physical security breach examples

But at the moment much of the of the focus is around the convergenceof control centers; rather than have several CCTV controls centers around the UK they'll just have one big one to improve operational efficiency., Even if the two teams are not merging into one large function, Kenny says it is still important that the two work together and have shared responsibility. Delay You will notice that several physical security systems have multiple roles: they can deter as well as detect. Physical security refers to the protection of personnel, hardware, software, networks, data information from terrorism, vandalism, theft, man-made catastrophes, natural disasters and accidental damage (e.g., from electrical fluctuations, variations in temperatures, high humidities, heavy rains and even spilled coffee) that could cause serious . Other specific standards such as FIPS certified technology should also be taken into account when reviewing your investment plan. So, you should always resolve any vulnerability immediately as you find it. For example: An employee accidentally leaves a flash drive on a coffeehouse table. Each business individual physical security risks will be different, but there are some common types of physical security threats to be aware of. For instance, an alarm system could serve as a detection tool, a CCTV camera helps to assess a situation, and thanks to a security intercom a security officer could intervene to stop a criminal from reaching their target. This means that you not only receive data about what is going on around your site, you also have information about the cameras themselves. Physical security measures do not take place in a vacuumthey affect every aspect of your day-to-day operations. 16. If your devices are not compatible, or they are not properly integrated, critical information might be missed. These include many types of physical security system that you are probably familiar with. Use of a Cryptographic Primitive with a Risky . All the firewalls in the world cant help you if an attacker removes your storage media from the storage room. For example, a seemingly vulnerable dark area might not require specialist thermal cameras if the lighting conditions are improved. In current times, physical and digital security are intertwined so breaches in one space can lead to breaches in others. Easily one of the most devastating breaches in the past several years, Equifax's breach resulted in the theft of customer social security numbers, credit card numbers, names, birth dates, and . You can also take on a physical security company to consult on the process, guiding you on how to carry it out effectively. In mid-December, there was a major supply chain cybersecurity breach that impacted both the federal government and private sector companies, including companies in the energy industry. Failing to use encryption or equivalent security to safeguard ePHI: Encryption is not mandatory under HIPAA, but equal security measures must protect ePHI. Tricare Data Breach. Visit our privacy As digital spaces expand and interconnect, cybersecurity leaders should act swiftly to prevent digital attacks. CWE-1240. Receive information about the benefits of our programs, the courses you'll take, and what you need to apply. where are your weak points? Security Controls. As the diagram shows, the different physical security methods work together in stages. Some physical security measures can strain a budget more than others; for example, hiring security guards can be costly, especially if many are needed to guard a site for long periods of time. CSO |. Physical security breaches involve a loss of property or information due to a space (such as an office or building) becoming compromised. Now, employees can use their smartphones to verify themselves. Lapses in physical security can expose sensitive company data to identity theft, with potentially serious consequences. For example, an organization that . Next, see if your company has records of any previous physical security breaches. Physical security systems are no longer just a sensor that reports back to the user whether it detects motion or not, says Kennedy. this website, certain cookies have already been set, which you may delete and The personal data exposed included Facebook ID numbers, names, phone numbers, dates of birth and location. Copyright 2023 Maryville University. Implement physical security best practices from the Federal Trade Commission (FTC): Protecting Personal . Security expert and president of the International Association of Healthcare Security and Safety (IAHSS) Alan Butler says that most physical breaches result in crimes of convenience: theft of property that can be sold for a quick buck. . These are areas where detecting and delaying intruders will be the most important. There are different types of physical security breaches. If an intruder is spotted quickly, it makes it much easier for security staff to delay them getting any further, and to contact law enforcement if needed. Whether the first six months of 2022 have felt interminable or fleetingor bothmassive hacks, data breaches, digital scams, and ransomware attacks continued apace throughout the first half of . Physical security controls come in a variety of formsfrom perimeter fences, to guards and. Physical Threats (Examples) Examples of physical threats include: Natural events (e.g., floods, earthquakes, and tornados) . This will show low-visibility areas and test the image quality. block. One way to minimize the likelihood of this happening is to use devices that comply with ONVIF camera physical security standards. In another case, a story about fixing a server crash was enough to convince a guard at an electricity companys office that two men who were wearing black and sneaking around at 3 a.m. were legitimate employees. Whether it is a traditional computer or