Sesame Street Live! Let’s Party! Coming to Wolstein Center in April

Sesame Street Live! Let’s Party!, the debut visiting creation under Feld Entertainment’s new association with the non-benefit instructive association, will include most loved Sesame Street buddies Elmo, Abby Cadabby, Big Bird and more in a fresh out of the plastic new tangible experience.

Sesame Street Live Lets Party

On April 4 and 5, the visit visits Cleveland for five exhibitions at Wolstein Center. Tickets go discounted on Jan. 16.

Related Article:

The public statement for the visit guarantees you’ll find a workable pace to melodies, for example, “I Love Trash” and “C is for Cookie,” with Oscar the Grouch and Cookie Monster. Elmo, Big Bird, Abby Cadabby and Rosita will all show up as well. A “one of a kind, very close pre-show understanding” will be offered at an extra charge earlier for select exhibitions, permitting families the chance to investigate the set preceding the beginning of the show.

Sesame Street Live Lets Party Tickets start at $70. All seats are saved, and tickets are accessible online at or face to face at the Wolstein Center Box Office.

Why See Once On This Island Chicago?

This Beautiful Story Heads Out on Tour:

In the wake of opening to a lot of basic and open approval back in December 2017, the new Broadway crush and 2018 Tony Award victor for Best Revival of a Musical, Once On This Island is taking off on visit in 2019! Following the account of one island’s street to a more promising time to come the Broadway production manufactured another and clever showy stage to recount to its story.

Once On This Island Chicago Tickets

In this vivid experience, spectators are cleared away with the emotions of the story. Inundated with shading, an incredible score and a story that has risen above time, Once On This Island is a definitive vibe great melodic while giving a social message that everyone could regard. So before they are sold out get your Once On This Island Chicago Tickets. Tickets4Chicago is selling them cheaper than most of the ticket vendors. With secure payment methods and on-time delivery, we are indeed your best choice. To top it all, we also offer Once On This Island Chicago Tickets Discount.

What’s Once on This Island About?

Occurring on Haiti in the mid twentieth century, the population of this little island are part between the darker-cleaned ‘workers’ and the lighter-cleaned wealthier population. In an abrupt blaze flood, a little youngster (Ti Moune) is washed away, anyway the island divine beings look merciful upon her and spare her life, solidifying her significant fate.

A long time later, Ti Moune’s predetermination happens as intended as she protects a youthful rich man from a comparable situation that be-falled her in her adolescence. Anyway Ti Moune has a decision, so as to spare this youngster’s life she should exchange her spirit.

Cheap Potted Potter Chicago Tickets
American Ballet Theatre Chicago Tickets

Florida Georgia Line Nab Three ACM Decade Awards: ‘These Are Massive Honors’

Florida Georgia Line have a progression of new grants to add to their accumulations. The couple’s Brian Kelley and Tyler Hubbard have been enlivened with three new grants from the Academy of Country Music, made to pay tribute to the their trailblazing endeavors.

Florida Georgia Line

FGL have been named as the primary beneficiaries of the ACM Breakout Artist of the Decade Award, while their profession characterizing hit “Journey,” which went through 24 weeks at No. 1 on the Billboard Hot Country Songs outline in 2013, has been perceived with the ACM Single of the Decade Award. Moreover, their record-breaking two part harmony with Bebe Rexha, “Intended to Be,” which sat at No. 1 on the Hot Country Songs outline for 50 weeks, has been respected with the ACM Music Event of the Decade Award.

“This is amazing. These are three immense, huge distinctions,” Kelley said when he and Hubbard were amazed with the trophies behind the stage at the last show on their Can’t Say I Ain’t Country Tour at the FivePoint Amphitheater in Irvine, Calif. “It truly means a great deal – it’s an astonishing, lowering approach to end this period of life and this visit.”

“It’s been an unfathomable year, staggering visit – there’s been a family, a bond, and a fraternity that is occurred around here, [and I] couldn’t envision a superior method to complete this visit out,” Hubbard includes.

The new honors give the “Basic” artists an aggregate of nine ACM Awards. Their three ACM Decade Awards are among a progression of new decade-explicit distinctions the association has made to respect down home music’s most significant specialists. Ticket2concert is a well-known Cheap Florida Georgia Line Chicago Concert Tickets selling site with amazing deals at Tickets4Chicago. You get access to inventory full of most up and coming artists with details like that of concert dates and times. Kenny Chesney, Florida Georgia Line & Old Dominion are doing concert in Chicago together. Cheap Kenny Chesney Chicago tickets are also available.

Avalanches: A Slippery Slope to Danger

Extreme Skiing Mixed with Extreme Conditions Warrant Extreme Preparedness. According to the National Ski Patrol, the growing interest in free skiing and riding is pushing more skiers and snowboarders to venture outside of ski area boundaries in search of perfect powder. However beautiful the backcountry may be, those pristine slopes come with multiple risks, and one of the most significant is the risk of avalanche.
Snow conditions in the backcountry are far more unpredictable than those where the snow is groomed snow, such as that found at ski resorts. Backcountry areas are also not patrolled.

Although, snow experts use a wide variety of advanced technology to track and predict avalanche conditions the risk still remains.  So, before you hit those pristine alpine glades this season take a minute to brush up on avalanche safety tips and check out the resources here in Colorado designed to help you stay informed.

