Defense Against Crime


Assaulted at the Campus Library


This following Story is true …details have been obscured to protect the innocent


This following Story is true …detail have been obscured to protect the innocent


Dear Campus Community,

I want to inform our campus community regarding the arrest of a man not affiliated with the College who approached two students in two separate incidents and asked for money as they entered Kar-Charrat Library on Thursday, Feb. 5, 2020. When the students handed over the money, the man grabbed the students by the waist and forcibly kissed them. Public Safety officers immediately responded to the scene and quickly located and arrested the man nearby on Lincoln Street. The suspect was charged with Trespassing and will be charged with Criminal Sexual Contact in the 3rd Degree, and he was placed in the Pat Garret Detention Center.

This incident reminds us that as we travel on and around the campus, whether at day or night, we must always be cautious when people are seeking our assistance. In this case, our students were trying to assist someone who took advantage of them. This is not to suggest that every attempt to assist someone will turn violent, but we must keep this possibility in mind. We must be especially vigilant if we are alone and in an area where no other people are around. 

Here are some additional safety tips:

  • Travel in groups at night
  • Have your cellphone ready for use
  • Pay attention to your surroundings while using technology (especially when wearing earbuds/headphones)
  • Report any suspicious persons
  • Carry Pepper Spray
  • At night, travel the most well-lit routes
  • Call 911 if you need the police on or off-campus
  • Take advantage of all the safety programs your school has to offer.

. As always, our Public Safety officers are available to provide escorts on campus, and the local Shuttle (is available for off-campus transportation seven nights a week from 11:00 p.m. to 3:00 a.m. during the fall and spring semesters.


Onyx Knight Enterprises is dedicated to providing you useful and informative data to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  In today’s society, being equipped mentally and physically is no longer an option. – Victor Swindell



20 Safety Tips to Help You …Be Safe


According to RAINN, a sexual assault occurs every 98 seconds. You’ve probably seen stories in the media of sexual predator who follow women home from the gym, or other places. But there are several things you can do to reduce your chances of becoming their next prey.

Whether you’re our jogging, shopping or out and about running errands, there are safety tips you can follow to help lower your chances of becoming a crime victim.


1. motto is Get Ready! Stay Ready. – Preparation and Prevention are the keys. Think about having a fire extinguisher and knowing how to use it in your home.
2. Stay Alert – avoid being distracted by your smartphone. Use a blue-tooth if you need to talk
3. Trust your instincts. If something doesn’t ‘feel’ right..leave the area.
4. Always have your keys ready. There are videos on youtube on how to use your keys for self-defense. Watch and learn.
5. If you carry a personal defense device, like pepper spray or a stun gun, whistle – knows how to use it and have it ready. The bottom of your purse is the wrong place to have it.
6. Be aware! Look around and make eye contact with people you encounter.
7. Walk with an attitude. Have that I dare you to mess with me look.
8. If security is available, ask for an escort to your vehicle — especially at night. If you know you are going out at night, have a friend with you!
9. Don’t wear expensive jewelry or carry pricy handbags when you’re shopping, running errands or anytime you’re alone. Robbers often work in pairs. One scopes out potential victims inside, then text or calls their partner with a  description to their partner waiting outside.
10. If you have children with you, keep a close eye on them and teach them about stranger danger. On the news last week was a woman trying to steal a child.
11. If you must take a purse, consider a small, crossbody bag.
12. Hide your cash, credit cards and cell phone in your front pockets, so if a thief does grab your purse, he or she won’t get away with much.
13. Try to avoid being overloaded with shopping bags.
14. When you leave, lock your doors and keep your windows up, and don’t have valuables in plain sight!
15. Keep an eye out for vehicles that might be following you. If they’re still behind you when you’re close to home, drive to the nearest fire station or police station and honk your horn.
16. In carjacking or robbery, give them your car, purse or anything else they want. Nothing is worth risking your life.
17. If someone tries to sexually assault you or force you into their vehicle, scream and fight like your life depends on it..cause it does. Do whatever you have to do to get away…do it!
18. Take a self-defense course. Search for them online. Many colleges and universities offer a FREE RAD (Rape aggression defense) class, and some will teach them to the ladies of any organization (church, yoga, etc).
19. There are several safety apps available, including Guard Lallana, Safe Walk, B Safe, and others they are beneficial to you. Research and use the one that’s best for you.
20. Knowing all of this stuff is good, doing it daily will be better.