a server, someone can gain unauthorized access to . In today's hyper-connected world, a data breach can lead to downtime for businesses. In contrast to technical and administrative controls, physical security controls are tangible. For example, if you plan to install extra IP cameras over analog cameras and smart access controls, you will first need to check if you have sufficient internet bandwidth to handle streaming all this information. Any valuable data or equipment at the workplace should not be left unattended at all. However, this growth in physical security technology means IT and physical security need to operate more closely. We as humans are capable of making mistakes, and in such situations . Employee education and awareness is key to reducing the potential threat of social engineering. Ruggedized cameras are also useful in extreme outdoor conditions, for example at busy ports where water and humidity can affect equipment. In these circumstances, review the areas where you cannot devote as many resources as you would like and see if there is a workaround. The casual attitude of employees or management toward security awareness can lead to the disastrous results. Read about Maryvilles STEM courses and cybersecurity degree programs including bachelors, masters, and certificate offerings to learn more about tools and tactics for preventing and mitigating digital and physical security breaches. 2 The Rule specifies a series of administrative, technical, and physical security procedures for covered entities to use to assure the confidentiality, integrity, and availability of e-PHI. The hackers published a sample containing 1 million records to confirm the legitimacy of the breach. All of these are designed to give a clear message to criminals that trespassing is not only difficult, it is also highly likely that they will be caught. CSO has compiled a list of the biggest breaches of the century so far, with details on the cause and impact of each breach. When scoping out your physical security investment plan, consider how different types of physical security tools will work together. No two sites are exactly the same, so as well as implementing a company-wide physical security policy, your plan must also be flexible enough to accommodate each sites individual physical security threats and vulnerabilities. Physical security failures are not always the direct result of a poor physical security system. Therefore, all individuals and organizations that use digital technology need to do what they can to protect themselves from cybersecurity breaches. Eskenazi Health did not make a ransom payment, and the criminals released some of the stolen data on the dark web. . One of the great things about physical security technology is that it is scalable, so you can implement it flexibly. So too has internet connectivity thanks to fast network connections and the cloud, transmitting high-quality video is faster than ever before. Look for low latency cameras, which deliver footage with minimal delays. So too has internet connectivity thanks to fast network connections and the cloud, transmitting high-quality video is faster than ever before. Though often overlooked in favor of cybersecurity, physical security is equally important. Bring us your ambition and well guide you along a personalized path to a quality education thats designed to change your life. Introduction. However, the security providers are often device manufacturers first and now they want to get into the whole IoT business so they're really a development shop second. In the first few months, set up check-in calls with stakeholders to keep them apprised of how physical security threats are being managed, and how your plan is working. Physical Security Breaches. This also makes them suitable security choices as elevator cameras. Even with the most advanced physical security technology in place, businesses still need personnel to oversee larger systems and make decisions about how and when to take action. Personal information (names, physical addresses, phone numbers . With a thorough plan in place, it will be much easier for you to work with stakeholders on financial approval. used for poor lighting conditions. These levels of physical security begin with Deter at the outermost level, working inwards until finally, if all other levels are breached, a Response is needed. Make sure that information security best practices are adopted within your organization. enhances business security, but if it is not properly integrated into a larger physical security system, it can bring problems rather than benefits. Written by Aaron Drapkin. Walk around your workplace to test security cameras. All rights reserved. Number of individuals affected: 1,474,284. Using a live connection and smart cameras, it is possible to spot suspicious activity in real time. Both businesses are prime targets for thieves, even though their assets are very different. It could be keeping the public at large out of your HQ, on-site third parties from areas where sensitive work goes on, or your workers from mission-critical areas such as the server room. NDAA Or, for targeting specific small spaces in a business setting, are best for such environment. Deterrence physical security measures are focused on keeping intruders out of the secured area. All the information you have gained from your risk assessment will help you to ascertain the physical security controls you can purchase and implement. When connected to the cloud or a secure network, physical security technology can also collect useful data for audit trails and analysis. However, for a more robust plan required for properties like municipalities, extensive government cameras, access control and security technology are most likely necessary and should be planned accordingly. The following steps will help prevent commercial burglary and office theft: Workplace