{"id":9838,"date":"2024-09-10T10:05:23","date_gmt":"2024-09-10T09:05:23","guid":{"rendered":"https:\/\/vigilfalcon.com\/?p=9838"},"modified":"2024-09-18T14:11:40","modified_gmt":"2024-09-18T13:11:40","slug":"anticipating-future-disruptions-in-building-resilience-copy","status":"publish","type":"post","link":"https:\/\/vigilfalcon.com\/index.php\/2024\/09\/10\/anticipating-future-disruptions-in-building-resilience-copy\/","title":{"rendered":"Anticipating Future Disruptions in Building Resilience &#8211; Copy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9838\" class=\"elementor elementor-9838\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<section class=\"has_ma_el_bg_slider elementor-section elementor-top-section elementor-element elementor-element-999fa21 elementor-section-boxed elementor-section-height-default elementor-section-height-default exad-glass-effect-no jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no exad-sticky-section-no\" data-id=\"999fa21\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"has_ma_el_bg_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8105e92 exad-glass-effect-no jltma-glass-effect-no exad-sticky-section-no\" data-id=\"8105e92\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1ea37c1c exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"1ea37c1c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2000\" height=\"1334\" src=\"https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/104934.jpg\" class=\"attachment-full size-full wp-image-9852\" alt=\"\" srcset=\"https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/104934.jpg 2000w, https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/104934-300x200.jpg 300w, https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/104934-1024x683.jpg 1024w, https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/104934-768x512.jpg 768w, https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/104934-1536x1025.jpg 1536w\" sizes=\"(max-width: 2000px) 100vw, 2000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e28c1a0 exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"4e28c1a0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Anticipating Future Disruptions in Building Resilience<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"has_ma_el_bg_slider elementor-section elementor-inner-section elementor-element elementor-element-c49aa27 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default exad-glass-effect-no jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no exad-sticky-section-no\" data-id=\"c49aa27\" data-element_type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"has_ma_el_bg_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6bdef1ba exad-glass-effect-no jltma-glass-effect-no exad-sticky-section-no\" data-id=\"6bdef1ba\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fceaee9 elementor-icon-list--layout-inline elementor-list-item-link-full_width exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-icon-list\" data-id=\"fceaee9\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-tb-author-meta\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Sean Ahrens<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_ma_el_bg_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4670da24 exad-glass-effect-no jltma-glass-effect-no exad-sticky-section-no\" data-id=\"4670da24\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a701719 elementor-icon-list--layout-inline elementor-widget__width-initial elementor-list-item-link-full_width exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-icon-list\" data-id=\"2a701719\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-alt\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M148 288h-40c-6.6 0-12-5.4-12-12v-40c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v40c0 6.6-5.4 12-12 12zm108-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 96v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm192 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96-260v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V112c0-26.5 21.5-48 48-48h48V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h128V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h48c26.5 0 48 21.5 48 48zm-48 346V160H48v298c0 3.3 2.7 6 6 6h340c3.3 0 6-2.7 6-6z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">12 September 2024<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-comment-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M448 0H64C28.7 0 0 28.7 0 64v288c0 35.3 28.7 64 64 64h96v84c0 7.1 5.8 12 12 12 2.4 0 4.9-.7 7.1-2.4L304 416h144c35.3 0 64-28.7 64-64V64c0-35.3-28.7-64-64-64zm16 352c0 8.8-7.2 16-16 16H288l-12.8 9.6L208 428v-60H64c-8.8 0-16-7.2-16-16V64c0-8.8 7.2-16 16-16h384c8.8 0 16 7.2 16 16v288z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Draft<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5f1699 exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"c5f1699\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It\u2019s challenging to predict the exact timing and impact of technological changes on disruption. However, as building owners work towards enhancing resilience\u2014through refining operational procedures, planning capital improvements for existing systems, and designing new facilities\u2014it becomes crucial to anticipate potential future disruptions. The scenarios outlined below offer a broad overview of when disruptions might occur and the possible best- and worst-case outcomes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-940a723 exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"940a723\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Let\u2019s start by looking further into the future and then move towards the present:\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-827302b exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"827302b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>2040 to 2050:<\/strong><\/p><p>In the next 20 to 30 years, quantum computing is expected to become a reality, necessitating new encryption methods for all building electronics, Internet of Things (IoT) devices, and communication systems to defend against these powerful technologies. Quantum computing could, for instance, enable unauthorized control over phones, surveillance of conversations, remote camera activation, data theft, and the propagation of malicious code, akin to the spread of a virus.