PepperSprayPDWimage Self-Defense Products Store is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.
If you want to take personal responsibility for protection, home security, business security, purchase our high-quality discount self-defense products. Survival kits and arm yourself with the knowledge about self-defense and security products and information on the best way to stay secure in an ever-increasing violent world.
In today’s society, being equipped mentally and physically is no longer an option.


A College Assault Story.

The Following Story is True. The Names and Places have been changed




Incident:  Kidnapping (Armed with Knife)  w/Aggravated Assault.

Date:  03/06/2019

Time:  5:15 AM

Reported to:    University of Columbia Department of Public Safety

Report # 2019-019292828

Location:  Alexander Place Parking Lot,  12 Alexander Street, Springfield

Suspects’ status:  At-Large

Incident description: The suspect was discovered sleeping in the victim’s vehicle by the victim. The suspect stabbed the victim’s arm pinning it to the center armrest of the vehicle. The suspect forced the victim to drive him to the area of Upper Queen Street and Upper Gathering Street where the suspect exited the vehicle and fled on foot.

Suspect Description:   Black Male, early 60s, 5’10”, Medium build, Short grayish hair, black hoodie, dark pants

Important Message:  It is important to note that the victim/survivor is never the cause of the criminal offense.

This very real incident is to illustrate how real college crime is and why you need to be prepared

Here are some Safety Tips.

  1. If possible avoid confrontation with individuals you encounter.
  2. If possible avoid becoming involved in incidents you observe.
  3. Use well lit- routes, avoid dark vacant areas, and those not frequented by other people.
  4. Avoid walking alone at night.
  5. Be alert and aware of your surroundings at all times.
  6. Avoid distractions like talking on your cell phone.
  7. If your campus offers RAD, take it
  8. Carry Pepper Spray and know how to use it.

If you observe unusual activity, try to remember details as best you can. For example, what a person was wearing or any other identifiers like scars, tattoos or shoes. Please always be aware of your surroundings, avoid walking alone at night, and notify Law Enforcement immediately if you observe potentially dangerous situations or individuals.

Take advantage of all your campus safety programs.

  • escorts on-campus
  • Free Shuttle/Bus Services

Get involved and Make a Difference:  We encourage the prompt reporting of all crimes, On-campus contact your Public Safety  or law enforcement

Oftentimes, students are present when a crime is about to happen and bystander intervention is one method students may use to help prevent a crime from happening.  Learn how to develop this skill and safely intervene.

Victim Assistance:  Enrolled College of Charleston students who become victims of serious crime are encouraged to get victim assistance by contacting the Office of Victim Services (843.953.2273). Comprehensive services, including assistance with missed classes/academic disruption, are available regardless of the incident location, or if the student elected to file an official report, or not.


Buy Pepper Spray Self-Defense Products Store is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high-quality discount self-defense products. Survival kits and arm yourself with the knowledge about self-defense and security products and information on the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option.


Password Correct..Access Granted

In this digital age, almost all of us are using a computer to access messages, social media cyber thief-hackernetworks, manage some aspects of our financial life, some other aspect of personal computer usage that puts aspects of our lives open to someone who has the key. I usually tell people not to hide their residence keys in obvious places, like under the welcome mat. The same common sense should be used is hiding the digital keys to the virtual residences of our lives. How safe would you feel is a crook has the keys to your house? The same sense of security should be taken when it comes to wanting to secure. One of the sad things is that we can unknowingly tell clues about our lives online in places like Facebook, or blogs, or that a thief can use to help him figure out possible passwords. If any of you have seen the 1983 movie War Games, you may remember that the Hacker was able to gain access to the system, by figuring out that the programmer used the name of his dead son as his backdoor password.

