|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a434446510 Factors to Consider in Designing Vehicle Checkpoints2015-05-28T04:00:00Z0|#21788f65-8908-49e8-9957-45375db8bd4f;L0|#021788f65-8908-49e8-9957-45375db8bd4f|National Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Los Nuevos Reclutados2015-05-29T04:00:00Z|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Security Market Growth Continues2015-05-15T04:00:00Z|#21788f65-8908-49e8-9957-45375db8bd4f;L0|#021788f65-8908-49e8-9957-45375db8bd4f|National Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Global Defense of the Food Supply2015-06-01T04:00:00Z|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a434446560 Years: ASIS in the 1980s2015-06-01T04:00:00Z|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a434446560 Years: 60 Milestones2015-01-01T05:00:00Z|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Shots Fired2015-02-01T05:00:00Z|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Live Chemical Agent training2015-05-04T04:00:00Z’s-Perspective.aspxGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465An Insider’s Perspective|#21788f65-8908-49e8-9957-45375db8bd4f;L0|#021788f65-8908-49e8-9957-45375db8bd4f|National Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465The New Recruits2015-04-01T04:00:00Z

Security Management

 Morning Security Brief

View RSS feed

 SM Weekly

Retrieving Data

 SM Daily

Retrieving Data
Not a Member? Join Now 2015 SM OnlineGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<h4>​MEDICAL ID THEFT</h4><div>In 2014, more than 2 million victims were affected by medical identity theft, an increase of nearly half a million victims compared with 2013, according to <em><a href="" target="_blank">The Fifth Annual Study on Medical Identity Theft</a></em>, a report commissioned by the Medical Identity Fraud Alliance, a public-private partnership aimed at reducing medical identity fraud. For the healthcare consumer, this type of identity theft can be expensive. According to the study, 65 percent of medical ID theft victims paid more than $13,000 to resolve the crime. The study was supported by Kaiser Permanente, ID Experts, Experian Data Breach Resolution, and Identity Finder, LLC, and was conducted by the Ponemon Institute.​</div><div><br> </div><h4>CYBERSECURITY AND THE LAW</h4><div>A new study—<em><a href="/ASIS%20SM%20Documents/The-Emergence-of-Cybersecurity-Law.pdf">The Emergence of Cybersecurity La</a>​</em>w—looks at cyber law as a growing field for legal practitioners and the roles that lawyers are playing in responding to corporate cybersecurity threats.</div><div><br> </div><h4>FOOD SAFETY</h4><div>The Food and Drug Administration is in charge of making sure the food that’s imported into the United States is safe and inspected. A <a href="" target="_blank">Government Accountability Office report​</a> raises concerns that the FDA’s foreign offices are not conducting enough food inspections. </div><div><br> </div><h4>VEHICLE SECURITY</h4><div>Most new cars have wireless technology that could make them vulnerable to hacking or privacy intrusions, according to <em><a href="">Tracking & Hacking​</a></em>, a report by U.S. Senator Ed Markey’s staff. </div><div><br> </div><h4>HACKING VEHICLES</h4><div>In a <a href="/ASIS%20SM%20Documents/remote%20attack%20surfaces.pdf">report released at Black Hat 2014</a>, researchers Charlie Miller and Chris Valasek detail the vulnerabilities in the computer components of a variety of vehicles that could allow hackers to gain control of the vehicle.</div><div><br> </div><h4>DISCRIMINATION</h4><div>The <a href="" target="_blank">U.S. Supreme Court ​</a>allowed a woman suing for pregnancy discrimination to take her case back to court because she deserved another chance to prove that the company had treated her differently from other protected workers.</div><div><br> </div><h4>WHISTLEBLOWERS</h4><div>A <a href="" target="_blank">federal appeals court denied</a> a man’s petition of a claim to a whistleblower award as he submitted information to the Securities and Exchange Commission before the law in question was enacted. </div><div><br> </div> 2015 Legal Report ResourcesGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p>​<strong style="line-height:15px;">Discrimination. </strong><span style="line-height:15px;">The U.S. Supreme Court allowed a woman suing her former employer for pregnancy discrimination to take her case back to court. Justice Stephen G. Breyer </span><a href="" style="line-height:15px;">wrote in the majority opinion​</a><span style="line-height:15px;"> that the woman deserved another chance to prove that the company had treated her differently from “a large percentage of nonpregnant workers” who might have been offered accommodations. ​</span></p><div><strong>Whistleblowers.</strong> A federal appeals court <a href="" target="_blank">denied a man’s petition</a> of a claim to a whistleblower award as he submitted information to the Securities and Exchange Commission (SEC) before the Dodd-Frank Act was enacted. </div><div><br></div><div><strong>Discrimination.</strong> The U.S. Equal Employment Opportunity Commission and the U.S. Department of Justice Civil Rights Division signed a <a href="">new Memorandum of Understanding</a> (MOU) to prohibit employment discrimination in state and local government sectors. The MOU includes provisions to coordinate the investigation of charges of discrimination on the basis of any characteristic protected by Title VII of the Civil Rights Act of 1964.