Basic Avalanche Safety Tips

  • 30 Degree Slopes: The key to avoiding avalanches is to stay away from terrain where those conditions exist.  Avalanche terrain exists on any slope steeper than 30 degrees. It doesn’t matter if it is a big slope or a very small slope. It doesn’t matter if it is an open slope or one with trees. If it is steeper than 30 degrees it can produce an avalanche.
  • Runout Zones:  Avalanches have caught many people unaware because they were below avalanche terrain in what is called a runout zone (the place where avalanche debris like trees and rocks typically come to rest).  These slopes are as steep as expert black diamond runs and some intermediate blue runs. Even if the slope doesn’t appear that steep it is considered avalanche terrain if the slope above it is steep.
  • Frequency:   Avalanches do not occur every day. It all depends on snow conditions and the weather.  Generally, most avalanches occur during storms or during the 24-48 hours following one.
  • Check Conditions: Because avalanche conditions can change rapidly from one day to the next check current conditions and get avalanche danger ratings from a regional avalanche center.
  • Triggers:  An avalanche will not occur without a trigger. This trigger could be weight from additional snow or weight from a person traveling on the snow.
    • Instability:  Avalanches are more likely to occur after a heavy snowfall as this increases snow instability.
    • Melting Snow:  Wet avalanches are likely to occur in warmer temperatures. Melting snow adds moisture which weakens the bond between snow layers.
    • Recent Activity:  Recent avalanche activity in the same area is an indicator of snow instability. It’s also a sign that more avalanches are likely to occur.
    • Wind:  Wind can create dangerous snow slabs. If there has recently been high wind, an avalanche is more likely to occur.
    • Cracks:  Cracks in the snow surface and/or “whoomping” sounds mean that a weak layer is collapsing and the snowpack is unstable.

Saf ety Tools

According to the Forest Service National Avalanche Center, the following tools should be carried when going into the backcountry:

General Tools

  • Snow saw
  • Probes
  • Slope meter
  • Monocular (can magnify up close and far away)
  • Walkie talkies
  • Bivy Sack (a small, waterproof shelter)
  • Climbing skins (allow skis to climb on a slope)
  • Avalanche Beacon
  • Shovel
  • Backpack
  • Spare Strap
  • Snow science kit
  • Avalung or an Air Bag System
  • Helmet
  • Headlamp
  • Water bottle
  • Stove and fuel
  • Toolkit
  • Map and compass
  • First aid kit

 Avalanche Preparedness Tools

  • Avalanche beacon – emits a signal over a distance of 60 to 100 feet. Always ski with an avalanche beacon in transmit mode. If searching for an avalanche victim, switch to receive mode.
  • Avalung – a sling or backpack-style air pack that can allow the user to breathe for approximately one hour if no other air is available.
  •  Airbag pack – Deployable pack designed to keep an avalanche victim closer to the surface. Also helps to increase body volume, giving the victim more free space within the avalanche.
  • Helmet – Nearly 30 percent of avalanche fatalities are caused by trauma. A helmet can reduce this risk.

Repair/ Survival Kit

  • Extra food and water
  • Extra clothes such as gloves, hat, socks, insulated coat and pants
  • Headlamp
  • Extra binding parts
  • Pocket tool with Pozidrive screwdriver
  • Wire, duct tape
  • Epoxy, strip screw inserts, steel wool
  • Candle/matches/lighter
  • Emergency thermal blanket
  • Chemical hand warmers
  • Knife
  • Extra beacon and headlamp batteries
  • Consider carrying a light gas stove to melt snow (they weigh about the same as a liter of water).

What to do if you get caught by an Avalanche

The following tips are from the Forest Service National Avalanche Center:

  • Try to ski or board off the avalanche slab by maintaining momentum and angling to the edge of the slide. Discard poles (never ski in the backcountry with your pole straps on).
  • If you have releasable bindings and your skis or board comes off, roll on to your back with your feet downhill. Swim hard upstream to try to get to the rear of the avalanche.
  • Dig into the surface to slow yourself down and let as much debris as possible go past.
  • Grab a tree if you can.
  • Fight.
  •  As the avalanche slows, try to thrust your hand or some part of your body above the surface and then stick a hand in front of your face to make an air space around your mouth.
  • If completely buried, try to remain calm–hopefully, your partners have practiced rescue techniques and they will quickly find you.

Know Before You Go

In Colorado, the Colorado Avalanche Information Center (CAIC) offers training courses and current snow and avalanche conditions. Visit them online at
The CAIC’s Twitter feeds provide timely information and updates on avalanche and snow conditions.  Simply follow the area or areas that are of interest to you:

  • CAIC – Steamboat and Flat Tops Info –
  • CAIC – Front Range –
  • CAIC – Vail and Summit County –
  • CAIC – Sawatch Range –
  • CAIC – Aspen –
  • CAIC – Gunnison –
  • CAIC – Grand Mesa –
  • CAIC – Northern San Juan –
  • CAIC – Southern San Juan –
  • CAIC – Sangre de Cristo –
  • CAIC – Off-Season Avalanche Information –

Information Sources

  • U.S. Forest Service National Avalanche Center
  • National Ski Patrol
  • Colorado Avalanche Information Center

National Preparedness Month: Fire

September is National Preparedness Month!

If disaster struck today would you be prepared? Preparation begins with you and your family. Do you have a plan?

The theme for this week is fire. Being ready for wildfire in Colorado means taking the time now to learn how to safely mitigate, prepare, respond and recover from wildfire.

We have a responsibility to take care of our wonderful state through active mitigation activities and responsible recreation. Before, during and after fire strikes we must remain informed, prepared and ready to take the pro-active steps necessary to ensure that safety is our primary objective.

Critical to this mission is signing up to receive emergency notifications and then quickly acting on the alerts when they are received. You can get started by finding your local emergency response agencies as

Being ready for wildfire in Colorado also means having a plan to our family, friends and broader community to provide mental and emotional support during a time of need.

Each and every one of us has an important obligation to ensure that we are ready to mitigate, prepare, respond and recovery from wildfire. Take the time today to review your wildfire knowledge and put the tips into practice. You can get started by visiting

Follow READYColorado for more preparedness tips and resources!

Stay tuned to READYColorado and our partners for additional wildfire mitigation, preparedness, response and recovery information.

• READYColorado/wildfire
• Red Cross – Wildfire
• Ready, Set, Go!

Share your preparedness tips using the hashtag #COFlood on FacebookTwitter and Google +.

Bombs and Explosives

A terrorist attack on the United States remains a significant and pressing threat. Improvised explosive devices (IEDs) remain the terrorist weapon of choice due to their relative ease of construction, availability, and destructive capacity.

An improvised explosive device attack is the use of a “homemade” bomb and/or destructive device to destroy, incapacitate, harass or distract. IEDs can come in many forms, ranging from a small pipe bomb to a sophisticated device capable of causing massive damage and loss of life. IEDs may be surrounded by or packed with additional materials or “enhancements” such as nails, glass, or metal fragments designed to increase the amount of shrapnel propelled by the explosion. Enhancements may also include other elements such as hazardous materials.

Nevertheless, there are things you can do to prepare for the unexpected. Explore the information below to learn about the preparedness measures you can take and how to be proactive if you see something suspicious!

Cover photo courtesy of FEMA/Andrea Booher

Banner photo courtesy of the FBI

Within text photo courtesy of FEMA/News Photo


The number one way to protect yourself and others from an IED attack is to be aware of your surroundings and to report anything that is out of the ordinary.

Steps to Take if You See Something Suspicious

“If you see something, say something!” It can be difficult to determine when to report something suspicious. People most familiar with a given environment are in the best position to determine whether or not something seems suspicious.

Follow the guidelines below:

  • Trust your instincts – if something feels wrong, don’t ignore it.
  • Do not assume that someone else has already reported it.
  • Call local authorities.
  • Keep your distance from a suspicious package – do not approach or tamper with it.
  • When you make a report, be ready to provide your name and location, a description of what you think is suspicious, and the time you saw it. The responding officer will assess the situation, ensure the area is evacuated and call for appropriate personnel and equipment. 

Make a Personal Plan for Response

Preparation is key!  Everyone can take the following steps to prepare for an IED attack:

  • Learn the emergency procedures at your place of work, any other sites you visit regularly, and any public transportation systems you use. Communication systems may be inoperable in an emergency, so you should be familiar with what steps to take.
  • Know how to get out of the area. If you work far from home, plan backups to get home if the usual modes of transit are not operating.
  • Know the routes to hospitals in your community.
  • Take a first aid course.
  • Make a family emergency plan ─ remember that family members may be in separate locations at the time of an attack.
  • Designate an “out-of-area” contact, and make sure that everyone in your family has that individual’s phone number.
  • Have an emergency supply kit at work and at home that includes water and non-perishable food to last at least three days, battery-powered radio, first aid kit, flashlights, and batteries.


If you are at the immediate site of an IED attack, your top priority is to get out of the area. This increases your safety in case a secondary device is present in the area and minimizes your exposure to dust, smoke, and any hazardous substances that may have been released as a result of the blast. This also allows emergency responders to find and assist the most critically injured victims.

Click here to learn more about the steps you can take in different situations during an IED attack.


Some health effects caused by IEDs, including eye injuries and abdominal injuries, may not be apparent initially, but can cause symptoms and even fatalities hours to months after the event. Seek medical attention if you are experiencing any of these symptoms.

Additionally, psychological effects in survivors, first responders, and others may be present and are not unusual in the aftermath of a high-casualty event. Assistance from mental health professionals may be necessary.

More Information:

References, Resources and More Information:

  • – Explosions
  • Colorado Information Analysis Center
  • Counterterrorism Education Learning Lab (The CELL)
  • Centers for Disease Control and Prevention – Mass Casualty Event Preparedness and Response
  • Centers for Disease Control and Prevention – Preparing for a Bombing
  • Department of Homeland Security

Fast Facts:

  • Explosives are one of the most frequently used weapons by terrorists.
  • Many commonly available materials, such as fertilizer, gunpowder, and hydrogen peroxide, can be used as explosive materials in IEDs.
  • The term IED came into common usage during the Iraq War that began in 2003.
  • A known bomber tactic is to use a distraction, such as gunfire or small bombs, to attract bystanders to a window, a doorway, or outside, and then detonate a second destructive device at the gathering point.


Past terrorist attacks have left many concerned about the possibility of future incidents of terrorism in the United States and their potential impact.  A terrorist attack on the U.S. remains a significant and pressing threat.  Terrorist operations usually begin with extensive planning and can happen anytime, anywhere, but you can help prevent and detect terrorism by watching out for suspicious activities and by reporting them to the proper authorities. Be alert for the eight signs of terrorism, which can be found below!

Cover photo courtesy of FEMA/Andrea Booher

Banner photo courtesy of FEMA/Lauren Hobart

Within text photo courtesy of FEMA/Jocelyn Augustino


8 Signs of Terrorism

Surveillance: Terrorists may conduct surveillance to determine a target’s strengths and weaknesses. Be aware of someone who appears to be monitoring security personnel or equipment, or gauging emergency response time.  Suspicious activities may include using vision enhancing devices or cameras, acquiring floor plans or blueprints, drawing diagrams and showing interest in security and access to facilities.