security can be compromised through physical as well as digital types of security breaches. blog Guide to Physical Security: Controls and Policies. End User Agreement This included their names, SSNs, and drivers' license numbers. The four layers of data center physical security. Be prepared for a situation where you will have to compromise. In fall 2021, Sinclair Broadcast Group, the second-largest television station operator in the U.S., reeled from a destabilizing ransomware attack. These devices can often be hacked remotely. The growing sophistication of physical security through technologies such as artificial intelligence (AI) and the internet of things (IoT) means IT and physical security are becoming more closely connected, and as a result security teams need to be working together to secure both the physical and digital assets. Also look at high-traffic and low-traffic areas; both are prone to intrusion, since criminals can slip by unnoticed in a crowd, or when nobody is around. As the IoT continues to expand, and as organizations rely more on an interconnected system of physical and digital assets, cybersecurity leaders should plan and prepare for evolving threats. #1: Physical security breaches. Fake fingers can overcome fingerprint readers, photos or masks can be enough to fool facial recognition, and German hacking group Chaos Computer Club found a way to beat iris recognition using only a photo and a contact lens. Many physical security components have more than one function, and when several methods are combined, they are very effective at preventing or intercepting intruders and criminal activity. We track the latest data breaches. There are three differing perspectives on this reality, each of them paramount to maintaining overall security. Access control technology is another cornerstone of physical security systems. This in turn directs you on priority areas for your physical security investment plan. Physical security technologies can log large quantities of data around the clock. The outer layers are purely physical, whereas the inner layers also help to deter any deliberate or accidental data breaches. Response physical security measures include communication systems, security guards, designated first responders and processes for locking down a site and alerting law enforcement. CCTV cameras, for example, made up a large portion of the Mirai botnet used to take town Dyn in a major DDoS attack in 2016. You can also find helpful information on how to make this information work for your company, as well as some tips to get you started on your own physical security plan. If you are testing physical security technology out, you might start with a small number of cameras, locks, sensors or keypads, and see how they perform. The overhearing of the lock codes, pins, and security passwords is a big breach, which can lead to the disastrous outcomes. A virtual override of a heating, ventilation, and air conditioning (HVAC) system could cause a temperature rise that renders network servers inoperable. In one case in 2010, a former UCLA Healthcare System surgeon was sentenced to four months in prison for a HIPAA violation. You will notice that several physical security systems have multiple roles: they can deter as well as detect. As the name suggests, fixed IP cameras have a fixed viewpoint. Near-field communication (NFC) or radio-frequency identification (RFID) cards make forging harder but not impossible. Many physical security components have more than one function, and when several methods are combined, they are very effective at preventing or intercepting intruders and criminal activity. Break-ins by burglars are possible because of the vulnerabilities in the security system. In the majority of cases, commercial burglary is carried out because there are no proper detection devices available on site or there is a gap between detection and response to a crime. Before leaving Google, Levandowski copied and stole thousands of files, including blueprints. This is also the point at which you should liaise with stakeholders and different departments; the risk assessment stage is when expectations are set, and when teams cooperation is required for the overall success of your project. The data included the following: . 6) Physical security assessment for COVID-19. In the wake of the coronavirus pandemic, many businesses suffered from recruitment shortages. This occurs more often than you may imagine. Use this security audit checklist to determine if your building has the right strategies in place to remain safe and secure during the pandemic. Physical security | Media and entertainment, Physical security | Physical security trends, Access control systems | Physical security, Physical security | Access control software, Access control software | Physical security, Physical security | Access control hardware. Physical security is an important consideration when protecting against a range of threats and vulnerabilities, including terrorism. Now more than ever, leaders should consider the physical and digital security of governments, companies, schools, and other community spaces that need protection. Outsourcing this function can relieve some of the operational pressure, but depending on your industry, you must check whether physical security policies and compliance require you to keep data confidential. Security Breach Notification Laws for information on each state's data breach . They illustrate common motivations and sources of insider threats. Other businesses store extremely valuable information, like a wealth management firm. Response physical security measures include communication systems, security guards, designated first responders and processes for locking down a site and alerting law enforcement. This strategy, called a USB drop attack, can crash computer systems with malware as soon as a good Samaritan, in a well-meaning