To highlight the necessity of securing your digital life should be news story accounts of security breaches at Abbot Labs,  IBM, Sony, Booz Allen Hamilton, Fox News, NBC, New York Times, Apple, Microsoft, Facebook, Twitter, Linkedin, the US Government and hundreds of other companies. These stories have exposed how insecure or unprepared these major websites and companies, to which consumers like you and I entrust their personal information really are. While we expect some level of security at a corporation, ultimately, your security is your responsibility. Unfortunately one of the side effects of this is that these stories have exposed, is just how helpless we can be. Close examination of a sample set of 40,00 username and passwords out of a sample size of over a million have revealed some interesting results.

Some analysis results:

  1. The analysis showed about 50% of the passwords are less than eight characters long. Eight characters are considered, the minimum length you should even consider when choosing a strong password.  (These passwords only take less than a minute  for a PC to crack) 2. Only 4@ percent of the passwords analyzed used at least makes use at least three of the four character types (Upper case letters, lower case letters, numbers, special characters like #|*. The vast majority only used one character type, such as all lowercase letters or all numbers.  (These passwords only take about 3 days for a PC to crack) 3.. Over 33% of the analyzed were not a random character like “qp}Edhg!13evTOI” rather than “ILikeSpock”. These analyzed passwords could be found in a common password dictionary. The most frequent passwords use included: Seinfeld, password, 123456, purple, princess, Maggie, peanut, shadow, ginger, Michael, Buster, sunshine, trigger, cookie, George, summer, Taylor, Bosco, abc123, Ashley, and bailey.  (most of these take less than a second for a PC to crack, ‘IlikeSpock’ takes about a year) 4. 67% of users had the exact same username/email and password on different systems used the same password on both systems. BAD BAD BAD

6 Simple Rules for some great passwords

  • NEVER choose passwords less than 8 characters long and that is made up solely of numbers or letters. Use letters of different cases, mixtures of digits and letters, and/or non-alphanumeric characters. The longer a password the better so strive for passwords over 8 characters long. If some systems limit the numbers of characters. It’s doesn’t have to be complex as “Picard-Delta-47-Alpha-21” or “173467321476C32789777643T732V73117888732476789764376” which would take a PC 14 octillion  years and 6 vigintillion years to crack respectively
  • Randomness is also key to a great password. NEVER choose a password based upon personal data like your name, birthday your username, or other information that one could easily discover about you from such sources as searching the internet.
  • Create a list of 10-12 such as Qy#i1827Vbsg12348()17w passwords that are random and use a password management program like 1Password or LastPass, or create and remember a password recipe or simple padding pattern.
  • NEVER choose a password that is a word (English, German, or otherwise), proper name, the name of a TV shows, or anything else that one would expect a clever person to put in a “dictionary” of passwords. Especially if it can be found it’s something you’re found of like ‘Hello Kitty’, ‘Disney’, etc
  • NEVER choose a password that is a simple transformation of a word, such as putting a punctuation mark at the beginning or end of a word, converting the letter “l” to the digit “1”, writing a word backward, etc. For example, “password,123” is not a good password, since adding “,123” is a common, simple transformation of a word. Neither is using password where you have substituted the number zero for the letter “o”
  • NEVER EVER EVER use the same password for all your logins (have at least 5).

How to Make Up a Great Password

Passwords should contain a mix of the following sets

  1. lowercase letters
  2. uppercase letters
  3. Numbers
  4. special characters !,#,$,+,%,~ etc
  5. Should be longer than 8 Characters
    1. Example the Password 1@Tf%s&E9Tewhich is based on the numbers 1-2-3-4-5-6-7-8-9-10 would take a PC 4 Thousand years to hack.