</div><div><br></div><div><strong>Information sharing. </strong>President Barack Obama signed <a href="">an executive order</a> that encourages the development of information sharing and analysis organizations (ISAOs) for cybersecurity information sharing and collaboration within the private sector and between it and the government.</div><div><br></div><div><strong>Cybersecurity.</strong> The U.S. Senate Intelligence Committee passed a bill that would create incentives to increased cybersecurity threat information sharing and grant liability protections to the private sector. The bill—<a href="">the Cybersecurity Information Sharing Act of 2015</a>—directs increased sharing of classified and unclassified information about cyber threats with the private sector.</div><div><br></div><div><strong>Corruption. </strong>The National Assembly of South Korea passed anticorruption legislation that affects journalists, teachers, and public servants who accept single cash donations or gifts for more than 1 million won (approximately $910). <a href="">Under the new law</a>, public servants, teachers, and journalists face fines or up to three years in prison for accepting gifts over the value limit, regardless of if there is evidence of bribery or influence peddling.</div><div><br></div><div><strong>Discrimination.</strong> Arkansas passed legislation that prohibits local governments from passing ordinances to protect LGBT people from discrimination. Gov. Asa Hutchinson did not sign the bill <a href="">(S.B. 202</a>) into law, but took no action on the legislation for five days, allowing it to be passed automatically. The law will prevent counties and cities in Arkansas from enacting or enforcing laws that ban sexual orientation or gender identity discrimination. </div><div><br></div><div><strong>Financial crime. </strong>Utah enacted a law that will create the United States’ first public white collar crime offender registry website. The state attorney general is tasked with creating the <a href="">Utah White Collar Crime Offender Registry</a>, which will include names and recent photographs of offenders since late 2005, along with their date of birth, height, weight, and eye and hair color. </div><div><br></div><div><strong>Reporting.</strong> A federal court <a href="" target="_blank">denied the U.S. Department of Justice’s motion</a> to dismiss a case that challenges the government’s use of a nationwide program that collects, vets, and disseminates intelligence with a possible nexus to terrorism. The case alleges that the DOJ has issued protocols that use an overly broad standard to define the types of activities that should be deemed as “having a potential nexus to terrorism.”</div><div><br></div><div><strong>Terrorism. </strong>Five High Court judges declared clauses of the <a href="">Kenyan Security Laws Act </a>unconstitutional and violations of fundamental human rights that did not add value to the fight against terrorism. The ruling strikes down provisions that would have punished media practitioners, that would have allowed prolonged detention of individuals, and six other provisions.</div><div><br></div><div><strong>Surveillance. </strong>The American Civil Liberties Union (ACLU) <a href="">filed suit against the National Security Agency</a> (NSA) over its mass interception and searching of Americans’ international communications. The ACLU is challenging the NSA’s use of “upstream” surveillance, which allows the federal government to monitor almost all international text-based communications through the Internet.</div><div><br></div> 2015 Legal ReportGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<h4>​U.S. Judicial Decisions</h4><p><strong>Discrimination.</strong> The U.S. Supreme Court allowed a woman suing her former employer for pregnancy discrimination to take her case back to court. Justice Stephen G. Breyer wrote in the majority opinion that the woman deserved another chance to prove that the company had treated her differently from “a large percentage of nonpregnant workers” who might have been offered accommodations. </p><p>Peggy Young was was a part-time driver for United Parcel Service (UPS) when she became pregnant in 2006 after several miscarriages. Young’s doctor advised her that she should not lift more than 20 pounds. But UPS required drivers to be able to lift up to 70 pounds, and told Young she could not work while under a lifting restriction.</p><p>Young decided to stay home without pay during most of the time that she was pregnant, eventually losing her employee medical coverage. She then filed suit against UPS, claiming that it acted unlawfully in refusing to accommodate her pregnancy-related lifting restriction.</p><p>Young claimed that her coworkers were willing to help her with lifting heavy packages, and that UPS accommodated other drivers who were “similar…in their inability to work,” according to court documents. </p><p>However, UPS held that “other persons” that were accommodated were drivers who became disabled on the job, who had lost their U.S. Department of Transportation certifications, or who suffered disabilities covered by the Americans with Disabilities Act. Since Young did not fall within any of these categories, UPS claimed it had not discriminated against her based on her pregnancy.</p><p>Young’s initial suit was dismissed by the U.S. Court of Appeals for the Fourth Circuit, which said that the Pregnancy Discrimination Act of 1978 does not give pregnant women “a ‘most favored nation’ status,” according to the opinion written by Judge Allyson Kay Duncan. “One may characterize the UPS policy as insufficiently charitable, but a lack of charity does not amount to discriminatory animus directed at a protected class of employees.”