<\/p><p>Cloud-based artificial intelligence systems will likely manage hundreds of buildings and security systems remotely, including robotics, intrusion detection, and countermeasures. AI has the potential to analyze vast amounts of data and identify threats that human operators would miss. For example, AI could detect someone sketching a building as a potential threat based on the time, duration, and other activities during the event. These systems could also autonomously recognize emergencies like fires or armed assailants, directing first responders and building occupants as a human would.<\/p><p><strong>2029 to 2030:<\/strong><\/p><p>Within the next 5 to 10 years, fully autonomous vehicles will likely become widespread. However, these vehicles could be vulnerable to remote hacking, potentially turning them into tools for attacks on civilians. Security teams might use autonomous vehicles for parking lot patrols, equipped with high-definition cameras to monitor suspicious activities, with 8G communication facilitating real-time interaction between operators and potential threats. As technology advances, lightweight personal aircraft could emerge, designed to transport prominent individuals to and from remote locations. The concern over hacking these aircraft will mirror the challenges faced by autonomous vehicles.<\/p><h3><strong>2025 to 2028:<\/strong><\/h3><p>In the short term, we may witness a drone attack on a commercial property, particularly one associated with transportation or large crowds. The increasing availability of information on the DarkNet, advancements in 3D printing, and the simplicity of drone construction and deployment contribute to this threat.<\/p><p>Simultaneously, the security guard industry is set to undergo a significant transformation. Economically viable four-legged robotic officers will replace human exterior and stairwell patrols. Motorized robots will assist with concierge duties in lobbies, manage visitor check-ins, and patrol building interiors, integrating with elevator systems. Buildings that once required multiple security staff per shift could soon rely on an army of tireless robots, patrolling stairs, detecting fires and leaks, reporting hazards, and responding to intrusions under central station operators\u2019 direction.<\/p><p>In the near future, mobile technologies will advance further, replacing passwords and access control cards, potentially making it easier for social engineers to gain unauthorized access to buildings.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96cb606 elementor-widget__width-initial exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"96cb606\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Emerging Technologies and Security Concerns:<\/strong><\/p><p>These devices will utilize GPS and indoor positioning for emergency response, virtual tours, and assistance requests. Mobile devices will evolve into visor-like interfaces, combining augmented reality to provide instantaneous audio and visual information. We may also see the emergence of polymorphic and metamorphic viruses that are operating system agnostic, spreading through mobile phones, Bluetooth, and Wi-Fi connections. These viruses will replicate rapidly and use cloud-based machine learning to establish connections with other mobile devices and networks. Notably, researchers have already created and published the Blue borne exploit, a precursor to this kind of threat.<\/p><p>Disruption is a pressing concern for businesses today, whether responding to current events or anticipating future challenges. This is equally true for security. Historical mass casualty attacks, like those at Khobar Towers and Columbine, led many facilities to adopt sophisticated technology platforms, surveillance tools, and emergency communication systems. The threat of car and truck explosives also prompted a focus on standoff distance in building design to enhance resilience. While disruptive changes can happen rapidly, buildings are slow to adapt. Therefore, it\u2019s vital for building owners to stay informed about potential disruptions and incorporate them into resilience plans.<\/p><p><strong>Monitoring Potential Disruptive Developments:<\/strong><\/p><p>Predicting which factors will be disruptive is difficult, but the following eight developments could significantly impact security practices. This list is not a forecast but rather a guide for building owners to monitor:<\/p><p><strong>Darknet (ToR):<\/strong>\u00a0Initially developed by the U.S. Naval Research Laboratory in the mid-1990s for secure and anonymous communication, the ToR network has since become known as the Darknet. This hidden part of the internet, accessible only with a specialized browser, offers a marketplace for stolen identities, credit cards, weapons, 3D printing templates, and even hackers for hire. The Darknet poses a disruption risk by providing aggressors with the tools to conduct attacks while minimizing detection chances. Most building owners are not monitoring the Darknet for potential vulnerabilities.