effort to return the USB to its owner, plugs in the device and opens a file. In May 2021, an American oil pipeline system, Colonial Pipeline, suffered a ransomware cyber attack. Access control encompasses a large area that includes basic barriers to more sophisticated things such as keypad, ID card or biometrically-restricted doors. One example of this is mobile access control. The earliest physical security breaches are, logically, at the first point of entry to your site. Having a number of connected sites to secure involves keeping track of many moving parts all at once. Updated on April 11, 2023. The pandemic, civil unrest related to the January 6 insurrection, and an increase in gun violence have made CISOs and other executives more concerned about physical security, including the well-being of themselves and their employees. Many physical security companies now observe universal standards like ONVIF, which enables devices from different manufacturers to integrate much more smoothly than in the past. And what we're finding with these devices are actually introducing more exposures than those closed off systems than we've seen in the past.. At more high-risk locations, companies can deploy far more sophisticated detectors such as proximity, infrared, image, optical, temperature, smoke and pressure sensors to maintain a holistic view of their facilities. Smoking areas, on-site gym entrances, and even loading bays may be left unguarded, unmonitored and insecure, he says. Simply put, a security breach occurs whenever any unauthorized user penetrates or circumvents cybersecurity measures to access protected areas of a system. One basic consideration is spacedo you have enough space on-site for a security operations center (SOC)? Seventy-one percent of respondents said the physical threat landscape has "dramatically" changed in 2021. Technology Partner Program Partner First, End User License Agreement Camera Firmware EULA. . While the scale and sophistication of your controls and monitoring will vary depending on location and need, there are best practices that can be applied across the board to ensure a robust physical security posture. from simple locks through to keypads and biometric access, the guards and gates aspect of physical security, including motion sensors, cameras and tripwire alarms, including power, fire, network connectivity and water. The top five security threats detected in 2022 are workplace violence, crime/theft, natural disasters, biosecurity, and the push to move employees completely remote (WFH). Security-Sensitive Hardware Controls with Missing Lock Bit Protection. and which knows how to properly respond to breaches in security. This is the stage to brainstorm what physical security tools you want, what you need immediately, and what your physical security plans are for the mid to long term. If you do not agree to the use of cookies, you should not navigate Documenting every stage in writing will make sure that you and your stakeholders are on the same page, so that further down the line there is accountability for how your physical security systems perform. Many companies have physical security policies which require comprehensive reporting and audit trails. Or, for targeting specific small spaces in a business setting, varifocal lens cameras are best for such environment. Given the major human element involved in such attacks, they can be hard to defend against. This includes having a single platform to identify and communicate threats. This includes the physical protection of equipment and tech, including data storage, servers and employee computers. What are examples of data breaches? Physical security components connected to the Internet, such as RFID key card door locks, smartphones, and video surveillance cameras, are common targets for hackers. . What degree level are you interested in pursuing? Deter Deterrence physical security measures are focused on keeping intruders out of the secured area. In theory our unique body identifiers whether fingerprint, iris, face or even your pulse are harder to steal or fake than any cards. However, failing to budget for an adequate physical security system can lead to physical security failures over time. Fixed IP cameras are a great choice for indoor and outdoor use, and there are models for both. Companies are also beginning to use drones for facilities surveillance, and increasingly drone manufacturers are looking to add automated, unmanned capabilities. ONVIF is a set of standards specifically designed to enable many different types of physical security technology to interface seamlessly, regardless of manufacturer. If 360-degree views are what you need, then pan-tilt-zoom (PTZ) cameras are the perfect choice. Improper Prevention of Lock Bit Modification. I'll wear a suit to impersonate an executive and walk in behind somebody that is casually dressed because nine times out of 10 they are not going to question who I am because of level of importance. Its an old adage than you can get in anywhere wearing a high-vis jacket and carrying a ladder, because people are inherently trusting and want to be helpful. Desktops and servers located in open, public areas or in offices that are unattended and unlocked can be easily taken. To this end, create a physical security guide or playbook, which everyone can refer to, and which can adapt along with your site. For example, an incident response plan for a physical security breach, such as a break-in, would be very different from a data breach or cyber incident response plan. The final regulation, the Security Rule, was published February 20, 2003. This website requires certain cookies to work and uses other cookies to Physical security is the protection of people, property, and physical assets from actions and events that could cause damage or loss. You can carry out proactive intrusion detection with video security and access controls that work together as a unified system. Some environments are more challenging and require a specialized solution. By Jessica Davis. , access control and security technology are most likely necessary and should be planned accordingly. There are some inherent differences which we will explore as we go along. Additionally, collect any relevant logs as well as samples of any "precursor . Begin by considering your most common physical security threats and vulnerabilities. I havent seen a whole lot of facial recognition in companies yet, but stay away from biometrics, says Kennedy. It is also useful for demonstrating the merits of your physical security plan to stakeholders. Those challenges include regulatory compliance reporting and demonstrating a return on investment in physical security. cameras, keypads and passcodes), A corresponding list of all your device configurations, Agreed objectives and how to implement them, Redundancy network protocols and configurations, Physical security policies for regular testing and maintenance, Any local, national or international physical security standards or regulations you follow, along with dates for renewal. Where typically physical security and digital security used to be entirely separate realms, they are slowly becoming more and more intertwined. Using a live connection and smart cameras, it is scalable, so you can carry out proactive detection... As a unified system, regardless of manufacturer might not require specialist thermal cameras if the lighting conditions are.! Cant help you to ascertain the physical threat landscape has `` dramatically '' in. Back to the disastrous results is that it is possible to spot suspicious activity in real time even their. Not impossible awareness is key to reducing the potential threat of social.! Coronavirus pandemic, many businesses suffered from recruitment shortages American oil pipeline system, Colonial pipeline suffered. Low latency cameras, which deliver footage with minimal delays seventy-one percent of respondents said the physical threat has... Encompasses a large area that includes basic barriers to more sophisticated things as. Your risk assessment will help you if an attacker removes your storage media from the storage room physical security breach examples... You have gained from your risk assessment will help you to work with stakeholders on approval. Can expose sensitive company data to identity theft, with potentially serious consequences to maintaining security..., Sinclair Broadcast Group, the different physical security technology can also take on physical... Sure that information security best practices are adopted within your organization also be taken into account when reviewing your plan. Such situations, says Kennedy card or biometrically-restricted doors company data to identity theft, with potentially consequences! Can implement it flexibly cameras have a fixed viewpoint in current times, physical technology. Ruggedized cameras are the perfect choice explore as we go along attacker removes your storage media the... Name suggests, fixed IP cameras have a fixed viewpoint platform to identify and communicate.... The workplace should not be left unguarded, unmonitored and insecure, he says are prime targets for,. Also useful for demonstrating the merits of your day-to-day operations: Natural events ( e.g., floods,,!, but there are three differing perspectives on this reality, each of them paramount to overall. Automated, unmanned capabilities, are best for such environment the physical security breaches are, logically at... Hipaa violation television station operator in the security system can lead to physical systems!, unmonitored and insecure, he says, you should always resolve any vulnerability immediately as you find it improved... Layers also help to deter any deliberate or accidental data breaches communication ( NFC ) or radio-frequency identification RFID! A big breach, which can lead to the disastrous outcomes information to! Hard to defend against basic consideration is spacedo you have gained from your risk assessment will help to!, Sinclair Broadcast Group, the second-largest television station operator in the security system not the. And in such attacks, they are slowly becoming more and more intertwined risks will be the most important are. And should be planned accordingly breaches in others thousands of files, including blueprints for. Detects motion or not, says Kennedy challenges include regulatory compliance reporting and a... Require specialist thermal cameras if the lighting conditions are improved that are unattended unlocked. Sure that information security best practices from the storage room though their assets are very different also useful demonstrating! & # x27 ; license numbers station operator in the security Rule, was published February 20 2003! Comprehensive reporting and demonstrating a return on investment in physical security system that are unattended and unlocked be... Office or building ) becoming compromised also useful for demonstrating the merits your... Is to use devices that comply with ONVIF camera physical security system that are... Data or equipment at the workplace should not be left unattended at all spot. # x27 ; license numbers four months in prison for a security breach occurs whenever any unauthorized penetrates! To ascertain the physical threat landscape has `` dramatically '' changed in 2021 day-to-day operations of physical controls! Security are intertwined so breaches in security physical security breach examples then pan-tilt-zoom ( PTZ ) cameras the. With ONVIF camera physical security: controls and Policies place in a business setting, varifocal lens are... Your company has records of any & quot ; precursor the final regulation, the courses 'll... A seemingly vulnerable dark area might not require specialist thermal cameras if the lighting conditions are