</p><p>Young then appealed to the U.S. Supreme Court, which took her case and ruled to remand the case. In the majority opinion, Breyer wrote that the Fourth Circuit did not consider the combined effects of UPS’s accommodation policies or the justifications for them. </p><p>“That is, why, when the employer ac­commodated so many, could it not accommodate pregnant women as well?” he asked. “Viewing the record in the light most favorable to Young, there is a genuine dispute as to whether UPS provided more favorable treatment to at least some employees whose situation cannot reasonably be distinguished from Young’s.” </p><p>The case will return to the Fourth Cir­cuit for further proceedings. (Young v. United Parcel Service, Inc., U.S. Supreme Court, No. 12-1226, 2015)</p><p><strong>Whistleblowers. </strong>A federal appeals court denied a man’s petition of a claim to a whistleblower award because he submitted information to the Securities and Exchange Commission (SEC) before the Dodd-Frank Act was enacted. </p><p>Between 2004 and July 2009, Larry Stryker submitted information to the SEC’s Enforcement Division about alleged wrongdoing by Advanced Technologies Group LTD (ATG) and another individual. The SEC opened an investigation into the alleged misconduct in March 2009 and interviewed Stryker in April of that year. </p><p>The SEC then filed an enforcement ac­tion against ATG and the individual, charging them with violating a section of the Securities Act of 1933, and settling with them in November 2010 for just over $19 million. During this process, the Dodd-Frank Act was enacted on July 21, 2010.</p><p>On January 11, 2011, Stryker submitted an application for a whistleblower award under Section 21F of Dodd-Frank. However, the SEC denied his award claim because Stryker did not submit “original information” after Dodd-Frank was enacted.</p><p>Stryker challenged the decision, which went to a federal appeals court. The court ruled in favor of the SEC. In his opinion, District Judge J. Paul Oetken wrote that “information submitted before July 21, 2010, does not qualify as ‘original information.’”</p><p>Oetken explained that Stryker’s “sub­mission…did not qualify as statutorily defined whistleblower information because it did not conform to the SEC’s rule…which disqualified information submitted prior to July 21, 2010; and did not fall within Congress’s safe harbor, which excluded from its protection information submitted prior to that date.” (Stryker v. SEC, U.S. Court of Appeals for the Second Circuit, No. 13-4404-ag, 2015)​</p><h4>Regulatory Issues</h4><p><strong>Discrimination.</strong> The U.S. Equal Em­ployment Opportunity Commission (EEOC) and the U.S. Department of Justice (DOJ) Civil Rights Division signed a new Memorandum of Understanding (MOU) to prohibit employment discrimination in state and local governments.</p><p>The MOU includes provisions to co­ord­i­nate the investigation of charges of discrimination on the basis of any characteristic protected by Title VII of the Civil Rights Act of 1964. The MOU also includes provisions allowing for information sharing among the EEOC, the DOJ, and third parties.</p><p><strong>Information sharing.</strong> President Barack Obama signed an executive order that encourages the development of information sharing and analysis organizations (ISAOs) for cybersecurity information sharing and collaboration within the private sector and between the private sector and the government. </p><p>Under the executive order, information sharing is expanded by encouraging the “formation of communities that share information across a region or in response to a specific emerging cyber threat,” according to the White House. ISAOs can be not-for-profit communities, a membership organization, or a single company acting as a facilitator between customers or partners.</p><p>Additionally, the executive order directs the U.S. Department of Homeland Security (DHS) to fund the creation of a nonprofit organization to create a common set of voluntary standards for ISAOs. It also clarifies DHS’s authority to enter agreements with information sharing organizations through the National Cybersecurity and Communications Integration Center (NCCIC).</p><p>The executive order further streamlines private sector companies’ ability to access classified cybersecurity threat information by adding DHS to the list of federal agencies that approve classified information sharing arrangements. The order also allows DHS to take steps to “ensure that information sharing entities can appropriately access classified cybersecurity threat information,” the White House said.​</p><h4>State Legislation</h4><p><strong>Discrimination. </strong>Arkansas passed legislation that prohibits local governments from passing ordinances to protect LGBT people from discrimination. Gov. Asa Hutchinson did not sign the bill (S.B. 202) into law, but took no action on the legislation for five days, allowing it to be passed automatically.</p><p>The law will prevent counties and cities in Arkansas from enacting or enforcing laws that ban sexual orientation or gender identity discrimination. It also invalidates any existing LGBT-inclusive nondiscrimination ordinances within the state.</p><p>The law goes into effect at the end of August, making it the second state to enact this type of legislation following Tennessee, which adopted a similar law in 2011.</p><h4>U.S. Legislation</h4><p><strong>Cybersecurity.