<\/p><p><strong>Cloud Computing:<\/strong>\u00a0Cloud computing shifts software and hardware from on-premise to off-premise data centers. Users of cloud-based systems typically do not need to purchase hardware, as devices like access control panels or cameras transmit data back to the cloud. Manufacturers favor cloud-based systems for their recurring revenue potential, made possible by advances in data connectivity. The challenge lies in the security of these systems, which depends entirely on the third-party hosting the building owner\u2019s data.<\/p><p><strong>Smartphones:<\/strong>\u00a0Since their introduction in 2007, smartphones have evolved to include a wide array of onboard sensors, making them incredibly versatile. They can also be equipped with external sensors, like infrared cameras or wireless antennas. The question now is how far this technology will go and how it might be exploited by those with malicious intent.<\/p><p><strong>Drones:<\/strong>\u00a0Unmanned aerial vehicles, or drones, are now commercially affordable and have been used in a variety of innovative ways, from package delivery to racing. However, drones also pose potential security risks, such as carrying firearms or hacking equipment. The technology continues to advance, with drones becoming smaller and more versatile, as demonstrated by the \u201cswarm\u201d technology used at the 2018 PyeongChang Winter Olympics.<\/p><p><strong>Robotics:<\/strong>\u00a0Robots, especially those with wheels, are limited by environmental factors like stairs. However, advances in machine learning, alternative propulsion methods, and battery technology are poised to revolutionize mundane tasks like security patrols. While robots are currently expensive, leasing them could become more cost-effective than hiring human guards, leading to a transformation in the security industry. Robots will handle routine monitoring tasks, while human staff will take on more complex security roles.<\/p><p><strong>Machine Learning and Artificial Intelligence:<\/strong>\u00a0Machine learning allows computers to learn from experience, while artificial intelligence enables them to operate autonomously. For instance, video analytics that use machine learning can distinguish between humans and animals with user feedback. In contrast, AI would make this distinction independently. AI also poses risks, such as the potential for computers to crack passwords or create deep fakes, which can convincingly mimic human faces and voices.<\/p><p><strong>Autonomous Vehicles:<\/strong>\u00a0Partially autonomous vehicles are already on the roads, and it\u2019s only a matter of time before fully autonomous trucks and cars become commonplace. These vehicles could be used for deliveries or even autonomous parking. However, they also present risks, as they could be weaponized for remote attacks.<\/p><p><strong>Quantum Computing:<\/strong>\u00a0Traditional computing uses bits that are either on or off, but quantum computing introduces quantum bits, or Qubits, allowing for exponentially greater processing power. A quantum computer could break today\u2019s strongest passwords in minutes, creating new security vulnerabilities. On the other hand, quantum computing could also solve some of the world\u2019s most complex problems.<\/p><p><strong>The Role of Disruptors in Security:<\/strong><\/p><p>Disruptors can radically alter our environment and experiences. Once introduced, they can have far-reaching effects, whether on a global scale like mobile phones or on a smaller scale, such as the evolution of security operations centers from large monitors to sit-stand desks. Disruptors can also serve as security controls, deterring, delaying, or detecting aggressors. Positive disruptors are widely adopted and significantly reduce security costs or improve effectiveness. Conversely, negative disruptors can be exploited to cause widespread harm with minimal effort.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8bc0526 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"8bc0526\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3042edd exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"3042edd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/KOMOK-1024x683.jpg\" class=\"attachment-large size-large wp-image-9856\" alt=\"\" srcset=\"https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/KOMOK-1024x683.jpg 1024w, https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/KOMOK-300x200.jpg 300w, https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/KOMOK-768x512.jpg 768w, https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/KOMOK-1536x1024.jpg 1536w, https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/KOMOK-2048x1365.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ecea9a exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"2ecea9a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/young-caucasian-cybersecurity-developer-thinking-about-new-concepts-security-compliance-division-protect-clients-confidential-information-it-lock-icons-singapore-background-1024x683.jpg\" class=\"attachment-large size-large wp-image-9850\" alt=\"\" srcset=\"https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/young-caucasian-cybersecurity-developer-thinking-about-new-concepts-security-compliance-division-protect-clients-confidential-information-it-lock-icons-singapore-background-1024x683.jpg 1024w, https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/young-caucasian-cybersecurity-developer-thinking-about-new-concepts-security-compliance-division-protect-clients-confidential-information-it-lock-icons-singapore-background-300x200.jpg 300w, https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/young-caucasian-cybersecurity-developer-thinking-about-new-concepts-security-compliance-division-protect-clients-confidential-information-it-lock-icons-singapore-background-768x512.jpg 768w, https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/young-caucasian-cybersecurity-developer-thinking-about-new-concepts-security-compliance-division-protect-clients-confidential-information-it-lock-icons-singapore-background-1536x1024.jpg 1536w, https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/young-caucasian-cybersecurity-developer-thinking-about-new-concepts-security-compliance-division-protect-clients-confidential-information-it-lock-icons-singapore-background-2048x1365.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f56c500 exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"f56c500\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/JMJKM-1024x683.jpg\" class=\"attachment-large size-large wp-image-9857\" alt=\"\" srcset=\"https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/JMJKM-1024x683.jpg 1024w, https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/JMJKM-300x200.jpg 300w, https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/JMJKM-768x512.jpg 768w, https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/JMJKM-1536x1024.jpg 1536w, https:\/\/vigilfalcon.com\/wp-content\/uploads\/2024\/09\/JMJKM-2048x1365.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0fd8e8 exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"c0fd8e8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vigil Falcon Security Services: Your Partner in Building Resilience:\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1247504 exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"1247504\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Sean A. Ahrens, CPP, FSyl, CSC, is a resiliency leader, security consultant, and board member for the International Association of Professional Security Consultants (IAPSC). He is the security market group leader with Affiliated Engineers Inc., a multidisciplinary engineering firm that provides security consulting, assessments, and design solutions for various building types.<\/p>\n<p>At Vigil Falcon Security Services, we understand the importance of staying ahead of potential disruptions. Our team of experts is dedicated to providing cutting-edge security solutions tailored to your unique needs. We leverage the latest technologies and industry best practices to ensure your facilities are protected against emerging threats. Trust us to be your partner in building resilience and safeguarding your assets for the future.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"has_ma_el_bg_slider elementor-section elementor-inner-section elementor-element elementor-element-e6fb545 elementor-section-boxed elementor-section-height-default elementor-section-height-default exad-glass-effect-no jltma-glass-effect-no wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no exad-sticky-section-no\" data-id=\"e6fb545\" data-element_type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"has_ma_el_bg_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-24b3d26e exad-glass-effect-no jltma-glass-effect-no exad-sticky-section-no\" data-id=\"24b3d26e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d37b879 elementor-widget__width-auto exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-button\" data-id=\"d37b879\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Security<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df451ec elementor-widget__width-auto exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-button\" data-id=\"df451ec\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Safety<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58c33b6a elementor-widget__width-auto exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-button\" data-id=\"58c33b6a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">CCTV<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46393e76 elementor-widget__width-auto exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-button\" data-id=\"46393e76\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Surveillance<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_ma_el_bg_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d30a737 exad-glass-effect-no jltma-glass-effect-no exad-sticky-section-no\" data-id=\"d30a737\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b0c529 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"7b0c529\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52fbf81 elementor-grid-0 exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-wpr-sharing-buttons\" data-id=\"52fbf81\" data-element_type=\"widget\" data-widget_type=\"wpr-sharing-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"wpr-sharing-buttons elementor-grid wpr-sharing-official wpr-sharing-label-off wpr-sharing-label-tr\"><div class=\"elementor-grid-item\"><a href=\"https:\/\/www.facebook.com\/sharer.php?u=https:\/\/vigilfalcon.com\/index.php\/2024\/09\/10\/anticipating-future-disruptions-in-building-resilience-copy\/\" class=\"wpr-sharing-icon wpr-sharing-facebook-f\" title=\"\" target=\"_blank\"><i class=\"fab fa-facebook-f\"><\/i><\/a><\/div><div class=\"elementor-grid-item\"><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https:\/\/vigilfalcon.com\/index.php\/2024\/09\/10\/anticipating-future-disruptions-in-building-resilience-copy\/\" class=\"wpr-sharing-icon wpr-sharing-twitter\" title=\"\" target=\"_blank\"><i class=\"fab fa-twitter\"><\/i><\/a><\/div><div class=\"elementor-grid-item\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&url=https:\/\/vigilfalcon.com\/index.php\/2024\/09\/10\/anticipating-future-disruptions-in-building-resilience-copy\/&title=Anticipating Future Disruptions in Building Resilience &#8211; Copy&summary=Anticipating Future Disruptions in Building Resilience Sean Ahrens 12 September 2024 Draft It\u2019s challenging to predict the exact timing and impact of technological changes on disruption. However, as building owners work towards enhancing resilience\u2014through refining operational procedures, planning capital improvements for existing systems, and designing new facilities\u2014it becomes crucial to anticipate potential future disruptions. The scenarios outlined below offer a broad overview of when disruptions might occur and the possible best- and worst-case outcomes. Let\u2019s start by looking further into the future and then move towards the present: 2040 to 2050: In the next 20 to 30 years, quantum computing is expected to become a reality, necessitating new encryption methods for all building electronics, Internet of Things (IoT) devices, and communication systems to defend against these powerful technologies. Quantum computing could, for instance, enable unauthorized control over phones, surveillance of conversations, remote camera activation, data theft, and the propagation of malicious code, akin to the spread of a virus. Cloud-based artificial intelligence systems will likely manage hundreds of buildings and security systems remotely, including robotics, intrusion detection, and countermeasures. AI has the potential to analyze vast amounts of data and identify threats that human operators would miss. For example, AI could detect someone sketching a building as a potential threat based on the time, duration, and other activities during the event. These systems could also autonomously recognize emergencies like fires or armed assailants, directing first responders and building occupants as a human would. 2029 to 2030: Within the next 5 to 10 years, fully autonomous vehicles will likely become widespread. However, these vehicles could be vulnerable to remote hacking, potentially turning them into tools for attacks on civilians. Security teams might use autonomous vehicles for parking lot patrols, equipped with high-definition cameras to monitor suspicious activities, with 8G communication facilitating real-time interaction between operators and potential threats. As technology advances, lightweight personal aircraft could emerge, designed to transport prominent individuals to and from remote locations. The concern over hacking these aircraft will mirror the challenges faced by autonomous vehicles. 2025 to 2028: In the short term, we may witness a drone attack on a commercial property, particularly one associated with transportation or large crowds. The increasing availability of information on the DarkNet, advancements in 3D printing, and the simplicity of drone construction and deployment contribute to this threat. Simultaneously, the security guard industry is set to undergo a significant transformation. Economically viable four-legged robotic officers will replace human exterior and stairwell patrols. Motorized robots will assist with concierge duties in lobbies, manage visitor check-ins, and patrol building interiors, integrating with elevator systems. Buildings that once required multiple security staff per shift could soon rely on an army of tireless robots, patrolling stairs, detecting fires and leaks, reporting hazards, and responding to intrusions under central station operators\u2019 direction. In the near future, mobile technologies will advance further, replacing passwords and access control cards, potentially making it easier for social engineers to gain unauthorized access to buildings. Emerging Technologies and Security Concerns: These devices will utilize GPS and indoor positioning for emergency response, virtual tours, and assistance requests. Mobile devices will evolve into visor-like interfaces, combining augmented reality to provide instantaneous audio and visual information. We may also see the emergence of polymorphic and metamorphic viruses that are operating system agnostic, spreading through mobile phones, Bluetooth, and Wi-Fi connections. These viruses will replicate rapidly and use cloud-based machine learning to establish connections with other mobile devices and networks. Notably, researchers have already created and published the Blue borne exploit, a precursor to this kind of threat. Disruption is a pressing concern for businesses today, whether responding to current events or anticipating future challenges. This is equally true for security. Historical mass casualty attacks, like those at Khobar Towers and Columbine, led many facilities to adopt sophisticated technology platforms, surveillance tools, and emergency communication systems. The threat of car and truck explosives also prompted a focus on standoff distance in building design to enhance resilience. While disruptive changes can happen rapidly, buildings are slow to adapt. Therefore, it\u2019s vital for building owners to stay informed about potential disruptions and incorporate them into resilience plans. Monitoring Potential Disruptive Developments: Predicting which factors will be disruptive is difficult, but the following eight developments could significantly impact security practices. This list is not a forecast but rather a guide for building owners to monitor: Darknet (ToR):\u00a0Initially developed by the U.S. Naval Research Laboratory in the mid-1990s for secure and anonymous communication, the ToR network has since become known as the Darknet. This hidden part of the internet, accessible only with a specialized browser, offers a marketplace for stolen identities, credit cards, weapons, 3D printing templates, and even hackers for hire. The Darknet poses a disruption risk by providing aggressors with the tools to conduct attacks while minimizing detection chances. Most building owners are not monitoring the Darknet for potential vulnerabilities. Cloud Computing:\u00a0Cloud computing shifts software and hardware from on-premise to off-premise data centers. Users of cloud-based systems typically do not need to purchase hardware, as devices like access control panels or cameras transmit data back to the cloud. Manufacturers favor cloud-based systems for their recurring revenue potential, made possible by advances in data connectivity. The challenge lies in the security of these systems, which depends entirely on the third-party hosting the building owner\u2019s data. Smartphones:\u00a0Since their introduction in 2007, smartphones have evolved to include a wide array of onboard sensors, making them incredibly versatile. They can also be equipped with external sensors, like infrared cameras or wireless antennas. The question now is how far this technology will go and how it might be exploited by those with malicious intent. Drones:\u00a0Unmanned aerial vehicles, or drones, are now commercially affordable and have been used in a variety of innovative ways, from package delivery to racing. However, drones also pose potential security risks, such as carrying firearms or hacking equipment. The technology continues to advance, with drones becoming smaller and more versatile, as demonstrated by the \u201cswarm\u201d technology&source=https:\/\/vigilfalcon.com\/index.php\/2024\/09\/10\/anticipating-future-disruptions-in-building-resilience-copy\/\" class=\"wpr-sharing-icon wpr-sharing-linkedin-in\" title=\"\" target=\"_blank\"><i class=\"fab fa-linkedin-in\"><\/i><\/a><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-933fd12 elementor-widget__width-auto elementor-view-default exad-sticky-section-no exad-glass-effect-no jltma-glass-effect-no elementor-widget elementor-widget-icon\" data-id=\"933fd12\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-share-alt\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 320c-22.608 0-43.387 7.819-59.79 20.895l-102.486-64.054a96.551 96.551 0 0 0 0-41.683l102.486-64.054C308.613 184.181 329.392 192 352 192c53.019 0 96-42.981 96-96S405.019 0 352 0s-96 42.981-96 96c0 7.158.79 14.13 2.276 20.841L155.79 180.895C139.387 167.819 118.608 160 96 160c-53.019 0-96 42.981-96 96s42.981 96 96 96c22.608 0 43.387-7.819 59.79-20.895l102.486 64.054A96.301 96.301 0 0 0 256 416c0 53.019 42.981 96 96 96s96-42.981 96-96-42.981-96-96-96z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Anticipating Future Disruptions in Building Resilience Sean Ahrens 12 September 2024 Draft It\u2019s challenging to predict the exact timing and impact of technological changes on disruption. However, as building owners work towards enhancing resilience\u2014through refining operational procedures, planning capital improvements for existing systems, and designing new facilities\u2014it becomes crucial to anticipate potential future disruptions. The scenarios outlined below offer a broad overview of when disruptions might occur and the possible best- and worst-case outcomes. Let\u2019s start by looking further into the future and then move towards the present: 2040 to 2050: In the next 20 to 30 years, quantum computing is expected to become a reality, necessitating new encryption methods for all building electronics, Internet of Things (IoT) devices, and communication systems to defend against these powerful technologies. Quantum computing could, for instance, enable unauthorized control over phones, surveillance of conversations, remote camera activation, data theft, and the propagation of malicious code, akin to the spread of a virus. Cloud-based artificial intelligence systems will likely manage hundreds of buildings and security systems remotely, including robotics, intrusion detection, and countermeasures. AI has the potential to analyze vast amounts of data and identify threats that human operators would miss. For example, AI could detect someone sketching a building as a potential threat based on the time, duration, and other activities during the event. These systems could also autonomously recognize emergencies like fires or armed assailants, directing first responders and building occupants as a human would. 2029 to 2030: Within the next 5 to 10 years, fully autonomous vehicles will likely become widespread. However, these vehicles could be vulnerable to remote hacking, potentially turning them into tools for attacks on civilians. Security teams might use autonomous vehicles for parking lot patrols, equipped with high-definition cameras to monitor suspicious activities, with 8G communication facilitating real-time interaction between operators and potential threats. As technology advances, lightweight personal aircraft could emerge, designed to transport prominent individuals to and from remote locations. The concern over hacking these aircraft will mirror the challenges faced by autonomous vehicles. 2025 to 2028: In the short term, we may witness a drone attack on a commercial property, particularly one associated with transportation or large crowds. The increasing availability of information on the DarkNet, advancements in 3D printing, and the simplicity of drone construction and deployment contribute to this threat. Simultaneously, the security guard industry is set to undergo a significant transformation. Economically viable four-legged robotic officers will replace human exterior and stairwell patrols. Motorized robots will assist with concierge duties in lobbies, manage visitor check-ins, and patrol building interiors, integrating with elevator systems. Buildings that once required multiple security staff per shift could soon rely on an army of tireless robots, patrolling stairs, detecting fires and leaks, reporting hazards, and responding to intrusions under central station operators\u2019 direction. In the near future, mobile technologies will advance further, replacing passwords and access control cards, potentially making it easier for social engineers to gain unauthorized access to buildings. Emerging Technologies and Security Concerns: These devices will utilize GPS and indoor positioning for emergency response, virtual tours, and assistance requests. Mobile devices will evolve into visor-like interfaces, combining augmented reality to provide instantaneous audio and visual information. We may also see the emergence of polymorphic and metamorphic viruses that are operating system agnostic, spreading through mobile phones, Bluetooth, and Wi-Fi connections. These viruses will replicate rapidly and use cloud-based machine learning to establish connections with other mobile devices and networks. Notably, researchers have already created and published the Blue borne exploit, a precursor to this kind of threat. Disruption is a pressing concern for businesses today, whether responding to current events or anticipating future challenges. This is equally true for security. Historical mass casualty attacks, like those at Khobar Towers and Columbine, led many facilities to adopt sophisticated technology platforms, surveillance tools, and emergency communication systems. The threat of car and truck explosives also prompted a focus on standoff distance in building design to enhance resilience. While disruptive changes can happen rapidly, buildings are slow to adapt. Therefore, it\u2019s vital for building owners to stay informed about potential disruptions and incorporate them into resilience plans. Monitoring Potential Disruptive Developments: Predicting which factors will be disruptive is difficult, but the following eight developments could significantly impact security practices. This list is not a forecast but rather a guide for building owners to monitor: Darknet (ToR):\u00a0Initially developed by the U.S. Naval Research Laboratory in the mid-1990s for secure and anonymous communication, the ToR network has since become known as the Darknet. This hidden part of the internet, accessible only with a specialized browser, offers a marketplace for stolen identities, credit cards, weapons, 3D printing templates, and even hackers for hire. The Darknet poses a disruption risk by providing aggressors with the tools to conduct attacks while minimizing detection chances. Most building owners are not monitoring the Darknet for potential vulnerabilities. Cloud Computing:\u00a0Cloud computing shifts software and hardware from on-premise to off-premise data centers. Users of cloud-based systems typically do not need to purchase hardware, as devices like access control panels or cameras transmit data back to the cloud. Manufacturers favor cloud-based systems for their recurring revenue potential, made possible by advances in data connectivity. The challenge lies in the security of these systems, which depends entirely on the third-party hosting the building owner\u2019s data. Smartphones:\u00a0Since their introduction in 2007, smartphones have evolved to include a wide array of onboard sensors, making them incredibly versatile. They can also be equipped with external sensors, like infrared cameras or wireless antennas. The question now is how far this technology will go and how it might be exploited by those with malicious intent. Drones:\u00a0Unmanned aerial vehicles, or drones, are now commercially affordable and have been used in a variety of innovative ways, from package delivery to racing. However, drones also pose potential security risks, such as carrying firearms or hacking equipment. The technology continues to advance, with drones becoming smaller and more versatile, as demonstrated by the \u201cswarm\u201d technology<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-9838","post","type-post","status-publish","format-standard","hentry","category-blog"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/vigilfalcon.com\/index.php\/wp-json\/wp\/v2\/posts\/9838","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vigilfalcon.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vigilfalcon.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vigilfalcon.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vigilfalcon.com\/index.php\/wp-json\/wp\/v2\/comments?post=9838"}],"version-history":[{"count":19,"href":"https:\/\/vigilfalcon.com\/index.php\/wp-json\/wp\/v2\/posts\/9838\/revisions"}],"predecessor-version":[{"id":9871,"href":"https:\/\/vigilfalcon.com\/index.php\/wp-json\/wp\/v2\/posts\/9838\/revisions\/9871"}],"wp:attachment":[{"href":"https:\/\/vigilfalcon.com\/index.php\/wp-json\/wp\/v2\/media?parent=9838"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vigilfalcon.com\/index.php\/wp-json\/wp\/v2\/categories?post=9838"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vigilfalcon.com\/index.php\/wp-json\/wp\/v2\/tags?post=9838"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}