A 19-year-old man has been arrested under the Terrorism Act following the discovery of a suspicious item on a tube in North Greenwich on Thursday, Scotland Yard said. North Greenwich Tube station was closed for hours yesterday, and Jubilee Line services were disrupted for most of the day, after a suspicious item was found on a train at the station1, with both the Metropolitan Police and British Transport Police (BTP) attending. A controlled explosion was carried out yesterday afternoon . The item is “currently being forensically examined and we await the results of that examination”, the Met said today.
The man was arrested by officers from the Met s Counter Terrorism Command, assisted by armed colleagues, in the street in Holloway Road, N7, at 12:20 today . Officers discharged a Taser during the arrest . No firearms were discharged. The 19-year-old man was arrested on suspicion of the commission, preparation and instigation of terrorism acts, under Section 41 of the Terrorism Act 2000 . He has been taken to a London police station where he remains in custody.
The Met said officers are “keeping an open mind regarding any possible motive”, and are not looking for anyone else in relation to the investigation at this stage.
“The public will see more officers, including armed police, in and around transport hubs to provide reassurance around public safety,” the Met stated.
“The London transport system is operating as normal today . High visibility patrols by BTP officers on the underground and at stations will remain in place today to reassure the travelling public as they start their weekend .
Anyone with any concerns should speak with officers who will be happy to help.”
- ^ after a suspicious item was found on a train at the station (www.cityam.com)
A Duty Shift Manager is required to work at a prestigious museum in London working 4 on 4 off, days only.
Duties include: the oversight of the day to day operational management of the security team in line with customer and contractual expectations; managing operational needs and requirements by leading and managing the site security team to ensure a consistent quality service delivery and prompt response to all incidents; ensuring all employees are trained to the required standard and subject to effective performance monitoring.
Key responsibilities include: the active management of a team of security supervisors and officers ensuring all duties are carried out in accordance with procedures and policies, taking responsibility for the professional conduct and development of the team.
A SIA Door Supervisor and CCTV licences are essential, along with a valid First Aid certificate. A relevant management qualification is desirable and the successful candidate will have a number of years experience in Front of House customer service.
Wilson James is a leading security, logistics and business services provider with more than 3,000 employees. We deliver bespoke solutions that enable clients to focus on achieving their core business objectives
Salary: 13.32 /hour
- Supervisor: 3 years
Required licences or certifications:
- First Aid
- SIA Door Supervisor
View original post here:
Duty Shift Manager – Wilson James Ltd
Virtual machine security is suddenly a hot spot: VMware’s building a new product1 for it and has added new bits to vSphere 6.5 to enhance it . And Microsoft thinks it has found a new way to secure VMs. Let’s do Redmond first because its new Shielded VMs are one of the headline items in Windows Server and Hyper-V 2016. As explained to The Register by Microsoft program manager Dean Wells, Redmond reckons one of the things that holds back virtualisation is that virtual machines aren’t yet as verifiably secure as their bare metal brethren.
The main thing VMs are missing is something like Intel’s trusted platform module (TPM), the cryptographic signing technique that binds a workloads to a known server . If you apply TPM to a server and then to an application, the workload just won’t run unless it’s on a server it’s been told to trust . Or to put it in terms that Jurassic Park‘s Dennis Nedry2 would understand: without the magic word, you’ll be locked out. Wells feels the lack of TPM for virtual machines means some organisations keep sensitive workloads on bare metal because they fear rogue admins can take a VM and run it elsewhere . That fear is fair enough because with a .VHD or .VHDX file, or their equivalents for non-Microsoft hypervisors, it’s trivial to run a virtual machine . Wells told The Register that Microsoft clients are worried by this, because storage admins, network admins, vanilla sysadmins and other Dennis Nedry types can access the resources on which virtual machines reside.
Shielded VMs aim to prevent VM exfiltration by providing a virtual equivalent to TPM, so that VMs just won’t run unless they know the host is allowed to run them . Shielded VMs are also shorn of tools like remote desktop protocol, PowerShell Direct and other things that let an admin reach out and touch them, reducing their attack surface along the way . Shielded VMs’ disks are also encrypted (at rest and in motion) turning VMs from a portable package that can be plugged into a hypervisor and turning them into black boxes. Microsoft also proposes that the hypervisor check policies for the VMs it runs, so that it will only execute machines that conform to a known baseline configuration and to policies that determine what workloads each admin can run.
Shielded VMs also boot from a virtual Unified Extensible Firmware Interface (UEFI), so that the state of the host and the VM can be verified as the VM fires up. Windows Server 2016’s new Host Guardian Service (HGS) gets the job of verifying whether hosts are allowed to run a Shielded VM and/or are in a fit condition to run it. With trusted hosts, only whitelisted VMs in operation (and then only after accounting for themselves as they boot), Microsoft feels you’ll be able to embrace hybrid cloud with confidence, in a trusted fabric of infrastructure that could span multiple private and/or public data centres . For those yet to adopt TPM-enabled servers, there’s also an option to use only UEFI to verify VMs’ fitness for execution.
Microsoft proudly told world+dog it was way out in front of the VM security race with Shielded VMs, which launched a couple of weeks back at Ignite . That lead was whittled away after a week as VMware launched vSphere 6.5 with UEFI-secured boot for hosts and guests, plus encryption for VMs in motion . For now VSphere itself can use TPM, but Virtzilla’s guests can’t do virtual TPM . So Microsoft’s got a little lead here for now.
The Register understands that VMware’s Project Goldilocks security product may not be far from its formal debut, so perhaps Virtzilla’s security story is about to gain a new chapter. For what it’s worth, it looks like Xen has had virtual TPM since version 4.33 and that contributions from the NSA helped make it a reality4.
Which means Shielded VMs are NSA-grade security .
That’s a good thing, right?
- ^ building a new product (www.theregister.co.uk)
- ^ Dennis Nedry (jurassicpark.wikia.com)
- ^ Xen has had virtual TPM since version 4.3 (wiki.xenproject.org)
- ^ contributions from the NSA helped make it a reality (xenbits.xen.org)
- ^ Define your services for fast and accurate service delivery (go.theregister.com)