</strong> The U.S. Senate In­telligence Committee passed a bill that would create incentives to increase cybersecurity threat information sharing and grant liability protections to the private sector.</p><p>The bill—the Cybersecurity Information Sharing Act of 2015 (S. 754)—would facilitate increased sharing of classified and unclassified information about cyber­threats with the private sector. It also authorizes private entities to monitor their networks and those of consenting customers for cybersecurity purposes. Companies can then share cyberthreat indicators with each other, or with the government.</p><p>Additionally, the bill creates liability protection for companies, allowing them to monitor networks for cybersecurity threats and share information about cyber threats between companies.</p><p>However, the bill does not require private sector entities to share cyberthreat information, restricts the use of cyberthreat indicators to specific purposes, and requires that companies remove personal information before sharing cyberthreat indicators. </p><p>The bill is sponsored by Committee Chairman Sen. Richard Burr (R-NC) and has been placed on the Senate Legislative Calendar.​</p><h4>Other Legislation</h4><p><strong>South Korea</strong></p><p><strong>Corruption. </strong>The National Assembly of South Korea passed anticorruption legislation that imprisons journalists, teachers, and public servants who accept single cash donations or gifts of more than 1 million won (approximately $910).</p><p>Under the new law, public servants, teachers, and journalists face fines or up to three years of prison for accepting gifts over the value limit, regardless of whether there is evidence of bribery or influence peddling. Spouses are also subject to the new law, and public servants, teachers, and journalists whose significant others accept gifts over the value limit from individuals that involve conflicts of interest can also be punished.</p><p>The new law goes into effect in October 2016 and the government is working to create a list of gifts that will be exempt from it, such as cash donations at weddings and funerals.</p> 2015 Industry NewsGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<h4>​Watching Over the Race</h4><p>The 2014 TCS New York City Marathon was a mammoth event, with more than 50,000 runners and another 2 million onlookers. Sponsored by Tate Consulting Services (TCS), it was organized by New York Road Runners. The race course wound through Central Park, where runners were often hidden from view by trees and buildings. </p><p>The organizers depended on a team of security partners to deploy a wireless surveillance network along the route. Sony cameras and Network Video Technologies transmitters were linked with Firetide wireless mesh nodes to the Race Command Center, where a Milestone XProtect Smart Wall displayed 36 simultaneous camera views. Centennial Security Integration assisted with installation, and VIRSIG LLC configured and deployed the network.</p><h4>PARTNERSHIPS AND DEALS</h4><p><strong>The University of Southern California</strong> is using software from <strong>Armorway</strong> to enhance planning for campus security. The software applies game theory to analytics to generate unpredictable security plans.</p><p><strong>Blue Coat Systems</strong> will integrate machine learning analytics from <strong>Prelert </strong>into its portfolio of security solutions to detect abnormal behaviors.</p><p><strong>Boon Edam </strong>has installed a revolving door for access to the<strong> Burj Khalifa At the Top Sky</strong> observation deck in Dubai.</p><p><strong>CertainSafe</strong> has announced a partnership with <strong>Express Notary Services</strong> to provide data protection for mobile notaries.</p><p><strong>Diebold, Incorporated,</strong> and <strong>Eagle Eye Networks, Inc</strong>., have formed a strategic alliance to deliver cloud-based video services.</p><p>The law firm<strong> Updike, Kelly & Spel­lacy P.C</strong>. is using a solution from <strong>Good Technology</strong> for mobile security, productivity, and compliance.</p><p><strong>Honeywell </strong>has named<strong> Apex Investigation & Security Inc. </strong>and <strong>Symon Systems, LLC,</strong> authorized Honeywell security dealers.</p><p><strong>Kramer Electronic</strong><strong>s</strong> has entered into a global distribution agreement with <strong>HighSecLabs</strong>.</p><p><strong>Unified Compliance</strong> and <strong>MetricStream</strong> are collaborating to create a cybersecurity hub.</p><p><strong>The University of Oregon Law Library</strong> has chosen <strong>MN8 Foxfire</strong> for its photoluminescent emergency exit system.</p><p><strong>Nedap</strong> has integrated <strong>Commend</strong> intercoms into its AEOS security management solution.</p><p><strong>Next Biometrics</strong> is collaborating with <strong>Authasas</strong> to integrate its fingerprint scanner into Authasis authentication solutions.</p><p><strong>Baylor University</strong> is using Nice­Vision from <strong>NICE Systems </strong>to manage video in its new football stadium.</p><p><strong>OSS Inc.</strong> is providing security guard services for <strong>The Vindicator,</strong> an Ohio daily newspaper.</p><p><strong>Samsung Techwin America</strong> and <strong>AMID Strategies</strong> are partnering to support the technology needs of architects, engineers, and security consultants.</p><p><strong>STANLEY Security</strong> has enhanced its partnership with<strong> D. Stafford & Associates</strong> and the <strong>National Association of Clery Compliance Officers and Professiona</strong>ls in the development of resources for colleges and universities.