Password Levels

  • Level One – contains at least one of the character sets
  • Level Two – contains at least two of the character sets
  • Level Three- contains at least three of the character sets
  • Lever Four-contains all four character sets
  • You can Include some simple substitution like 3 for ‘e’, zero for the letter ‘O’, 1 for ‘I’, 7 to T, 2 for S

Example of how to create a good password

  1. Think of two unrelated things you like computer & socks books & dogs autumn & chocolate OR a phrase from one of your favorite movies or tv shows
  2. Join the words with a non-alphabetic character or two. (#,+,|,!..etc.)
  3. Make at least one change (for example, uppercase a letter or add another character) to one of the words (preferably not just at the very beginning or end of the password).
  • Some example passwords generated using this method:
    • C0mput3r%socks
    • B00ks #dogs
    • Autumn|choc0lat3
    • Gen3sis_Doggi3
    • 76TltbpWa110ccah# – (Seventy-six trombones led the big parade With a hundred and ten cornets close at hand.)
    • 2bo!2b_TitQ – -(To Be or Not To Be The Question)
    • I106mtC_wgaftog_hap0c_1dawws -It’s 106 miles to Chicago, we got a full tank of gas, half a pack of cigarettes, it’s dark… and we’re wearing sunglasses. Read more: Music Man – Seventy-six Trombones Lyrics | MetroLyrics
  • Books like the Bible have a great resource to create passwords as it has over 31,173 verses you can use. You can use Bible verses to create passwords like Joshua24I5$, 54Isa1ah17 *, Pr0v3rbs9_8%, J8hn316*
  • Convert from the Arabic-Hindu Number system into the Hexadecimal System so that you can say BacktoTheFuture1151955 and make it Back#T0#Th3#Future_1193D3

Biometric passwords – There is an increase of computers gives you the ability to use biometric data such as facial recognition, fingerprint, retina pattern or voice print data to generate a unique password based on your data. However, there have also been reported as successful hacks for these methods.   An example of this would we be the Apple fingerprint lock, which was able to be bypassed the week it was released.

Second Key Authentication: Many systems like Facebook, Google, Yahoo, Hotmail, PayPal, and even financial institutions offer second key authentication. In this method, you give the institutions your mobile phone number. When you attempt to login, the system sends a special random access code to the users’ mobile phone. To complete a log in the user must type in this code. Which means they have to have your phone.

Personal Info Authentication: Many systems ask the user to select personal info questions to set up their user accounts such as the color of your first car, or mother’s maiden name, or best friend. These questions are to help users in case they have forgotten your password.  Be careful what info you select! Some information is public information or can be gathered from your Facebook profile.  For example, if your question is ‘Name of the High School you attended?’ and you are a member of the Eric Erickson High School group on facebook, then it’s not hard to answer this question.  What I can suggest is giving easy to nonsense answers like the J3di Acad3my. For example for all your selected questions, put in the name of your favorite something (recording artist, fruit, book, author).  I mean if you select mother’s maiden name as your question, and typed in Mayberry.  it is highly improbable that anyone trying to hack your account will guess that.


Most computer security professionals recommend changing your Internet passwords and account login information at least once every three to six months. Though some debate if it is necessary, however, if you want to be safe change it at least once a year, like a month before or after your birthday and make it an annual reminder on your calendar. It may be safe for you to wait longer; it just depends on your computer habits, and how and where you surf the web. I recommend changing all your passwords at a minimum of once a year, perhaps the day after your birthday, or on New Year’s day, or the first day of spring (spring cleaning). Changing all of your Internet passwords can be a time-consuming and even an exasperating task, especially if you have lots of online accounts. But it is a sure way to guarantee a modicum level of safety; however, it is not the only safety precaution that should be considered for your login information. Whether you bank online or you are just sending a few simple emails, secure passwords are essential. You’ve heard of problems caused by hackers, who use your account to do illegal activity. There have been incidents of people not only hacking into people’s e-mail, or Facebook accounts but sending vicious messages.


