ety Tools

According to the Forest Service National Avalanche Center, the following tools should be carried when going into the backcountry:

General Tools

  • Snow saw
  • Probes
  • Slope meter
  • Monocular (can magnify up close and far away)
  • Walkie talkies
  • Bivy Sack (a small, waterproof shelter)
  • Climbing skins (allow skis to climb on a slope)
  • Avalanche Beacon
  • Shovel
  • Backpack
  • Spare Strap
  • Snow science kit
  • Avalung or an Air Bag System
  • Helmet
  • Headlamp
  • Water bottle
  • Stove and fuel
  • Toolkit
  • Map and compass
  • First aid kit

 Avalanche Preparedness Tools

  • Avalanche beacon – emits a signal over a distance of 60 to 100 feet. Always ski with an avalanche beacon in transmit mode. If searching for an avalanche victim, switch to receive mode.
  • Avalung – a sling or backpack-style air pack that can allow the user to breathe for approximately one hour if no other air is available.
  •  Airbag pack – Deployable pack designed to keep an avalanche victim closer to the surface. Also helps to increase body volume, giving the victim more free space within the avalanche.
  • Helmet – Nearly 30 percent of avalanche fatalities are caused by trauma. A helmet can reduce this risk.

Repair/ Survival Kit

  • Extra food and water
  • Extra clothes such as gloves, hat, socks, insulated coat and pants
  • Headlamp
  • Extra binding parts
  • Pocket tool with Pozidrive screwdriver
  • Wire, duct tape
  • Epoxy, strip screw inserts, steel wool
  • Candle/matches/lighter
  • Emergency thermal blanket
  • Chemical hand warmers
  • Knife
  • Extra beacon and headlamp batteries
  • Consider carrying a light gas stove to melt snow (they weigh about the same as a liter of water).

What to do if you get caught by an Avalanche

The following tips are from the Forest Service National Avalanche Center:

  • Try to ski or board off the avalanche slab by maintaining momentum and angling to the edge of the slide. Discard poles (never ski in the backcountry with your pole straps on).
  • If you have releasable bindings and your skis or board comes off, roll on to your back with your feet downhill. Swim hard upstream to try to get to the rear of the avalanche.
  • Dig into the surface to slow yourself down and let as much debris as possible go past.
  • Grab a tree if you can.
  • Fight.
  •  As the avalanche slows, try to thrust your hand or some part of your body above the surface and then stick a hand in front of your face to make an air space around your mouth.
  • If completely buried, try to remain calm–hopefully, your partners have practiced rescue techniques and they will quickly find you.

Know Before You Go

In Colorado, the Colorado Avalanche Information Center (CAIC) offers training courses and current snow and avalanche conditions. Visit them online at
The CAIC’s Twitter feeds provide timely information and updates on avalanche and snow conditions.  Simply follow the area or areas that are of interest to you:

  • CAIC – Steamboat and Flat Tops Info –
  • CAIC – Front Range –
  • CAIC – Vail and Summit County –
  • CAIC – Sawatch Range –
  • CAIC – Aspen –
  • CAIC – Gunnison –
  • CAIC – Grand Mesa –
  • CAIC – Northern San Juan –
  • CAIC – Southern San Juan –
  • CAIC – Sangre de Cristo –
  • CAIC – Off-Season Avalanche Information –

Information Sources

  • U.S. Forest Service National Avalanche Center
  • National Ski Patrol
  • Colorado Avalanche Information Center

National Preparedness Month: Fire

September is National Preparedness Month!

If disaster struck today would you be prepared? Preparation begins with you and your family. Do you have a plan?

The theme for this week is fire. Being ready for wildfire in Colorado means taking the time now to learn how to safely mitigate, prepare, respond and recover from wildfire.

We have a responsibility to take care of our wonderful state through active mitigation activities and responsible recreation. Before, during and after fire strikes we must remain informed, prepared and ready to take the pro-active steps necessary to ensure that safety is our primary objective.

Critical to this mission is signing up to receive emergency notifications and then quickly acting on the alerts when they are received. You can get started by finding your local emergency response agencies as

Being ready for wildfire in Colorado also means having a plan to our family, friends and broader community to provide mental and emotional support during a time of need.

Each and every one of us has an important obligation to ensure that we are ready to mitigate, prepare, respond and recovery from wildfire. Take the time today to review your wildfire knowledge and put the tips into practice. You can get started by visiting

Follow READYColorado for more preparedness tips and resources!

Stay tuned to READYColorado and our partners for additional wildfire mitigation, preparedness, response and recovery information.

• READYColorado/wildfire
• Red Cross – Wildfire
• Ready, Set, Go!

Share your preparedness tips using the hashtag #COFlood on FacebookTwitter and Google +.

Bombs and Explosives

A terrorist attack on the United States remains a significant and pressing threat. Improvised explosive devices (IEDs) remain the terrorist weapon of choice due to their relative ease of construction, availability, and destructive capacity.

An improvised explosive device attack is the use of a “homemade” bomb and/or destructive device to destroy, incapacitate, harass or distract. IEDs can come in many forms, ranging from a small pipe bomb to a sophisticated device capable of causing massive damage and loss of life. IEDs may be surrounded by or packed with additional materials or “enhancements” such as nails, glass, or metal fragments designed to increase the amount of shrapnel propelled by the explosion. Enhancements may also include other elements such as hazardous materials.

Nevertheless, there are things you can do to prepare for the unexpected. Explore the information below to learn about the preparedness measures you can take and how to be proactive if you see something suspicious!

Cover photo courtesy of FEMA/Andrea Booher

Banner photo courtesy of the FBI

Within text photo courtesy of FEMA/News Photo


The number one way to protect yourself and others from an IED attack is to be aware of your surroundings and to report anything that is out of the ordinary.

Steps to Take if You See Something Suspicious

“If you see something, say something!” It can be difficult to determine when to report something suspicious. People most familiar with a given environment are in the best position to determine whether or not something seems suspicious.

Follow the guidelines below:

  • Trust your instincts – if something feels wrong, don’t ignore it.
  • Do not assume that someone else has already reported it.
  • Call local authorities.
  • Keep your distance from a suspicious package – do not approach or tamper with it.
  • When you make a report, be ready to provide your name and location, a description of what you think is suspicious, and the time you saw it. The responding officer will assess the situation, ensure the area is evacuated and call for appropriate personnel and equipment. 

Make a Personal Plan for Response

Preparation is key!  Everyone can take the following steps to prepare for an IED attack:

  • Learn the emergency procedures at your place of work, any other sites you visit regularly, and any public transportation systems you use. Communication systems may be inoperable in an emergency, so you should be familiar with what steps to take.
  • Know how to get out of the area. If you work far from home, plan backups to get home if the usual modes of transit are not operating.
  • Know the routes to hospitals in your community.
  • Take a first aid course.
  • Make a family emergency plan ─ remember that family members may be in separate locations at the time of an attack.
  • Designate an “out-of-area” contact, and make sure that everyone in your family has that individual’s phone number.
  • Have an emergency supply kit at work and at home that includes water and non-perishable food to last at least three days, battery-powered radio, first aid kit, flashlights, and batteries.


If you are at the immediate site of an IED attack, your top priority is to get out of the area. This increases your safety in case a secondary device is present in the area and minimizes your exposure to dust, smoke, and any hazardous substances that may have been released as a result of the blast. This also allows emergency responders to find and assist the most critically injured victims.

Click here to learn more about the steps you can take in different situations during an IED attack.


Some health effects caused by IEDs, including eye injuries and abdominal injuries, may not be apparent initially, but can cause symptoms and even fatalities hours to months after the event. Seek medical attention if you are experiencing any of these symptoms.

Additionally, psychological effects in survivors, first responders, and others may be present and are not unusual in the aftermath of a high-casualty event. Assistance from mental health professionals may be necessary.

More Information:

References, Resources and More Information:

  • – Explosions
  • Colorado Information Analysis Center
  • Counterterrorism Education Learning Lab (The CELL)
  • Centers for Disease Control and Prevention – Mass Casualty Event Preparedness and Response
  • Centers for Disease Control and Prevention – Preparing for a Bombing
  • Department of Homeland Security

Fast Facts:

  • Explosives are one of the most frequently used weapons by terrorists.
  • Many commonly available materials, such as fertilizer, gunpowder, and hydrogen peroxide, can be used as explosive materials in IEDs.
  • The term IED came into common usage during the Iraq War that began in 2003.
  • A known bomber tactic is to use a distraction, such as gunfire or small bombs, to attract bystanders to a window, a doorway, or outside, and then detonate a second destructive device at the gathering point.


Past terrorist attacks have left many concerned about the possibility of future incidents of terrorism in the United States and their potential impact.  A terrorist attack on the U.S. remains a significant and pressing threat.  Terrorist operations usually begin with extensive planning and can happen anytime, anywhere, but you can help prevent and detect terrorism by watching out for suspicious activities and by reporting them to the proper authorities. Be alert for the eight signs of terrorism, which can be found below!

Cover photo courtesy of FEMA/Andrea Booher

Banner photo courtesy of FEMA/Lauren Hobart

Within text photo courtesy of FEMA/Jocelyn Augustino


8 Signs of Terrorism

Surveillance: Terrorists may conduct surveillance to determine a target’s strengths and weaknesses. Be aware of someone who appears to be monitoring security personnel or equipment, or gauging emergency response time.  Suspicious activities may include using vision enhancing devices or cameras, acquiring floor plans or blueprints, drawing diagrams and showing interest in security and access to facilities.

Elicitation: People or organizations attempting to gain information about military operations, capabilities, or people. Elicitation attempts may be made by mail, email, telephone, in person or even by gaining employment at the location.

Tests of Security: Any attempt to measure reaction times to security breaches, attempts to penetrate physical security barriers, or monitor procedures in order to assess strengths and weaknesses.

Funding: Terrorists need to raise money for their operations and spend it in a way that doesn’t draw attention.  Be aware of unusually large transactions paid with cash or gift cards, collections for donations and solicitations for money. 

Supplies: To conduct an attack, terrorists may need a variety of supplies, such as weapons, uniforms, badges, and communication systems.

Impersonation: Terrorists may impersonate law enforcement officers, firefighters, mail carriers, or company employees to gain information. Someone who seems suspicious in what they say or do on the job could be a red flag.

Rehearsal: Terrorists often rehearse a planned attack to make sure their operation runs smoothly. This may include measuring response time by emergency responders, mapping routes and determining the timing of traffic lights.

Deployment: This is when terrorists are putting their plans into place, getting into position, and moving equipment and supplies.  If you observe this type of activity, this is your last chance to alert authorities before the attack is launched.  If you believe there is imminent danger, call 911 immediately.

VIDEO: Recognizing the 8 Signs of Terrorism

See Something, Say Something!

The nationwide “If You See Something, Say Something” public awareness campaign was created to raise public awareness of indicators of terrorism and terrorism-related crime, and to emphasize the importance of reporting suspicious activity to the proper local law enforcement authorities. If you see something suspicious taking place, report the behavior or activity to local law enforcement.  In the event of an emergency, call 9-1-1. Factors such as race, ethnicity, national origin, or religious affiliation alone are not suspicious.  Never try to handle or intervene in the situation on your own – let trained authorities handle the situation.

Recognizing Suspicious People

Suspicious people may often be identified by their behavior. While no one behavioral activity is proof that someone is planning to act inappropriately, these factors can help you assess whether someone poses a threat.

Behavioral factors to watch for include:

  • Nervousness or other signs of mental discomfort.  This may include sweating or “tunnel vision” (staring forward inappropriately).
  • Inappropriate, oversize, loose-fitting clothes (i.e. a heavy overcoat on a warm day).
  • Keeping hands in pockets or cupping hands (i.e. holding a triggering device).
  • Constantly favoring one side or one area of the body as if wearing something unusual/uncomfortable (i.e. a holster). Pay attention to someone who is constantly adjusting waistbands, ankles, or other clothing. Suicide bombers have been known to repeatedly pat themselves to verify that the bomb vest or belt is still attached.


  • Remain as calm as possible.
  • Follow the instructions of local emergency officials.
  • If you are in the immediate vicinity, check yourself and others for injuries. If you are not injured, give first aid and get help for seriously injured people.
  • If you are not in the immediate area, do not move to the scene of the incident.
  • Listen to your radio or television for news to obtain information.
  • Call your family contact; do not use the telephone again unless it is a life-threatening emergency.