</p><p><strong>TagMaster North America, Inc.,</strong> RFID systems for automatic vehicle identification were installed at<strong> Duke University</strong> by T2 Systems.</p><p><strong>TRI-ED</strong> announced that <strong>Axis Communications</strong> and <strong>Fluidmesh Networks</strong> are new vendor partners.</p><h4>GOVERNMENT CONTRACTS</h4><p>Situational awareness products from <strong>Amika Mobile</strong> were selected for a Canada Border Services Agency project on testing critical alerts and responses.</p><p><strong>CGI </strong>was chosen to develop a national security vetting solution for the United Kingdom’s Ministry of Defence. The solution will perform more than 200,000 vetting requests per year, including financial status, address verification, and criminal record checks.</p><p>A fireproof vault from<strong> Firelock</strong> is protecting critical documents at the new Town Hall in Lyme, Connecticut.</p><p><strong>L-3 Security & Detection Systems</strong> has received an order from the German Ministry of the Interior for more than 100 ProVision Security Scanners.</p><p><strong>National School Control Systems</strong> has provided its BEARACADE Systems to Mentor Public Schools in Ohio.</p><p><strong>Neology</strong>, a subsidiary of SMARTRAC Technology Group, has entered into a patent license agreement for licensed products with the Florida Department of Transportation and Florida’s Turnpike Enterprise.​</p><h4>AWARDS AND CERTIFICATIONS</h4><p><strong>ADI</strong> selected Hikvision as Vendor of the Year for the United States, and Honeywell Cable for Canada.</p><p><strong>Carousel Industries</strong> was named Commercial Partner of the Year, Americas by Juniper Networks.</p><p><strong>HomeWAV</strong> was awarded a patent for its Web-based remote visitation system for correctional facilities.</p><p>The <strong>Medeco M100 Aperio Cylinder with Prox</strong> earned the 2014 GOOD DESIGN Award for Protective Equipment from the Chicago Athenaeum.  Other winners in the category included the HES KS100 Server Cabinet Lock, the Securitron R100 Surface Mounted Wireless Reader, the Hacker AG Access Control System ASD300, and the VieVu2 from VieVu, Inc.</p><p><strong>Milestone Systems</strong> has certified BCDVideo’s Nova Server and Storage Series for use with XProtect.</p><p><strong>Sennheiser </strong>was awarded Preferred Partner Status by NACR.</p><p><strong>U.S. Security Care</strong> has been approved as a provider of school police by the Pennsylvania Department of Education’s Office for Safe Schools.</p><p><strong>Wick Hill</strong> has earned Government Cyber Essential certification, part of the United Kingdom’s National Cyber Security Strategy.​</p><h4>ANNOUNCEMENTS</h4><p><strong>ADI </strong>has opened a new ADI Express branch in Charleston, South Carolina.</p><p><strong>AlliedBarton Security Services</strong> hired more than 5,000 military veterans and reservists in 2014, working toward its goal of 25,000 hires in five years.</p><p><strong>Automatic Systems </strong>has introduced an extended warranty for its pedestrian products; the new warranty period has lengthened from two years to five years.</p><p><strong>CNL Software</strong> has opened its Middle East Centre of Excellence in Masdar City, Abu Dhabi.</p><p>A home security system from <strong>DSC Intrusion Security </strong>was featured on Designing Spaces on the Lifetime television network.</p><p>The<strong> Federation Against Software Theft</strong> has launched a new membership program to help protect software developers in the United Kingdom.</p><p>Risk management firm<strong> iJET International, Inc.,</strong> has opened an office in Singapore to support its global network.</p><p><strong>Kimberlite Corporation</strong> announced that its Fresno, California, central monitoring station assisted law enforcement in 1,081 apprehensions in 2014, for a new record of assists.</p><p><strong>Larson Electronics</strong> has donated re­chargeable LED spotlights to the Lion Guardians conservation in East Africa.</p><p><strong>ONVIF </strong>has published the Release Candidate for Profile Q, which gives end users and systems integrators tools to connect systems and devices.</p><p><strong>Razberi Technologies</strong> has moved to a larger headquarters in Farmers Branch, Texas, in the Dallas-Fort Worth area.</p><p><strong>Securitas Security Services USA</strong> added 6,829 veterans to its employee base in 2014 in support of the 100,000 Jobs Mission, a coalition of companies that committed to hire 100,000 veterans. So far, the companies have hired more than 217,000 veterans, with a new goal of 300,000.</p><p><strong>Securus Technologies </strong>has launched a new brand and Web presence in support of its expanding product and service offerings.</p><p><strong>Sonim Technologies</strong> has formed a Public Safety Advisory Board to ensure that first responders have the best communications tools to do their jobs.</p><p><strong>TRI-ED</strong> has opened a new branch location in Columbia, Maryland, to serve the Baltimore area.</p><p><strong>The Trustworthy Accountability Group</strong>, an advertising industry initiative, has launched the Brand Integrity Program Against Piracy to help advertisers avoid damage to their brands.</p><p><strong>Vanderbilt </strong>has established its international headquarters in Wiesbaden, Germany.</p> 2015 ASIS NewsGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<h4>​Seminar & Exhibits Keynotes: Three Men Who Shaped the World</h4><p>The ASIS International 61st Annual Seminar and Exhibits—the largest security conference and exhibition in the world—will take place from September 28 to October 1 in Anaheim, California.  