Elicitation: People or organizations attempting to gain information about military operations, capabilities, or people. Elicitation attempts may be made by mail, email, telephone, in person or even by gaining employment at the location.

Tests of Security: Any attempt to measure reaction times to security breaches, attempts to penetrate physical security barriers, or monitor procedures in order to assess strengths and weaknesses.

Funding: Terrorists need to raise money for their operations and spend it in a way that doesn’t draw attention.  Be aware of unusually large transactions paid with cash or gift cards, collections for donations and solicitations for money. 

Supplies: To conduct an attack, terrorists may need a variety of supplies, such as weapons, uniforms, badges, and communication systems.

Impersonation: Terrorists may impersonate law enforcement officers, firefighters, mail carriers, or company employees to gain information. Someone who seems suspicious in what they say or do on the job could be a red flag.

Rehearsal: Terrorists often rehearse a planned attack to make sure their operation runs smoothly. This may include measuring response time by emergency responders, mapping routes and determining the timing of traffic lights.

Deployment: This is when terrorists are putting their plans into place, getting into position, and moving equipment and supplies.  If you observe this type of activity, this is your last chance to alert authorities before the attack is launched.  If you believe there is imminent danger, call 911 immediately.

VIDEO: Recognizing the 8 Signs of Terrorism

See Something, Say Something!

The nationwide “If You See Something, Say Something” public awareness campaign was created to raise public awareness of indicators of terrorism and terrorism-related crime, and to emphasize the importance of reporting suspicious activity to the proper local law enforcement authorities. If you see something suspicious taking place, report the behavior or activity to local law enforcement.  In the event of an emergency, call 9-1-1. Factors such as race, ethnicity, national origin, or religious affiliation alone are not suspicious.  Never try to handle or intervene in the situation on your own – let trained authorities handle the situation.

Recognizing Suspicious People

Suspicious people may often be identified by their behavior. While no one behavioral activity is proof that someone is planning to act inappropriately, these factors can help you assess whether someone poses a threat.

Behavioral factors to watch for include:

  • Nervousness or other signs of mental discomfort.  This may include sweating or “tunnel vision” (staring forward inappropriately).
  • Inappropriate, oversize, loose-fitting clothes (i.e. a heavy overcoat on a warm day).
  • Keeping hands in pockets or cupping hands (i.e. holding a triggering device).
  • Constantly favoring one side or one area of the body as if wearing something unusual/uncomfortable (i.e. a holster). Pay attention to someone who is constantly adjusting waistbands, ankles, or other clothing. Suicide bombers have been known to repeatedly pat themselves to verify that the bomb vest or belt is still attached.


  • Remain as calm as possible.
  • Follow the instructions of local emergency officials.
  • If you are in the immediate vicinity, check yourself and others for injuries. If you are not injured, give first aid and get help for seriously injured people.
  • If you are not in the immediate area, do not move to the scene of the incident.
  • Listen to your radio or television for news to obtain information.
  • Call your family contact; do not use the telephone again unless it is a life-threatening emergency.


An act of terrorism may have wide-spread and devastating results.

You should be prepared for the following:

  • Heavy law enforcement presence in surrounding areas.
  • Extensive media coverage for a prolonged period of time.
  • Workplace and school closures.
  • Restrictions on domestic and international travel.
  • Clean-up make take months.
  • Psychological effects in survivors, first responders, and others may be present and are not unusual in the aftermath of a high-casualty event. Assistance from mental health professionals may be necessary.

More Information:

References, Resources and More Information:

  • Division of Homeland Security and Emergency Management
  • Colorado Information Analysis Center
  • Counterterrorism Education Learning Lab (The CELL)
  • National Terrorism Advisory System
  • Red Cross – Terrorism Preparedness
  • Department of Homeland Security
  • Security Management
  • FEMA
  • Federal Bureau of Investigation – Najibullah Zazi Pleads Guilty to Conspiracy to Use Explosives Against Persons or Property in U.S., Conspiracy to Murder Abroad, and Providing Material Support to al Qaeda

It Happened Here

Najibullah Zazi, a citizen of Afghanistan and a legal resident of the United States, plotted to bomb the New York City subway system in September 2009.  In January 2009, Zazi moved to Colorado and worked as a shuttle bus driver at the Denver International Airport.  On Sept. 8, 2009, Zazi drove from Denver to New York, taking with him the explosives and other materials necessary to build the bombs.  Zazi and others intended to obtain and assemble the remaining components of the bombs over the weekend and conduct the attack on the Manhattan subway system on September 14, 15 or 16, 2009.  However, shortly after arriving in New York, Zazi realized that law enforcement was investigating his activities. Zazi and others discarded the explosives and other bomb-making materials, and Zazi traveled back to Denver.  He was arrested on Sept. 19, 2009.

Fast Facts:

  • In 2012, there were 6,771 terrorist attacks worldwide.
  • The word “terrorism” first appeared in France (terrorisme) in 1795.
  • A terrorist can be an individual or part of an organization.
  • If you see something, say something!

Cyber Crime

Cyber crime is one of the fastest growing areas of crime.  Our daily lives, economic growth, and national security depend on a stable, safe, and resilient cyberspace. We rely on this vast array of networks to communicate and travel, power our homes and run our economy.  Yet cyber crimes have increased over the last decade, exposing sensitive personal and business information, disrupting critical operations, and imposing high costs on the economy.  More and more criminals are exploiting the speed, convenience and anonymity that modern technologies offer in order to commit a diverse range of criminal activities. These include attacks against computer data and systems, identity theft, as well as the deployment of viruses, and various email scams such as phishing.  Additionally, the threat of terrorism forces authorities to address security vulnerabilities related to information technology infrastructure such as power plants, electrical grids, information systems and the computer systems of government and major companies. Cyber crime even encompasses the realms of cyber bullies and cyber predators. 

Although cyber crime is a serious concern, learning about the risks is the first step to protecting yourself.  Explore the information below to learn more about what you can do to stay safe online!

Cover photo courtesy of Interpol

Banner photo courtesy of the DHS

Within text photo courtesy of the FBI


While cyber crime encompasses a number of different areas, there are steps you can take to protect yourself and your family before an incident occurs.

Protecting yourself against cyber criminals:

  • Use and regularly update antivirus and antispyware software on all your electronic devices.
  • Keep your internet browsers up to date.
  • Only connect to the Internet over secure, password protected networks.
  • Do not click on links or pop-ups, open attachments, or respond to emails from unknown individuals.
  • Always enter a URL by hand instead of following links if you are unsure of the sender.
  • Do not respond to online requests for personal information; most organizations such as banks, universities, and companies do not ask for your personal information over the Internet.
  • Limit who you are sharing information with by reviewing the privacy settings on your social media accounts.
  • Trust your gut; if you think an offer is too good to be true, then it probably is.
  • Password protect all devices that connect to the Internet and user accounts.
  • Use strong passwords. Strong passwords use letters, numbers, and symbols, and are easy to remember, but difficult to guess. 
  • Do not use the same password twice and change them frequently. 
  • If you see something suspicious, report it to the proper authorities.

Protecting yourself against cyber predators:

  • Never share your personal information with someone you don’t know.
  • Do not post personal information, such as your phone number or email address on social media sites.
  • Do not meet with people in person with whom your only contact has been online.
  • Avoid any sort of sexual talk online.
  • Use privacy settings to restrict who can see your online profile.

Protecting yourself against cyber bullies:

  • If you are bullied online or on your phone, ignore it. Bullies look for a response, and ignoring it will help it to stop.
  • Block or delete any cyber bullies from your social media profiles.
  • Stand up for others being bullied. Bullies will usually stop if another person steps in to stop it.
  • If you are a parent, talk to your kids about cyber bullying and its effects. Teach your children good online etiquette and be a good example to them.


The following are immediate actions to take if you encounter instances of cyber crime:

If you suspect you’ve been a victim of cyber theft or intrusion:

  • Check to make sure the software on all of your systems is up-to-date.
  • Run a scan to make sure your system is not infected or acting suspiciously.
  • If you find a problem, disconnect your device from the Internet and perform a full system restore.

If you believe your personal information is compromised:

  • Immediately change all passwords; financial passwords first. If you used the same password for multiple resources, make sure to change it for each account, and do not use that password in the future.
  • If you believe the compromise was caused by malicious code, disconnect your computer from the Internet.
  • Restart your computer in safe mode and perform a full system restore.
  • Contact banks where you have accounts, as well as credit reporting companies.
  • Close any accounts that may have been compromised. Watch for any unexplainable or unauthorized charges to your accounts.

If you encounter a cyber predator:

  • Immediately cease contact with the individual.
  • Report the incident to local law enforcement.

If you are a victim of cyber bullying:

  • Report the bully to an adult or other authority. While fear may make it difficult to report the problem, talking to someone about it will help it stop.
  • Block or delete the bully from any social media or other types of contact.
  • Do your best to ignore instances of bullying.


There are steps you can take after an incident of cyber crime to help prevent becoming a victim a second time.

If you are a victim of cyber crime:

  • File a report with the local police so there is an official record of the incident.
  • Report online crime or fraud to your local United States Secret Service (USSS) Electronic Crimes Task Force or the Internet Crime Complaint Center.
  • If your PII was compromised, consider other information that may be at risk. Depending what information was stolen, you may need to contact other agencies, such as the Social Security Administration.
  • For further information on preventing and identifying threats, visit US-CERT’s Alerts and Tips page.

If you are a victim of a cyber predator:

  • Make sure to file a report with your local police department. If the victim was a child, also report the incident to the National Center for Missing and Exploited Children.
  • Take steps in the future to protect your personal information (see before tab).

If you are a victim of cyber bullying:

  • Make sure you report the bullying to authorities. 
  • Do your best to avoid the bullies in the future.
  • Talk about the issue with your parents or other adults. They can assist you in stopping the problem and help you cope. 

More Information:

References, Resources and More Information:

  • – Cyber Attack
  • United States Computer Emergency Readiness Team
  • Internet Crime Complaint Center
  • U.S. Department of Homeland Security Stop.Think.Connect.
  • Interpol
  • FBI – Cyber Crime

Cyber Bullying Research Center

  • The Cyberbullying Research Center is dedicated to providing up-to-date information about the nature, extent, causes, and consequences of cyberbullying, and the negative use of social networking among adolescents. This web site provides cyberbullying research, stories, cases, downloads, fact sheets, online quizzes, tips and strategies, news headlines, a blog, and a number of other helpful resources on their comprehensive public service web site.
  • Report Cyberbullying or inappropriate conduct to social media sites, search engines, cell phone providers, internet providers, and internet games.  