An act of terrorism may have wide-spread and devastating results.

You should be prepared for the following:

  • Heavy law enforcement presence in surrounding areas.
  • Extensive media coverage for a prolonged period of time.
  • Workplace and school closures.
  • Restrictions on domestic and international travel.
  • Clean-up make take months.
  • Psychological effects in survivors, first responders, and others may be present and are not unusual in the aftermath of a high-casualty event. Assistance from mental health professionals may be necessary.

More Information:

References, Resources and More Information:

  • Division of Homeland Security and Emergency Management
  • Colorado Information Analysis Center
  • Counterterrorism Education Learning Lab (The CELL)
  • National Terrorism Advisory System
  • Red Cross – Terrorism Preparedness
  • Department of Homeland Security
  • Security Management
  • FEMA
  • Federal Bureau of Investigation – Najibullah Zazi Pleads Guilty to Conspiracy to Use Explosives Against Persons or Property in U.S., Conspiracy to Murder Abroad, and Providing Material Support to al Qaeda

It Happened Here

Najibullah Zazi, a citizen of Afghanistan and a legal resident of the United States, plotted to bomb the New York City subway system in September 2009.  In January 2009, Zazi moved to Colorado and worked as a shuttle bus driver at the Denver International Airport.  On Sept. 8, 2009, Zazi drove from Denver to New York, taking with him the explosives and other materials necessary to build the bombs.  Zazi and others intended to obtain and assemble the remaining components of the bombs over the weekend and conduct the attack on the Manhattan subway system on September 14, 15 or 16, 2009.  However, shortly after arriving in New York, Zazi realized that law enforcement was investigating his activities. Zazi and others discarded the explosives and other bomb-making materials, and Zazi traveled back to Denver.  He was arrested on Sept. 19, 2009.

Fast Facts:

  • In 2012, there were 6,771 terrorist attacks worldwide.
  • The word “terrorism” first appeared in France (terrorisme) in 1795.
  • A terrorist can be an individual or part of an organization.
  • If you see something, say something!

Cyber Crime

Cyber crime is one of the fastest growing areas of crime.  Our daily lives, economic growth, and national security depend on a stable, safe, and resilient cyberspace. We rely on this vast array of networks to communicate and travel, power our homes and run our economy.  Yet cyber crimes have increased over the last decade, exposing sensitive personal and business information, disrupting critical operations, and imposing high costs on the economy.  More and more criminals are exploiting the speed, convenience and anonymity that modern technologies offer in order to commit a diverse range of criminal activities. These include attacks against computer data and systems, identity theft, as well as the deployment of viruses, and various email scams such as phishing.  Additionally, the threat of terrorism forces authorities to address security vulnerabilities related to information technology infrastructure such as power plants, electrical grids, information systems and the computer systems of government and major companies. Cyber crime even encompasses the realms of cyber bullies and cyber predators. 

Although cyber crime is a serious concern, learning about the risks is the first step to protecting yourself.  Explore the information below to learn more about what you can do to stay safe online!

Cover photo courtesy of Interpol

Banner photo courtesy of the DHS

Within text photo courtesy of the FBI


While cyber crime encompasses a number of different areas, there are steps you can take to protect yourself and your family before an incident occurs.

Protecting yourself against cyber criminals:

  • Use and regularly update antivirus and antispyware software on all your electronic devices.
  • Keep your internet browsers up to date.
  • Only connect to the Internet over secure, password protected networks.
  • Do not click on links or pop-ups, open attachments, or respond to emails from unknown individuals.
  • Always enter a URL by hand instead of following links if you are unsure of the sender.
  • Do not respond to online requests for personal information; most organizations such as banks, universities, and companies do not ask for your personal information over the Internet.
  • Limit who you are sharing information with by reviewing the privacy settings on your social media accounts.
  • Trust your gut; if you think an offer is too good to be true, then it probably is.
  • Password protect all devices that connect to the Internet and user accounts.
  • Use strong passwords. Strong passwords use letters, numbers, and symbols, and are easy to remember, but difficult to guess. 
  • Do not use the same password twice and change them frequently. 
  • If you see something suspicious, report it to the proper authorities.

Protecting yourself against cyber predators:

  • Never share your personal information with someone you don’t know.
  • Do not post personal information, such as your phone number or email address on social media sites.
  • Do not meet with people in person with whom your only contact has been online.
  • Avoid any sort of sexual talk online.
  • Use privacy settings to restrict who can see your online profile.

Protecting yourself against cyber bullies:

  • If you are bullied online or on your phone, ignore it. Bullies look for a response, and ignoring it will help it to stop.
  • Block or delete any cyber bullies from your social media profiles.
  • Stand up for others being bullied. Bullies will usually stop if another person steps in to stop it.
  • If you are a parent, talk to your kids about cyber bullying and its effects. Teach your children good online etiquette and be a good example to them.


The following are immediate actions to take if you encounter instances of cyber crime:

If you suspect you’ve been a victim of cyber theft or intrusion:

  • Check to make sure the software on all of your systems is up-to-date.
  • Run a scan to make sure your system is not infected or acting suspiciously.
  • If you find a problem, disconnect your device from the Internet and perform a full system restore.

If you believe your personal information is compromised:

  • Immediately change all passwords; financial passwords first. If you used the same password for multiple resources, make sure to change it for each account, and do not use that password in the future.
  • If you believe the compromise was caused by malicious code, disconnect your computer from the Internet.
  • Restart your computer in safe mode and perform a full system restore.
  • Contact banks where you have accounts, as well as credit reporting companies.
  • Close any accounts that may have been compromised. Watch for any unexplainable or unauthorized charges to your accounts.

If you encounter a cyber predator:

  • Immediately cease contact with the individual.
  • Report the incident to local law enforcement.

If you are a victim of cyber bullying:

  • Report the bully to an adult or other authority. While fear may make it difficult to report the problem, talking to someone about it will help it stop.
  • Block or delete the bully from any social media or other types of contact.
  • Do your best to ignore instances of bullying.


There are steps you can take after an incident of cyber crime to help prevent becoming a victim a second time.

If you are a victim of cyber crime:

  • File a report with the local police so there is an official record of the incident.
  • Report online crime or fraud to your local United States Secret Service (USSS) Electronic Crimes Task Force or the Internet Crime Complaint Center.
  • If your PII was compromised, consider other information that may be at risk. Depending what information was stolen, you may need to contact other agencies, such as the Social Security Administration.
  • For further information on preventing and identifying threats, visit US-CERT’s Alerts and Tips page.

If you are a victim of a cyber predator:

  • Make sure to file a report with your local police department. If the victim was a child, also report the incident to the National Center for Missing and Exploited Children.
  • Take steps in the future to protect your personal information (see before tab).

If you are a victim of cyber bullying:

  • Make sure you report the bullying to authorities. 
  • Do your best to avoid the bullies in the future.
  • Talk about the issue with your parents or other adults. They can assist you in stopping the problem and help you cope. 

More Information:

References, Resources and More Information:

  • – Cyber Attack
  • United States Computer Emergency Readiness Team
  • Internet Crime Complaint Center
  • U.S. Department of Homeland Security Stop.Think.Connect.
  • Interpol
  • FBI – Cyber Crime

Cyber Bullying Research Center

  • The Cyberbullying Research Center is dedicated to providing up-to-date information about the nature, extent, causes, and consequences of cyberbullying, and the negative use of social networking among adolescents. This web site provides cyberbullying research, stories, cases, downloads, fact sheets, online quizzes, tips and strategies, news headlines, a blog, and a number of other helpful resources on their comprehensive public service web site.
  • Report Cyberbullying or inappropriate conduct to social media sites, search engines, cell phone providers, internet providers, and internet games.  

Cyber-Safety Action Guide

  • A tool created by the Anti-Defamation League. Click the links for various online companies and social media sites to learn their general hate speech policies, cyberbullying/harassment policies, and how to report hate speech, cyberbullying, and harassment. 

Federal Trade Commission (FTC) Consumer Privacy and Identity Information

  • This website contains information on computer security, kids’ online safety, protecting your identity, and repairing identity theft. 
  • Safeguarding Your Child’s Future – An FTC Document on how to protect your child’s identify from identity thieves. 

Internet Safety 101

  • Supported by the Office of Juvenile Justice and Delinquency Prevention (OJJDP) this information is produced by Enough Is Enough (EIE), a non-partisan, 501(c)(3) non-profit organization, emerged in 1994 as the national leader on the front lines to make the Internet safer for children and families. Since then, EIE has pioneered and led the effort to confront online pornography, child pornography, child stalking and sexual predation with innovative initiatives and effective communications.

Net Cetera: Chatting with Kids about Being Online

  • A booklet published by the FTC designed to offer parents practical tips on helping their children navigate the online world. 


  • The Netsmartz Workshop is an interactive, educational safety resource from the National Center for missing & Exploited Children (NCMEC) and Boys & Girls Clubs of America (BGCA) for children aged 5 to 17, parents, guardians, educators, and law enforcement that uses age-appropriate, 3-D activities to teach children how to stay safe on the Internet. 

Safe Online Surfing (SOS)

  • This site, launched by the FBI in 2012, is a site where website where students can learn about cyber safety through games, videos, and other interactive features. It teaches kids in third through eighth grades how to recognize and respond to online dangers such as cyberbullying, online predators, and identity thieves.

  • Created by the National Cyber Security Alliance, this site provides tools to teach online safety, tips on how to stay safe online, and information on how to protect your business.

  • A website created by the Federal Trade Commission that offers information on how to avoid scams, protect kids online, secure your computer, and browse the internet safely. 

Cyber Security Tip Sheets

  • Ten Cybersecurity Tips for Small Business – Stop. Think. Connect. – Department of Homeland Security
  • Small Business Cybersecurity Tip Card – Stop. Think. Connect. – Department of Homeland Security
  • Government Cybersecurity Tip Card – Stop. Think. Connect. – Department of Homeland Security 
  • Rules ‘n Tools Checklist – Internet Safety Tool for Parents – Internet Safety 101
  • Cyber Tips for Older Americans – Stop. Think. Connect. – Department of Homeland Security
  • Cybersecurity for Kids Tip Card – Stop. Think. Connect. – Department of Homeland Security 
  • Grades K-8 Student Tip Card – Stop. Think. Connect. – Department of Homeland Security 
  • Grades 9-12 Student Tip Card – Stop. Think. Connect. – Department of Homeland Security
  • College Student Tip Card – Stop. Think. Connect. – Department of Homeland Security

Internet Safety Pledges – From Netsmartz

  • Primary
  • Intermediate
  • Middle and High School

Active Shooter

An active shooter is an individual actively engaged in killing or attempting to kill people in a confined and populated area.  In most cases, active shooters use firearms(s) and there is no pattern or method to their selection of victims. Active shooter situations are unpredictable and evolve quickly. Typically, the immediate deployment of law enforcement is required to stop the shooting and mitigate harm to victims. Because active shooter situations are often over within 10 to 15 minutes, before law enforcement arrives on the scene, individuals must be prepared both mentally and physically to deal with an active shooter situation.

Nevertheless, there are things you can do to prepare for the unexpected.  Preparing for such events will reduce the stress that you may feel now, and later, should another emergency arise.  Explore the information below to see how you can better prepare yourself for these types of situations!

Cover photo courtesy of the DHS

Banner photo and photo within text courtesy of the FBI


Key Considerations of the Active Shooter

  • There is no one demographic profile of an active shooter.
  • Many active shooters display observable pre-attack behaviors, which, if recognized, can lead to the disruption of the planned attack.
  • The pathway to targeted violence typically involves an unresolved real or perceived grievance and an ideation of a violent resolution that eventually moves from thought to research, planning, and preparation.
  • Bystanders generally represent the greatest opportunity for the detection and recognition of an active shooter prior to his or her attack.
  • Concerning active shooters, a person who makes a threat is rarely the same as the person who poses a threat.
  • Successful threat management of a person of concern often involves long-term caretaking and coordination between law enforcement, mental health care, and social services.
  • Exclusionary interventions (i.e. expulsion, termination) do not necessarily represent the end of threat-management efforts.
  • While not every active shooter can be identified prior to attacking, many potential active shooters who appear to be on a pathway toward violence can be stopped.

Steps to Take if You See Someone or Something Suspicious

“If you see something, say something!” It can be difficult to determine when to report someone or something suspicious. People most familiar with a given environment are in the best position to determine whether or not something seems out of the ordinary. 

  • Be aware of your environment and any possible dangers.
  • Trust your instincts ─ if something feels wrong, don’t ignore it.
  • Take note and ensure that the facility you’re at has at least two evacuation routes.
  • Post evacuation routes in visible locations throughout the facility (i.e. work).
  • Encourage law enforcement, emergency responders, SWAT teams, K-9 teams, and bomb squads to train for an active shooter scenario at your location.
  • Do not assume that someone else has already reported the suspicious activity. 
  • Call local authorities.  When you make a report, be ready to provide your name and location, a description of what you think is suspicious, and the time you saw it. The responding officer will assess the situation, ensure the area is evacuated and call for appropriate personnel and equipment.



If there is an accessible escape path, attempt to evacuate the premises.

Be sure to:

  • Have an escape route and plan in mind. Evacuate regardless of whether others agree to follow.
  • Leave your belongings behind.
  • Help others escape, if possible.
  • Prevent individuals from entering an area where the active shooter may be.
  • Keep your hands visible.
  • Follow the instructions of any police officers.
  • Do not attempt to move wounded people.
  • Call 911 when you are safe.

Hide Out

If evacuation is not possible, find a place to hide where the active shooter is less likely to find you.

Your hiding place should:

  • Be out of the active shooter’s view.
  • Provide protection if shots are fired in your direction (i.e., an office with a closed and locked door).
  • Not trap you or restrict your options for movement. 

To prevent an active shooter from entering your hiding place, lock the door and blockade with heavy furniture.

If the active shooter is nearby:

  • Silence your cell phone and/or pager.
  • Turn off any source of noise (i.e., radios, televisions).
  • Hide behind large items (i.e., cabinets, desks).
  • Remain quiet.

If evacuation and hiding out are not possible:

  • Remain calm and dial 911, if possible, to alert police to the active shooter’s location.
  • If you cannot speak, leave the line open and allow the dispatcher to listen.

Take Action

As a last resort, and only when your life is in imminent danger, attempt to disrupt and/or incapacitate the active shooter by:

  • Acting as aggressively as possible against him/her.
  • Throwing items and improvising weapons.
  • Committing to your actions.

How to react when law enforcement arrives:

  • Remain calm, and follow officers’ instructions.
  • Put down any items in your hands (i.e., bags, jackets).
  • Immediately raise hands and spread fingers.
  • Keep hands visible at all times.
  • Avoid making quick movements toward officers.
  • Avoid pointing, screaming and/or yelling.
  • Do not stop to ask officers for help or direction when evacuating, just proceed in the direction from which officers are entering the premises. 

The first officers to arrive to the scene will not stop to help injured persons; their main goal is to locate and stop the active shooter. Expect rescue teams comprised of additional officers and emergency medical personnel to follow the initial officers. These rescue teams will treat and remove any injured persons. They may also call upon able-bodied individuals to assist in removing the wounded from the premises. 


  • Once you have reached a safe location or an assembly point, you will likely be held in that area by law enforcement until the situation is under control, and all witnesses have been identified and questioned. Do not leave until law enforcement authorities have instructed you to do so.
  • Psychological effects in survivors, first responders, and others may be present and are not unusual in the aftermath of a high-casualty event. Assistance from mental health professionals may be necessary.

More Information:

References, Resources and More Information:

  • U.S. Department of Homeland Security – Active Shooter Preparedness
  • Federal Bureau of Investigation – Active Shooter

It Happened Here

On July 20, 2012, a mass shooting occurred inside a movie theater in Aurora during a midnight screening of The Dark Knight Rises. A gunman, dressed in tactical clothing, set off tear gas grenades and shot into the audience with multiple firearms, killing 12 people and injuring dozens of others.

Fast Facts:

  • The shooter often stops as soon as he/she hears or sees law enforcement.
  • In 10% of the cases, the shooter stops and walks away. In 20% of the cases, the shooter moves to another location.
  • 2% of the shooters bring improvised explosive devices as an additional weapon.
  • The average active shooter incident lasts 12 minutes. 37% last less than 5 minutes.