Three well-known speakers will be presenting the Opening Session keynotes and Closing Luncheon address.  </p><p>Kelly. Raymond Kelly, longest serving commissioner of the New York City Police Department (NYPD) and the first to hold the post for two nonconsecutive tenures, will be the keynote speaker at the Opening Session on Tuesday, September 29.</p><p>Kelly is one of the world’s most well-known and highly esteemed law enforcement leaders. In 2002, he created the first counterterrorism bureau of any municipal police department in the United States. He also established a global intelligence program, stationed New York detectives in 11 foreign cities, and set up a Real Time Crime Center—a state-of-the-art facility that mines data from millions of computer records to put investigative leads into the hands of detectives in the field. Violent crime in New York City fell by 40 percent from 2001 levels during his time in office.</p><p>Kelly was a second lieutenant in the U.S. Marine Corps who was sent to Vietnam in 1965. He remained in the country in combat conditions for a year. After the war, Kelly joined the Marine Corps Reserves and retired after 30 years of service with the rank of colonel. Kelly holds a Bachelor of Business Administration from Manhattan College. He also has obtained a juris doctor from the St. John’s University School of Law, an LLM from the New York University School of Law, and an MPA from the Harvard Kennedy School.</p><p>Currently, Kelly serves as president of Cushman & Wakefield’s Risk Management Services Division. He is also a distinguished visiting fellow at the Council on Foreign Relations and an ABC News consultant.  </p><p>Hayden. General Michael Hayden, former director of the U.S. Central Intelligence Agency (CIA) and the U.S. National Security Agency (NSA) when the course of world events was changing at an accelerating rate, will speak at the Opening Session on Wednesday, September 30.</p><p>Hayden is a retired four-star general who, as head of the country’s key intelligence-gathering agencies, was on the frontline of geopolitical strife and the war on terrorism. Hayden became director of the CIA in May 2006, capping a career of service to the United States that included nearly 40 years in the Air Force. He served until 2009. During 2005 and 2006, Hayden was the country’s first principal deputy director of national intelligence and the highest-ranking military intelligence officer in the country.</p><p>From 1999 to 2005, Hayden served as the director of the NSA and chief of the Central Security Service after being appointed by President Bill Clinton. He worked to put a human face on the famously secretive agency, explaining to the American people the role of the NSA and making it more visible on the national scene.</p><p>At the seminar and exhibits, Hayden will dissect political situations in hot spots around the world, analyze the tumultuous global environment, and discuss what it all means for people around the globe. He will speak on the delicate balance between liberty and security in intelligence work, as well as the potential benefits and dangers associated with the cyberverse. As the former head of two multibillion dollar enterprises, he will also address the challenges of managing complex organizations in times of stress and the need to develop effective internal and external communications.</p><p>Mattis. General James N. Mattis (U.S. Marine Corps-ret.), who served as the 11th commander of U.S. Central Command, is scheduled to speak at the Closing Luncheon on Thursday, October 1.</p><p>Mattis was the eleventh commander of United States Central Command, overseeing all operations in the Middle East. Before replacing General David Petra­eus in August 2010, he had previously headed U.S. Joint Forces Command and served concurrently as NATO’s supreme allied commander transformation. Throughout his career in the military, Mattis has commanded at multiple levels. As a lieutenant, he served as a rifle and weapons platoon commander in the 3rd Marine Division. As a captain, he commanded a rifle company and a weapons company in the 1st Marine Brigade. As a major, he commanded Recruiting Station Portland. As a lieu­tenant colonel, he commanded 1st Battalion, 7th Marines, one of Task Force Ripper’s assault battalions in Operations Desert Shield and Desert Storm. As a colonel, he commanded 7th Marines (Reinforced).</p><p>Upon becoming a brigadier general, Mattis commanded first the 1st Marine Expeditionary Brigade and then Task Force 58 during Operation Enduring Freedom in southern Afghanistan. As a major general, he commanded the 1st Marine Division during the initial attack and subsequent stability operations in Iraq during Operation Iraqi Freedom. In his first tour as a lieutenant general, he commanded the Marine Corps Combat Development Command and served as the deputy commandant for combat development.</p><p>Mattis was born in Pullman, Washington, and graduated from Central Washington University with a Bachelor of Arts in history. He is also a graduate of the Amphibious Warfare School, Marine Corps Command and Staff College, and the National War College. General Mattis currently serves as a visiting fellow at Stanford University and Dartmouth.