Cyber-Safety Action Guide

  • A tool created by the Anti-Defamation League. Click the links for various online companies and social media sites to learn their general hate speech policies, cyberbullying/harassment policies, and how to report hate speech, cyberbullying, and harassment. 

Federal Trade Commission (FTC) Consumer Privacy and Identity Information

  • This website contains information on computer security, kids’ online safety, protecting your identity, and repairing identity theft. 
  • Safeguarding Your Child’s Future – An FTC Document on how to protect your child’s identify from identity thieves. 

Internet Safety 101

  • Supported by the Office of Juvenile Justice and Delinquency Prevention (OJJDP) this information is produced by Enough Is Enough (EIE), a non-partisan, 501(c)(3) non-profit organization, emerged in 1994 as the national leader on the front lines to make the Internet safer for children and families. Since then, EIE has pioneered and led the effort to confront online pornography, child pornography, child stalking and sexual predation with innovative initiatives and effective communications.

Net Cetera: Chatting with Kids about Being Online

  • A booklet published by the FTC designed to offer parents practical tips on helping their children navigate the online world. 


  • The Netsmartz Workshop is an interactive, educational safety resource from the National Center for missing & Exploited Children (NCMEC) and Boys & Girls Clubs of America (BGCA) for children aged 5 to 17, parents, guardians, educators, and law enforcement that uses age-appropriate, 3-D activities to teach children how to stay safe on the Internet. 

Safe Online Surfing (SOS)

  • This site, launched by the FBI in 2012, is a site where website where students can learn about cyber safety through games, videos, and other interactive features. It teaches kids in third through eighth grades how to recognize and respond to online dangers such as cyberbullying, online predators, and identity thieves.

  • Created by the National Cyber Security Alliance, this site provides tools to teach online safety, tips on how to stay safe online, and information on how to protect your business.

  • A website created by the Federal Trade Commission that offers information on how to avoid scams, protect kids online, secure your computer, and browse the internet safely. 

Cyber Security Tip Sheets

  • Ten Cybersecurity Tips for Small Business – Stop. Think. Connect. – Department of Homeland Security
  • Small Business Cybersecurity Tip Card – Stop. Think. Connect. – Department of Homeland Security
  • Government Cybersecurity Tip Card – Stop. Think. Connect. – Department of Homeland Security 
  • Rules ‘n Tools Checklist – Internet Safety Tool for Parents – Internet Safety 101
  • Cyber Tips for Older Americans – Stop. Think. Connect. – Department of Homeland Security
  • Cybersecurity for Kids Tip Card – Stop. Think. Connect. – Department of Homeland Security 
  • Grades K-8 Student Tip Card – Stop. Think. Connect. – Department of Homeland Security 
  • Grades 9-12 Student Tip Card – Stop. Think. Connect. – Department of Homeland Security
  • College Student Tip Card – Stop. Think. Connect. – Department of Homeland Security

Internet Safety Pledges – From Netsmartz

  • Primary
  • Intermediate
  • Middle and High School

Active Shooter

An active shooter is an individual actively engaged in killing or attempting to kill people in a confined and populated area.  In most cases, active shooters use firearms(s) and there is no pattern or method to their selection of victims. Active shooter situations are unpredictable and evolve quickly. Typically, the immediate deployment of law enforcement is required to stop the shooting and mitigate harm to victims. Because active shooter situations are often over within 10 to 15 minutes, before law enforcement arrives on the scene, individuals must be prepared both mentally and physically to deal with an active shooter situation.

Nevertheless, there are things you can do to prepare for the unexpected.  Preparing for such events will reduce the stress that you may feel now, and later, should another emergency arise.  Explore the information below to see how you can better prepare yourself for these types of situations!

Cover photo courtesy of the DHS

Banner photo and photo within text courtesy of the FBI


Key Considerations of the Active Shooter

  • There is no one demographic profile of an active shooter.
  • Many active shooters display observable pre-attack behaviors, which, if recognized, can lead to the disruption of the planned attack.
  • The pathway to targeted violence typically involves an unresolved real or perceived grievance and an ideation of a violent resolution that eventually moves from thought to research, planning, and preparation.
  • Bystanders generally represent the greatest opportunity for the detection and recognition of an active shooter prior to his or her attack.
  • Concerning active shooters, a person who makes a threat is rarely the same as the person who poses a threat.
  • Successful threat management of a person of concern often involves long-term caretaking and coordination between law enforcement, mental health care, and social services.
  • Exclusionary interventions (i.e. expulsion, termination) do not necessarily represent the end of threat-management efforts.
  • While not every active shooter can be identified prior to attacking, many potential active shooters who appear to be on a pathway toward violence can be stopped.

Steps to Take if You See Someone or Something Suspicious

“If you see something, say something!” It can be difficult to determine when to report someone or something suspicious. People most familiar with a given environment are in the best position to determine whether or not something seems out of the ordinary. 

  • Be aware of your environment and any possible dangers.
  • Trust your instincts ─ if something feels wrong, don’t ignore it.
  • Take note and ensure that the facility you’re at has at least two evacuation routes.
  • Post evacuation routes in visible locations throughout the facility (i.e. work).
  • Encourage law enforcement, emergency responders, SWAT teams, K-9 teams, and bomb squads to train for an active shooter scenario at your location.
  • Do not assume that someone else has already reported the suspicious activity. 
  • Call local authorities.  When you make a report, be ready to provide your name and location, a description of what you think is suspicious, and the time you saw it. The responding officer will assess the situation, ensure the area is evacuated and call for appropriate personnel and equipment.