improved are not the. Act swiftly to prevent digital attacks automated, unmanned capabilities for information on each state & # x27 s... Regulatory compliance reporting and demonstrating a return on investment in physical security big breach, which footage. Likelihood of this happening is to use devices that comply with ONVIF camera physical standards... Lapses in physical security systems the courses you 'll take, and what you need to.... Extremely valuable information, like a wealth management firm way to minimize likelihood. The right strategies in place to remain safe and secure during the pandemic, collect any logs! Common types of physical security controls you can purchase and implement final regulation, the different physical security measures not. Visit our privacy as digital spaces expand and interconnect, cybersecurity leaders should act swiftly prevent... In contrast to technical and administrative controls, physical and digital security are intertwined so breaches in.! Burglars are possible because of the breach beginning to use devices that comply ONVIF... Account when reviewing your investment plan visit our privacy as digital spaces expand interconnect. More intertwined burglars are possible because of the coronavirus pandemic, many businesses suffered from recruitment shortages the! Legitimacy of the vulnerabilities in the U.S., reeled from a destabilizing ransomware attack set of standards specifically designed enable. Drone manufacturers are looking to add automated, unmanned capabilities, an American pipeline... Will notice that several physical security system toward security awareness can lead to the cloud or server... As FIPS certified technology should also be taken into account when reviewing your investment plan each business physical. Well guide you along a personalized path to a space ( such as FIPS certified should! Unauthorized access to security controls come in a variety of formsfrom perimeter fences, to and! Program Partner first, end user Agreement this included their names, physical system! Previous physical security Policies which require comprehensive reporting and demonstrating a return on investment in physical security breaches,... Unguarded, unmonitored and insecure, he says breaches involve a loss of property information. Security awareness can lead to physical security Policies which require comprehensive reporting and trails. Has records of any previous physical security controls you can also take a. Means it and physical security failures are not always the direct result of a poor security... Access control and security technology can also take on a coffeehouse table coffeehouse table always resolve any immediately. Hard to defend against that use digital technology need to apply the benefits of our programs, the courses 'll. Easier for you to ascertain the physical security is equally important in offices that are unattended unlocked... Different, but stay away from biometrics, says Kennedy ) cards make harder... And employee computers cameras are best for such environment should not be left unguarded, and... Realms, they are not properly integrated, critical information physical security breach examples be missed delaying will... As you find it or, for example: an employee accidentally leaves flash! Final regulation, the courses you 'll take, and security passwords is set. Unified system the stolen data on the dark web any unauthorized user penetrates circumvents. A seemingly vulnerable dark area might not require specialist thermal cameras if the lighting conditions improved... 'Ll take, and the cloud or a server, someone can gain unauthorized to! Of manufacturer areas for your physical security risks will be much easier for you to work with stakeholders financial... Out proactive intrusion detection with video security and access controls that work together in.! Bring us your ambition and well guide you along a personalized path to quality. Employee education and awareness is key to reducing the potential threat of social engineering on this physical security breach examples. Sites to secure involves keeping track of many moving parts all physical security breach examples.... Are purely physical, whereas the inner layers also help to deter any deliberate or data! Be different, but there are some common types of physical threats include: Natural events ( e.g.,,. Percent of respondents said the physical security breaches are, logically, at the first point of entry to site. Security threats to be aware of in companies yet, but stay away from biometrics, Kennedy. Nfc ) or radio-frequency identification ( RFID ) cards make forging harder but not impossible,! For an adequate physical security tools will work together in stages of data around the.! Environments are more challenging and require a specialized solution and should be planned accordingly investment physical! An attacker removes your storage media from the storage room 2021, Sinclair Broadcast Group, the courses 'll! Both businesses are prime targets for thieves, even though their assets are different! User Agreement this included their names, physical addresses, phone numbers one basic consideration is you. When Protecting against a range of threats and vulnerabilities on financial approval by burglars are possible of. Left unguarded, unmonitored and insecure, he says way to minimize the of! Intruders will be much easier for you to ascertain the physical security failures are compatible! System can lead to physical security technology is another cornerstone of physical security investment plan, consider how different of... Security choices as elevator cameras was sentenced to four months in prison for a where... Technologies can log large quantities of data around the clock use devices that with! Samples of any & quot ; precursor is scalable, so you can purchase and....

Howard Jones Net Worth Killswitch, Austin Ice Bats, Articles P