</p><p>For more information on the ASIS 61st Annual Seminar and Exhibits, visit <a href="" target="_blank"></a>. ​</p> Defense of the Food SupplyGP0|#21788f65-8908-49e8-9957-45375db8bd4f;L0|#021788f65-8908-49e8-9957-45375db8bd4f|National Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p>​<span style="line-height:1.5em;">More than 16 percent of the food consumed in the United States is imported, and it’s the job of the Food and Drug Admin­istration (FDA) </span><span style="line-height:1.5em;">to make sure those imports are safe and properly labeled. There are protections in place to inspect and govern the flow of imported food, but contaminated goods still enter the national supply chain.</span></p><p>One in six people are affected by food-borne diseases in the United States each year, and contaminated food leads to an average of 3,000 deaths annually, according to the Centers for Disease Control and Prevention. Through numerous laws and regulations the government is attempting to mitigate threats and keep the food supply safe.​</p><h4>Food Defense</h4><p>After a jump in incidents of food-borne illnesses in the 2000s, President Barack Obama signed the Food Safety and Modernization Act (FSMA) in 2011, which aims to develop a global approach for ensuring the safety and security of the food supply. The act aims to give the FDA greater oversight of the food being imported into the United States. </p><p>The FSMA continues to evolve, and the FDA is currently focused on protecting food against intentional adulteration—acts intended to cause large-scale public harm through contamination of food. The proposed rule, which was made public at the end of 2013, has undergone a series of revisions and is on schedule to be finalized this year.</p><p>The rule would require at-risk food facilities to create and implement food defense plans that address areas of vulnerability the FDA identifies within its food operation, says Zak Solomon, a former FDA employee. Solomon is now the director of analysis at Food Sentry, an organization that provides ongoing analysis of risks to the food supply. </p><p>Under the new regulations, facilities would devise actionable procedures to reduce the risk of adulteration during bulk liquid transportation, liquid storage and handling, secondary ingredient handling, and mixing. Implementing focused mitigation strategies, monitoring the procedures, verifying that all processes are being conducted correctly, training, and recordkeeping would also be required.</p><p>“These focused mitigation strategies would protect food against intentional adulteration, which is where the FDA is hanging its hat from the food security standpoint,” Solomon explains. “That refers to economic adulteration or adulteration by disgruntled employees, or someone with something against the companies.” </p><p>Solomon notes that food adulteration with the intent to harm the public—an act of terrorism—is unlikely. However, economic adulteration, where cheaper ingredients or extra preservatives are added to a product, is one of the biggest problems he sees in the food supply chain.</p><p>“When it comes to risks for food, adulteration is a big deal,” he says. “The economically motivated adulteration is very real and it is powerful. People look for opportunities within their supply chains all the time, whether they’re a manufacturer or a farmer, and I don’t know that there’s any other risk that provides such a clear and real danger as that does.”</p><p>Solomon says that building a food defense plan is currently optional for manufacturers and distributors under the FDA, so a mandatory requirement would be a good first step to strengthen food safety. But he notes that the global food system is extremely dynamic, and a more proactive approach that considers the evolving threat landscape would be more effective. There is also no oversight mechanism, which FDA officials or other federal regulators would use to make sure that facilities are complying with the rule.</p><p> “I’m not sure about the ability of a written food defense plan as outlined in the legislation to handle such a dynamic system, simply because even if somebody submits a food defense plan, who’s going to be there to check that they’re actually doing what they put forward in the plan?” Solomon says.</p><p>To proactively identify risks in the food supply chain, Food Sentry analyzes the political and social situation in the country exporting the food, the reputation of the company, and whether workers would have any reason to adulterate the supply. Solomon says he thinks the FSMA rule can do more to promote this type of forward thinking. </p><p>“Having a plan in place is great, but if you’re not out there looking for risks as they exist in the real world, then you’re going to have to wait to see if something happens and hopefully your plan will catch it,” Solomon says.</p><p>The likelihood of a terrorist tainting the global food supply is small, but the potential is there, Solomon stresses. “Even though we haven’t seen it happening, there’s a reason we’re incorporating it into our risk assessments because it’s possible, and if it happens it would be terrible, especially if nobody was paying attention,” he says.​</p><h4>Import Protections</h4><p>The FDA works with U.S. Customs and Border Protection at ports of entry to scan targeted or high-risk products, but when it comes to imported food, the first line of defense is overseas. Over the past decade, the FDA has set up 13 foreign offices in high-export regions to oversee the facilities that manufacture and process food. </p><p>The FSMA has enhanced the FDA foreign offices’ oversight of imported food. Under the act, each foreign office is required to build working relationships with local regulatory agencies, gather and assess information to better understand the regional regulatory landscape, and conduct inspections at high-risk food facilities. The FSMA required the FDA to inspect at least 600 foreign facilities by the beginning of 2012, and to inspect at least twice the number it inspected during the previous year. </p><p>But a recent Government Accounta­bility Office (GAO) report found that the FDA has not been able to keep pace with the FSMA targets. In 2011, the agency conducted 1,002 foreign food inspections, exceeding the FSMA requirement. However, the number of inspections has not doubled over the following years—in 2012, 1,343 inspections were completed (a 34 percent increase); 1,403 inspections were conducted in 2013 (a 4 percent increase over 2012); and 1,323 inspections took place in 2014 (a 6 percent decrease from 2013). The FDA should conduct at least 2,806 inspections of foreign facilities in 2014, the report notes. </p><p>“While the FSMA has set certain targets, the actual inspections that FDA is conducting is much lower,” says J. Alfredo Gomez, the director of GAO’s Natural Resources and Environment division. “It’s actually why we recommended FDA really needs to do an assessment to determine what should be the annual number of foreign inspections that would be sufficient to ensure that the imported food is safe.”</p><p>The report found that foreign officials cited the cost of inspections and lack of funding for not being able to meet the FSMA mandate. “FDA officials told us that the agency has not met—and is not planning to meet—the FSMA mandate,” the report states. “They questioned the usefulness of conducting the number of inspections mandated by the FSMA.”</p><p>A Congressional Budget Office assessment found that the FSMA mandate needed $580 million in funding to be effective, but Congress has doled out less than half that amount to the FDA. </p><p>The lack of funding and low number of inspections aren’t the only problems the FDA’s foreign offices are facing. The GAO report also found that 44 percent of positions at the nine remaining foreign offices—four offices have been closed in the past three years—are vacant. Gomez points out that the problem is not new.This GAO report is a follow-up to a 2010 report on the FDA, in which the GAO recommended that the FDA develop a workforce plan to fill the vacancies. </p><p>“We do note that the FDA has not done a great job there, because there are large numbers that are still vacant,” Gomez explains. “FDA has not yet developed this workforce plan, and we call out the need for that.” </p><p>Foreign food facility inspections are primarily conducted by FDA officials based in the United States, although there has been a rise in the number of inspections performed directly by the foreign office staff, Gomez notes. These inspections by overseas staff barely make a dent, though, because a large portion of the vacant positions are for food inspectors. </p><p>Does the subpar performance of the overseas FDA offices spell disaster for food safety in the United States? It’s hard to say, according to Gomez: “Essentially, we don’t really know the extent to which the foreign offices contribute to the safety of imported food because FDA has not developed performance measures that can demonstrate the contributions to the safety of food,” he says. </p><p>The report found that FDA officials determined that conducting foreign inspections was not the best use of agency funds and instead focused on helping manufacturers comply with FSMA rules as well as developing relationships with foreign officials. </p><p>“FDA has not conducted an analysis to determine whether either the required number of inspections in the FSMA mandate or the lower number of inspections it is conducting is sufficient to ensure” the safety of imported food, the report notes. </p><p>“We point out FDA has asked for fund‑­ing for about 1,200 inspections each year,” Gomez says. “Reading between the lines, the FDA is saying they don’t have enough funding, but only requests flat funding for three years. You have to square those two statements and say, perhaps you should do a study to determine whether those 1,200 inspections are indeed what you should be doing.”</p><p>The majority of FDA’s foreign offices listed building relationships as a top priority, while only four considered conducting inspections as a top priority. Gomez says FDA officials were able to list a number of times where relationships with foreign food officials contributed to the safety of imported food, but the results are not easy to quantify.</p><p>“If you’re not going to keep up with the FSMA, it should be on solid analytical ground for not doing so,” Gomez explains. “Our recommendation is tied to them getting on solid ground for the number of foreign inspections that they do. We’re not going to trade this problem away, as there’s an increasing number of food imports. We’re not going to grow out of this problem.” </p>


06/08/2015 - 06/10/2015

06/08/2015 - 06/10/2015

Facility Security Design (Education)

06/08/2015 - 06/11-2015 
Effective Management for Security Professionals, Madrid, Spain (Education)​

​06/10/2015 - 06/11/2015
Security Force Management (Education)

06/15/2015 - 06/18/2015
Functional Management (APCIII)​​​ (Education)

Contract is the Key: Protecting the Professional Security Provider (We​binar)

Casino Robberies: Protecting the Casino and Guests (​Webinar)

​07/07/2015 - 07/08/2015
5th Annual CSO Roundtable Congress, Mexico​​​ (Conference)

​09/27/2015 - 10/01/2015

ASIS International 61st Annual Seminar and Exhibits​ (Conference)