You should avoid writing down your password or giving it to others. You should especially avoid writing it down and leaving it in a non-secured place such as on a post-it on your monitor or a piece of paper in your desk. If you absolutely must write something down (because you suffer from CRS), we suggest doing the following:

  • Don’t write down the entire password, but rather a hint that would allow you (but nobody else) to reconstruct it.
  • Keep whatever is written down in two places like a small notebook or other places that only you have access to and where you would immediately notice if it was missing or someone else gained access to it. (like in the movie Ghost)
  • Keep a list of 10 to 12 passwords of length 10 to 20 characters that you only use for 1 year, and then create new ones each year
  • Treat the not book like the One Ring – Keep it secret -Keep it Safe


There are several great websites that will examine your password and tell you how strong that is. Such sites include


However remember that hackers have tools as well, so you should have as many security measures to help reduce your chances of being hacked. Many sites link PayPal, Google, Facebook, Twitter and more have code key authentication features. You can turn these on, and when you (or anyone else) attempts to log in to your account, a numeric code is sent to your cell phone, and you need to type in that code to log in.  Sometimes it’s a hassle, especially if you lose or don’t have your phone with you.




Date-Rape Drugs: Protecting Yourself

Filed under: Date Rape,Date Rape Drugs Informatiion,women's Self-Defense — peppereyes @ 3:35 PM

 What they are and the steps to staying safe from becoming a date rape victim.a-group-of-college-students-having-a-good-time-at-a-party-drinking
For many years a new kind of rape threat has reared it’s ugly head at bars, on college campuses, at house parties, and in various nightclubs – they can be called “predator” or “date rape” drugs. You may have heard of them, but what exactly are date rape drugs? Strictly speaking, any substance that renders a person incapable of saying no or asserting yourself and your needs can be used to commit the act of sexual rape. This can include items such as alcohol, marijuana or other street drugs, designer or club drugs like ecstasy, over-the-counter sleeping pills, and antihistamines, even cold medications. However, the term “date rape drug” usually applies to drugs like Gamma Hydroxy Butyrate (GHB), Rohypnol, and Ketamine Hydrochloride. Listed below are the various types of “Date Rape Drugs” and how they are used.

When people hear the phrase “date rape drug,” alcohol isn’t usually what comes to mind. But, as these statistics show, the link between alcohol and campus sexual assaults is evident:

  • 90% of all campus rapes occur when alcohol has been used by either the assailant or the victim.
  • 55% of female students and 75% of male students involved in acquaintance rape admit to having been drinking or using drugs when the incident occurred.
  • As many as 70% of college students admit to having engaged in sexual activity primarily as a result of being under the influence of alcohol, or to having sex they wouldn’t have had if they had been sober.

Understanding the effects of alcohol on your body, limiting your alcohol consumption and avoiding drinking games are some of the ways you can decrease the risk of sexual assault. Know what alcohol can do to you can help in you in the following ways:
1. You can make a more informed decision about whether or not to drink.
2. You can recognize the warning signs of dangerous intoxication and call EMS for a friend.
3. You can reduce the risks associated with using alcohol, including injury, unwanted sex and being a victim of crime.
4. If you choose to drink, you can make safer decisions about drinking.
5. You can get help for yourself or for a friend.

GHB stands for gamma hydroxybutyrate, a central nervous system sedative often referred to by other names such as “Liquid Ecstasy” or “Grievous Bodily Harm.” GHB can produce drowsiness, dizziness, nausea, unconsciousness, seizures, severe respiratory depression, and coma. An overdose of GHB can occur quickly and can be fatal. GHB is typically an odorless, colorless liquid, with a slightly salty taste. It is classified as a sedative and is in the same drug family as Rohypnol and ketamine.

GHB is used as a general anesthetic in Europe; however, the drug is illegal in the US. It has been used in this country as a date rape drug: it can be slipped into a victim’s drink, causing dizziness, confusion, drowsiness and sometimes loss of consciousness. When GHB is combined with alcohol, it is especially dangerous because the combination of two depressants can lead to overdose.

GHB is generally taken in a liquid form, though it is sometimes found in powder, tablet, or capsules. Since in its liquid form, the strength of GHB varies, and people’s reactions to it varies it is very easy to take a dangerous dose of this drug. The effects of the drug begin 10 to 20 minutes after taking it and last up to 4 hours.

