logo
Week-long active threat training held with Hillsborough County deputies

Week-long active threat training held with Hillsborough County deputies

Yahoo06-06-2025

The Brief
HCSO held a week-long active threat training at schools, "designed to ensure our deputies are fully prepared to protect students and staff as they return to school."
The sheriff's office gave an inside look at what the sheriff called, "Some of the most intense mentally and physically demanding training that any member of the sheriff's office goes through."
Deputies conducted training exercises in schools, classrooms and on school buses, among other locations.
SEFFNER, Fla. - Video released by the Hillsborough County Sheriff's Office shows deputies armed with mock weapons searching different areas of the schools, even firing the fake guns. It was part of a week-long active threat training at schools.
Hillsborough County Sheriff Chad Chronister said training scenarios include clearing rooms, evacuations, lockdown procedures and emergency first aid.
Follow FOX 13 on YouTube
"Their adrenaline is going in hostage rescue, some shooting, different shooting scenarios as the students are running by you, and you're trying to process who's a good guy, who's a bad guy," Chronister explained.
Dig deeper
During a news conference at Jennings Middle School Seffner, the sheriff said deputies are also incorporating improved tactics. HCSO will now have real-time access to cameras in schools so they can see live video of potential threats as they happen.
The department is also making sure every deputy is prepared, even some who weren't planning to participate in the training.
READ: Hillsborough mom names daughter after HCA Florida Brandon nurse who helped during high-risk pregnancy
"They were told to come to the school here," Chronister explained. "The moment they got here, they took their guns and their weapons off of them and gave them one of the less lethal weapons that shoots a projectile and said, 'here, you're going to help the deputy. Go run.'"
During the annual training, the agency also practices adjusting to new school security laws. Last year, lawmakers required all campus access points, including gates and doors, to remain locked during school hours.
What we know
This year, however, a new law gave schools more flexibility to determine which access points are locked and when.
Local perspective
Chronister said his School Threat Assessment and Response Team, or STAR Squad, continues to play a major role in their preparation and response.
MORE: Superintendent faces state board over Hillsborough book removals amid backlash at home
The team assesses reports of possible threats that come in through the state's Fortify Florida program.
Last year, the STAR squad received more than 1,300 complaints, marking an increase of almost 300, compared to the previous year.
The Source
The information in this story was gathered by FOX 13's Aaron Mesmer.
WATCH FOX 13 NEWS:
STAY CONNECTED WITH FOX 13 TAMPA:
Download the FOX Local app for your smart TV
Download FOX Local mobile app:Apple |Android
Download the FOX 13 News app for breaking news alerts, latest headlines
Download the SkyTower Radar app
Sign up for FOX 13's daily newsletter

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

JD Vance attacks Newsom and LA mayor while misnaming senator arrested by the FBI
JD Vance attacks Newsom and LA mayor while misnaming senator arrested by the FBI

Yahoo

time7 hours ago

  • Yahoo

JD Vance attacks Newsom and LA mayor while misnaming senator arrested by the FBI

JD Vance, the US vice-president, accused California governor Gavin Newsom and Los Angeles mayor Karen Bass of encouraging violent immigration protests as he used an in Los Angeles to rebut criticism from state and local officials that the Trump administration fueled the unrest by sending in federal officers. The centerpiece of Vance's Friday visit was a 14-minute news conference, during which he delivered remarks and took questions from correspondents selected by the White House. Local reporters were barred from attending, according to Elex Michaelson, the host of Fox LA's local evening news report. 'It's disappointing' Michaelson wrote on X, that the vice-president 'did not allow local reporters inside his Los Angeles press event. At this inflection point in L.A. history, they only took questions from national reporters.' When a correspondent for the far-right Daily Wire, who was selected by the White House to be the official pool reporter traveling with Vance, asked about a series of Democrats who have been placed in handcuffs recently by federal officers, Vance attempted to joke about California senator Alex Padilla who was forcibly detained by the FBI in the same location last week. Vance, however, called him 'Jose Padilla', using the name of an American citizen who was accused of planning to detonate a radioactive dirty bomb on behalf of al-Qaida in 2002. 'I was hoping Jose Padilla would be here to ask a question,' Vance said. 'I guess he decided not to show up because there wasn't a theater. And that's all it is.' Katie Porter, a former Democratic member of congress who is running for governor of California, called Vance's remark: 'Despicable-something you'd expect from an internet troll.' A spokesperson for Padilla, Tess Oswald, noted in a social media post that Padilla and Vance were formerly colleagues in the Senate and said that Vance should know better. 'He should be more focused on demilitarizing our city than taking cheap shots,' Oswald said. The best public interest journalism relies on first-hand accounts from people in the know. If you have something to share on this subject you can contact us confidentially using the following methods. Secure Messaging in the Guardian app The Guardian app has a tool to send tips about stories. Messages are end to end encrypted and concealed within the routine activity that every Guardian mobile app performs. This prevents an observer from knowing that you are communicating with us at all, let alone what is being said. If you don't already have the Guardian app, download it (iOS/Android) and go to the menu. Select 'Secure Messaging'. SecureDrop, instant messengers, email, telephone and post See our guide at for alternative methods and the pros and cons of each. Responding to the outrage, Taylor Van Kirk, a spokesperson for Vance, said of the vice-president: 'He must have mixed up two people who have broken the law.' Vance's visit to Los Angeles to tour a multi-agency federal joint operations center and a mobile command center came as demonstrations calmed down in the city and a curfew was lifted this week. That followed over a week of clashes between protesters and police and outbreaks of vandalism and looting that followed immigration raids across southern California. Trump's dispatching of his top emissary to Los Angeles at a time of turmoil surrounding the Israel-Iran war and the US's future role in it signals the political importance Trump places on his hard-line immigration policies. Vance echoed the president's harsh rhetoric toward California Democrats as he sought to blame them for the protests in the city. 'Gavin Newsom and Karen Bass, by treating the city as a sanctuary city, have basically said that this is open season on federal law enforcement,' Vance said after he toured federal immigration enforcement offices. 'What happened here was a tragedy,' he added. 'You had people who were doing the simple job of enforcing the law and they had rioters egged on by the governor and the mayor, making it harder for them to do their job. That is disgraceful. And it is why the president has responded so forcefully.' Newsom's spokesperson Izzy Gardon said in a statement: 'The vice-president's claim is categorically false. The governor has consistently condemned violence and has made his stance clear.' The friction in Los Angeles began on 6 June, when federal agents conducted a series of immigration sweeps in the region that have continued since. Amid the protests and over the objections of state and local officials, Trump ordered the deployment of roughly 4,000 national guard troops and 700 marines to the second-largest US city, home to 3.8 million people. Trump has said that without the military's involvement, Los Angeles 'would be a crime scene like we haven't seen in years'. A review of Vance's movements on Friday suggests that he had very little time to evaluate the situation in the city. His flight from Washington touched down at Los Angeles International airport at 1:35 pm local time. Vance's motorcade arrived at the federal building in Westwood that is being guarded by active-duty marines at 2pm. He started his news conference at 3:11pm. It is not clear exactly how much of the intervening 71 minutes Vance spent meeting marines, federal agents and local police officers, but he devoted at least part of that time doing an interview with the Fox News national correspondent Bill Melugin. At 3:30 pm, Vance departed the federal building for a Republican National Committee event. By 6:05pm, he was back on Air Force Two at LAX and ready for departure just four and a half hours after he had arrived.

Sixteen billion passwords may have been stolen. Here's how to protect yourself
Sixteen billion passwords may have been stolen. Here's how to protect yourself

Yahoo

timea day ago

  • Yahoo

Sixteen billion passwords may have been stolen. Here's how to protect yourself

TORONTO — A Lithuanian cybersecurity news outlet says it uncovered a leak of 16 billion passwords that may grant access to Apple, Google, Facebook accounts and more. Cybernews warns the data is "a blueprint for mass exploitation" because it could give cybercriminals unprecedented access to information that can be used for account takeovers, identity theft and highly targeted attacks. Here's what we know about the leak so far and how people can protect themselves from its repercussions. What do we know about the leak? Cybersecurity experts are strongly speculating that the data was leaked through infostealers, said Robert Falzon, head of engineering at security software firm Check Point. Infostealers are pieces of malware users are duped into clicking on, which then install something on their computer, "which just kind of sits and listens to the computer while you're typing things from the keyboard." The malware can detect when you're logging into an account and can copy whatever you've input to send it to a database of credentials hackers compile. "As a result of that, we end up with these giant repositories on the dark net filled with lists and lists and lists of usernames and passwords and credentials that have been stolen from users all around the world and that are being bought and sold as commodities," Falzon said. Is all this leaked data new? That's up for debate. Cybernews says "the data is recent, not merely recycled from old breaches," but others disagree. "It's really hard to track the providence of all of it," Falzon said, because some hackers package data together from several leaks to resell. The only way to figure out how new it is would be to obtain other leaks and cross compare the data. Why is it worrisome? 'If hackers manage to get their hands on your password for Google, Apple, or Facebook, stealing your money and identity may be easier than taking candy from a three-year-old," Ignas Valancius, head of engineering at cybersecurity company NordPass, said in a press release. That's because hackers use the logins they obtain for credential stuffing — a practice where criminals get access to accounts by inputting stolen login information into websites. If you reuse your passwords across several websites or services, it may mean a hacker can get into your bank account and steal money, your favourite retailer accounts and drain you of your loyalty points or even find your address and birthday and use it for identity theft, Falzon said. How can I find out if my data was in the breach? Figuring out if you've been a victim of the breach would take obtaining the data and searching through it for your credentials. Because only an "extreme minority" of people have never been breached in general, Falzon said you're always best off assuming your info is part of the leak. What can Canadians do to protect themselves? Cybersecurity experts are unanimous in advising people to change their passwords regularly, especially after leaks to avoid becoming the victim of credential stuffing. But long before a breach happens, they say there are several things people can do to protect themselves. The most obvious is varying your passwords and avoiding reusing them. When you recycle passwords across several websites or services or make them easy to guess, it means hackers won't have much of a struggle accessing many of your accounts. Multifactor authentication can also offer a layer of security. When someone attempts to login to an account, it forces them to enter a code sent by email or text before they can get access. The process helps users thwart hacking attempts. I have so many accounts to keep track of and changing my passwords with every breach is making it hard to remember them all. What can I do? Some cybersecurity experts are fans of password managers. These services create strong, unique passwords for each account you have. Then, the manager stores them in an encrypted account you can quickly access anytime you need to enter a password. However, other experts argue password managers can have varying levels of encryption and warn that if the one you are using is breached, all of your passwords may be vulnerable. So what else can I do? Many experts advise people to use passkeys, when possible. Passkeys are digital credentials able to unlock accounts with a mere flash of your face or fingerprint scan on your phone. They are considered to be more secure than passwords because there is no string of characters, numbers and symbols to memorize, making them harder to hack. They don't need to be changed, can't be stolen by someone guessing or peeking over your shoulder and there's no way to accidentally use one on the wrong website. Not all websites and services accept passkeys but several big players like Apple, Shopify, Microsoft, DocuSign and PayPal do. This report by The Canadian Press was first published June 20, 2025. Tara Deschamps, The Canadian Press

FBI Warning—All Smartphone Users Must Delete These Messages
FBI Warning—All Smartphone Users Must Delete These Messages

Forbes

timea day ago

  • Forbes

FBI Warning—All Smartphone Users Must Delete These Messages

The threat is worse than the headlines suggest. A raft of news stories this week (1,2,3) report on the FBI warning 150 million Apple users to delete texts on their iPhones. Unfortunately the reality is even worse than those headlines suggest. Here's what you need to know and what you should do. Right now, your cell phone is vulnerable to an ongoing attack that will come to you by way of text messages warning of dire consequences if you don't respond right away. Text messages that include links to pay outstanding bills or fines. All of this is made up, of course, but you pay nonetheless because you're worried — that's the idea. These messages include unpaid tolls and newer DMV traffic offenses, but will soon widen the net to mimic texts from your bank or credit card company. It's against this backdrop that we have seen headlines urging America's iPhone users specifically to delete the latest raft of DMV texts as soon as they're received. The malicious texts are sent courtesy of organized Chinese criminal gangs that operate beyond the reach of U.S. law enforcement. They harness countless phone numbers from multiple countries and domains from multiple providers. Despite network filtering and iOS and Android spam detection, the tidal wave of texts seemingly can't be stopped. Google has confirmed new AI-powered scam detection on its phones, and we await to see if this filters the threat or can be worked around. The FBI's warning to delete all these co-called smishing texts came in an advisory last year, issued in the wake of the original unpaid toll scam that has now swept across America from state to state. Any such texts, it said, should be deleted from phones. But that applies to iPhone and Android users — to all smartphone users. There are some iPhone specifics — the OCGs prefer iMessage to SMS, albeit they like RCS as well, and the texts often include instructions to 'Please reply with 'Y'' to get around iPhone's link blocking from unknown senders. But the the attack targets all users indiscriminately. As I reported a week ago, the FBI has confirmed it is now investigating the latest plague of DMV-themed texts, which is unsurprising. The volume of those texts in particular surged almost 800% in the first week of June alone, and has not slowed down since. A single bad actor armed with numbers and domains can send as many as '60,000,000 texts a per month, or 720,000,000 per year,' if that helps explain why there's almost no one in America who hasn't yet received these texts or knows someone who has. Whether it's an iPhone or an Android phone in your pocket, don't leave these texts undeleted and never ever click on any of these links.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store