If there is an accessible escape path, attempt to evacuate the premises.

Be sure to:

  • Have an escape route and plan in mind. Evacuate regardless of whether others agree to follow.
  • Leave your belongings behind.
  • Help others escape, if possible.
  • Prevent individuals from entering an area where the active shooter may be.
  • Keep your hands visible.
  • Follow the instructions of any police officers.
  • Do not attempt to move wounded people.
  • Call 911 when you are safe.

Hide Out

If evacuation is not possible, find a place to hide where the active shooter is less likely to find you.

Your hiding place should:

  • Be out of the active shooter’s view.
  • Provide protection if shots are fired in your direction (i.e., an office with a closed and locked door).
  • Not trap you or restrict your options for movement. 

To prevent an active shooter from entering your hiding place, lock the door and blockade with heavy furniture.

If the active shooter is nearby:

  • Silence your cell phone and/or pager.
  • Turn off any source of noise (i.e., radios, televisions).
  • Hide behind large items (i.e., cabinets, desks).
  • Remain quiet.

If evacuation and hiding out are not possible:

  • Remain calm and dial 911, if possible, to alert police to the active shooter’s location.
  • If you cannot speak, leave the line open and allow the dispatcher to listen.

Take Action

As a last resort, and only when your life is in imminent danger, attempt to disrupt and/or incapacitate the active shooter by:

  • Acting as aggressively as possible against him/her.
  • Throwing items and improvising weapons.
  • Committing to your actions.

How to react when law enforcement arrives:

  • Remain calm, and follow officers’ instructions.
  • Put down any items in your hands (i.e., bags, jackets).
  • Immediately raise hands and spread fingers.
  • Keep hands visible at all times.
  • Avoid making quick movements toward officers.
  • Avoid pointing, screaming and/or yelling.
  • Do not stop to ask officers for help or direction when evacuating, just proceed in the direction from which officers are entering the premises. 

The first officers to arrive to the scene will not stop to help injured persons; their main goal is to locate and stop the active shooter. Expect rescue teams comprised of additional officers and emergency medical personnel to follow the initial officers. These rescue teams will treat and remove any injured persons. They may also call upon able-bodied individuals to assist in removing the wounded from the premises. 


  • Once you have reached a safe location or an assembly point, you will likely be held in that area by law enforcement until the situation is under control, and all witnesses have been identified and questioned. Do not leave until law enforcement authorities have instructed you to do so.
  • Psychological effects in survivors, first responders, and others may be present and are not unusual in the aftermath of a high-casualty event. Assistance from mental health professionals may be necessary.

More Information:

References, Resources and More Information:

  • U.S. Department of Homeland Security – Active Shooter Preparedness
  • Federal Bureau of Investigation – Active Shooter

It Happened Here

On July 20, 2012, a mass shooting occurred inside a movie theater in Aurora during a midnight screening of The Dark Knight Rises. A gunman, dressed in tactical clothing, set off tear gas grenades and shot into the audience with multiple firearms, killing 12 people and injuring dozens of others.

Fast Facts:

  • The shooter often stops as soon as he/she hears or sees law enforcement.
  • In 10% of the cases, the shooter stops and walks away. In 20% of the cases, the shooter moves to another location.
  • 2% of the shooters bring improvised explosive devices as an additional weapon.
  • The average active shooter incident lasts 12 minutes. 37% last less than 5 minutes.

Infrastructure Failure


Pure natural gas is colorless and odorless. Scents are usually added to assist in identifying leaks. This odor commonly takes the form of a rotting egg aroma. Persons detecting the odor should immediately evacuate the area. Do not start a fire or use sparking electrical equipment. As a result of the Pipeline Safety Improvement Act of 2002 passed in the United States, Federal safety standards require companies providing natural gas to conduct safety inspections for gas leaks in homes and other buildings receiving natural gas. The gas company is required to inspect gas meters and inside gas piping from the point of entry into the building to the outlet side of the gas meter for gas leaks.


The loss of electrical power for a long enough time would be expected to cause a certain proportion of affected persons to undergo serious hardships ─ particularly those who have special medical needs or disabilities. Shortages of certain types of goods or services may affect Colorado, even if the blackout itself is not directly experienced here. Similarly, gaps in communication, information, or service networks may have an effect well beyond the actual area that lacks electrical power.


Water is an essential part of every community.  It is a necessary component of producing sectors, a key ingredient to sustaining life for its population, and is indispensable to fire protection and other specialized uses. The reality is that Colorado is far from 100% self-sufficient in its fresh water supplies. Moreover, waterways that import water into the region are vulnerable to natural disasters, terrorist attacks, technological accidents, and regulatory changes.  A major disruption of these external water supplies could potentially have devastating effects on the economy and the quality of life of its people.

Banner photo courtesy of FEMA/Wendell Davis

Within text photo courtesy of FEMA/Norman Lenburg



Be aware of your surroundings and note things such as:

  • A damaged connection to a gas appliance.
  • Dirt or water being blown into the air.
  • Dead or dying vegetation (in an otherwise moist area) over or near pipeline areas.
  • A fire or explosion near a pipeline.
  • Exposed pipeline after an earthquake, fire, flood or other disaster.
  • An unusual sound, such as a hissing, whistling or roaring sound near a gas line or appliance.
  • The distinctive odor of natural gas.


  • Along with a supply of water, flashlights with extra batteries are essential home emergency supplies. More powerful battery-powered lanterns also are a wise investment.
  • Portable generators are increasingly popular and invaluable during a power outage, but they emit deadly carbon monoxide gas and must be used properly. Never use generators indoors. Always place them at least 15 feet from doors and windows.
  • Some families use dry ice for refrigeration following an outage. Families with members who have power-dependent health needs (i.e. oxygen, dialysis) should have an emergency plan in place at all times.


  • Families should have enough bottled water on hand at any time to get through a water outage lasting up to 72 hours. According to federal standards, that is at least one gallon per person, per day, for drinking and sanitation. If you are a pet owner, purchase and store extra water for your pets. Count a pet as a person when figuring how much water you need.
  • If you are an elderly individual or a person with disabilities, ask a family member or a friend to purchase extra water for you at the store. Conversely, if you have vulnerable relatives or neighbors, make sure they have extra water. Do not wait until an outage occurs!
  • A tip for citizens on the municipal water system: During an outage, pour water down your toilet bowl to manually flush it. Consider purchasing additional water strictly for flushing. In the winter time, snow is a great resource during a water outage. Melt snow in large pans and use the melted snow rather than purchased water to flush your toilets.



  • Remain calm.
  • Don’t light matches, candles, or cigarettes.
  • Don’t turn electrical appliances or lights on or off or use any device that could cause a spark.
  • Immediately evacuate the area.


  • Fire officials strongly discourage the use of candles during a power outage because of the risk of fire.

Keep food as safe as possible by:

  • Keeping refrigerator and freezer doors closed as much as possible. First use perishable food from the refrigerator. An unopened refrigerator will keep foods cold for about 4 hours.
  • Then use food from the freezer. A full freezer will keep the temperature for about 48 hours (24 hours if it is half full) if the door remains closed.
  • Using your non-perishable foods and staples after using food from the refrigerator and freezer.
  • If it looks like the power outage will continue beyond a day, prepare a cooler with ice for your freezer items.
  • Keep food in a dry, cool spot and keep it covered at all times.

Be safe with electrical equipment by:

  • Turning off and unplug all unnecessary electrical equipment, including sensitive electronics.
  • Turning off or disconnect any appliances (like stoves), equipment or electronics you were using when the power went out. When power comes back on, surges or spikes can damage equipment.
  • Leave one light turned on so you’ll know when the power comes back on.
  • Eliminating unnecessary travel, especially by car. Traffic lights will be out and roads will be congested.
  • When using a portable generator, connect the equipment you want to power directly to the outlets on the generator. Do not connect a portable generator to a home’s electrical system. If you are considering getting a generator, get advice from a professional, such as an electrician. Make sure that the generator you purchase is rated for the power that you think you will need.


  • Reduce your consumption and water usage.
  • Water contaminated with fuel or toxic chemicals will not be made safe by boiling or disinfection. Use a different source of water if you know or suspect that water might be contaminated with fuel or toxic chemicals.
  • If you don’t have safe bottled water, you should boil water to make it safe. Boiling is the surest method to make water safer to drink by killing disease-causing organisms, including viruses, bacteria, and parasites



  • Open windows and doors to air out any enclosed areas.
  • Make sure any necessary repairs are completed.


  • Do not touch any electrical power lines and keep your family away from them. Report downed power lines to the appropriate officials in your area.
  • Throw away any food that has been exposed to temperatures 40° F (4° C) for two hours or more or that has an unusual odor, color or texture. When in doubt, throw it out!
  • Never taste food or rely on appearance or odor to determine its safety. Some foods may look and smell fine, but if they have been at room temperature too long, bacteria causing foodborne illnesses can start growing quickly. Some types of bacteria produce toxins that cannot be destroyed by cooking.
  • If food in the freezer is colder than 40° F and has ice crystals on it, you can refreeze it
  • If you are not sure if food is cold enough, take its temperature with the food thermometer. Throw out any foods (meat, poultry, fish, eggs and leftovers) that have been exposed to temperatures higher than 40° F (4° C) for 2 hours or more, and any food that has an unusual odor, color or texture, or feels warm to touch.


  • There will likely be air in your water service piping causing cloudiness and/or could be discolored due to particles that dislodge during the filling of the water pipes.  The water is safe to use even if discolored.
  • It is a good idea to flush your system through a faucet that does not have an aerator screen such as an outside water faucet or bath tub cold water faucet by allowing the water to flow until clear water returns. If the water has not cleared after several minutes, call the local water district.
  • If kitchen or bathroom faucets do not perform normally following a water outage, it is most likely due to debris in the aerator screen.  Simply remove the aerator screen, clean it, then return it to the faucet and check for normal operation.

More Information:

References, Resources and More Information:

  • – Blackouts
  • Department of Energy
  • American Society of Civil Engineers
  • Frequently Asked Questions : Water Infrastructure & Sustainability
  • U.S. Department of Transportation: The State of the Nation Pipeline Infrastructure

Fast Facts:

  • Aging gas infrastructure comes with risk of corrosion, damage, leaks, and collapse.
  • Water pipes can last between 15 and 100 years, depending on maintenance.
  • Much of our water infrastructure was built following World War II
  • Water treatment plants have about 20-50 years of use before they need to be expanded or rehabilitated.
  • Blackouts don’t just leave homes dark ─ they can also shut down transportation, hospitals and other critical necessities
  • There are more than 450,000 miles of high voltage power lines in the U.S., which connect some 5,800 major power plants to populations and that doesn’t include normal power lines or smaller plants!