Rohypnol is a brand name for a powerful sedative that is often referred to as “roofies.” Rohypnol is not legally available for prescription in the US and so just having it in your possession signals intent to commit a crime. Rohypnol may cause users to feel intoxicated; they may have slurred speech, impaired judgment, and difficulty walking. The effects are often felt within 10 minutes and can last up to 8 hours. Rohypnol can cause deep sedation, respiratory distress, and blackouts that can last up to 24 hours. Though it has gained popularity as a recreational drug. Colorless and odorless, it has been linked to numerous incidents of sexual assault because it is a fast-acting sleeping pill that can be slipped into a drink and leave the victim with little or no memory of the incident. The drug has been changed to leave telltale blue floating particles when mixed with liquids. If you see these in your drink, do not drink it. Get help and notify Police and Security immediately.

Ketamine is an injectable anesthetic that is intended for veterinary use. It is also known as Special K, K, Vitamin K or Cat Valiums. At high doses, ketamine can cause delirium, amnesia, impaired motor function, high blood pressure, depression, and potentially fatal respiratory problems. Low-dose intoxication from ketamine results in impaired attention, learning ability, and memory. It is most commonly used by veterinarians on large animals today. In the 1980s it began to be used recreationally as an intoxicant.
Ketamine is either sold as a dry white powder or a clear liquid (in its original pharmaceutical packaging). The powder is made by drying the liquid. The residue from this drying process is then crushed and snorted in small doses (called bumps). In rare cases, ketamine is injected intramuscularly or smoked with tobacco or marijuana. Whether smoked or snorted, the effects begin in a few minutes and last less than an hour.

Why Rohypnol, GHB and Ketamine are used in Date Rapes:
While many sedatives have been used as date-rape drugs, Rohypnol, GHB and Ketamine are the ones you are most likely to encounter.

They are easy to administer. (Stir and dissolve)
When victims feel the effects, they often leave and are caught alone and vulnerable.
If victims ‘come to’ during an assault, the drugs render them totally helpless and unable to do anything.
GHB – is most often administered to victims as a clear liquid with a salty taste, but can also be found in capsule and powder forms.

Ketamine – Administered in liquid, tablet and powder form, Ketamine is a fast-acting general anesthetic often used by veterinarians.

Rohypnol – Often dropped into beverages in tablet form, Rohypnol is a potent and fast-acting sedative that dissolves rapidly, leaving no detectable taste, color or odor.

When victims are raped, they doubt their experience because of the impaired memory of it.

HOW TO PROTECT YOURSELF desires that no one falls prey to a data rate drug and we recommend that you take all precautions to not become their next victim.

Whether you are at a bar, the student union or any public situation, keep yourself and your friends safe by doing these simple things:

  • Never leave a drink unattended. NEVER.
  • Do not accept a drink from anyone you would not “put your life into their hands.” Remember, any stranger or casual acquaintance could be suspect. Even those people who are mixing or pouring drinks.)
  • If you are feeling sick or dizzy while out socially, go to someone you KNOW and TRUST. If there is no person you can talk to about your condition, call someone on the phone. Never leave alone or with a stranger. NEVER. (The intent of date rape drugs is to get you isolated and then to assault you.) If you think you have been drugged and cannot tell or call someone, call 911. A blood sample can be collected and appropriate tests run.
  • Remember, alcohol greatly increases the effects of these drugs. The mixture could be lethal.
  • Attend parties or bars with a group of friends, arranging beforehand to watch each other’s drinks. If you arrive as a group, leave as a group.
  • Watch out for your friends. If a friend shows symptoms of date-rape drug ingestion, seek medical attention immediately.
    Signs to look for include: Dizziness and/or nausea, memory loss, breathing or motion difficulties, and acting disproportionately intoxicated relative to the amount of alcohol consumed.
  • To prevent yourself and your friends from becoming victims of date-rape drug, you need to know what you are up against.
  • There are Drink testing Kits you can purchase Self-Defense Products Store is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high-quality discount self-defense products. Survival kits and arm yourself with the knowledge about self-defense and security products and information on the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. – Victor Swindell


Next Page »

Blog at

%d bloggers like this: