Archives

Security Management Magazine Cover
​Beginning December 2016, Security Management will also be available as a PDF. View ​Issues available for Download

 September 2017

 

 

https://sm.asisonline.org/Pages/Book-Review---Physical-Security.aspxPhysical Security2017-09-01T04:00:00Z<p><em>Butterworth-Heinemann; Elsevier.com; 204 pages; $79.95.</em></p><p>​The second edition of <em>Physical Security: 150 Things You Should Know</em> is an excellent reference for security practitioners and managers. Written by Lawrence J. Fennelly and Marianna Perry, CPP, the book covers the most common concepts and concerns in security today; from lighting and CPTED to cyber and drones. To borrow from the book’s opening lines, it is a roadmap to building and enhancing an organization’s security program.</p><p>The authors do a great job of organizing an overwhelming amount of material. The book is likely to serve more as a go-to reference for a particular topic rather than to be read from cover to cover. </p><p>A security practitioner with a fundamental understanding of security will find this book to be an exceptional resource for planning security upgrades, training security staff, and finding justification for best practices with the C-suite. Many sections are nothing more than easy-to-follow checklists, so retrieving the information is remarkably simple and quick.   </p><p>The broad range of topics addressed in the book makes it impossible for the authors to dig too deep on any single issue, so many of the sections do not offer full explanations. This, however, does not take anything away from the quality or usefulness of the book. </p><p>The concepts are outlined in carefully selected paragraphs that provide just enough detail to jog the memory or provide a starting point for further research from more-focused sources. All in all, this book offers great ideas and best practices for a broad range of security topics, not just physical security.</p><p><em><strong>Reviewer: Yan Byalik, CPP,</strong> is the security administrator for the City of Newport News Virginia. He is a graduate of the Virginia Tech Corps of Cadets and has worked in a variety of security roles in higher education, amusement park, and telecommunication security sectors since 2001. He is the assistant regional vice president for ASIS Region 5A in southeast Virginia.</em></p>

 

 

https://sm.asisonline.org/Pages/ASIS-Awards-School-Security-Grant-and-More-ASIS-News.aspxASIS Awards School Security Grant & More ASIS NewsGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p>This month, the Dallas Independent School District opens the doors to its newest transformational school, which is designed specifically for high school students interested in architecture, urban planning, environmental science, and community development. CityLab High School will offer students the opportunity to leverage the city of Dallas as their own hands-on laboratory.</p><p>But this cutting-edge “best-fit-school” concept, part of the city's public school choice program, comes with a daunting challenge: ensuring a safe and secure environment in an urban city center, and doing so on a limited budget.</p><p>That’s where the School Security Grant Competition, started by ASIS International and the ASIS Foundation in 2003, plays a critical role. This year, in conjunction with the ASIS International 63rd Annual Seminar and Exhibits, ASIS is awarding CityLab High School a $22,000 grant to pay for upgrades to the school’s camera system, access control system, and classroom intercoms. Axis Communications is making an in-kind donation of cameras and other equipment.</p><p>ASIS 2017 Host Committee Chairman Martin Cramer, CPP, worked closely with the Dallas Independent School District Police Department to get the word out about the grant and to identify the school with the greatest need.</p><p>“CityLab really stood out,” said Cramer. “Parents had voiced concerns about the school’s proximity to downtown Dallas, a busy interstate highway, and a homeless shelter. But with most of the school’s budget going to new construction, renovations, and asbestos removal for the 1950s building, there was little more the school could afford to improve security. These funds will go a long way to provide students and staff a safe and secure learning environment.”</p><p>The school identified a number of needed security upgrades, including network improvements, new security cameras, access control devices, and classroom intercoms covering all five floors of the building. </p><p>“In a large urban school district with limited funds, the responsibility of campus safety falls within the school’s budget,” wrote CityLab High School Principal Tammy Underwood, in her grant competition application. “This grant is an amazing opportunity for CityLab students and staff to be in a safe environment so that they can focus on their highest educational goals.”</p><p>The School Security Grant Competition is just one of the many ways ASIS International pursues its mission to advance security management best practices and give back to the community hosting the Annual Seminar and Exhibits. </p><p>“Without a doubt, school safety contributes to academic success, and promotes innovation, inquiry, and risk taking in high-poverty, high-performing schools,” wrote Underwood. “Students who feel safe are more attentive and efficient in the classroom, and they also have fewer symptoms of depression. I want parents, students, staff, and visitors to be comfortable and confident coming to our building.”​</p><h4>A World of Opportunity at the ASIS 2017 Career Center </h4><p>As the premier education and technology event for security professionals worldwide, ASIS 2017 promises unparalleled networking and career development options. </p><p>Now in its sixth year, the Career Center will continue to offer unprecedented professional value. Free to all attendees, the Career Center offers résumé reviews, career coaching, networking opportunities with employers and peers, and access to career development tools and job postings—plus free professional headshots in the Headshot Studio.</p><p>The excitement starts on Tuesday, September 26, with a Coffee and Careers Networking Event sponsored by the Young Professionals Council, a perfect place for great networking. Attendees currently seeking jobs in the security field will want to return later for an interactive panel session, “What Security Employers Look For and What Makes Candidates Stand Out,” where senior security executives and hiring managers will share what elements in an applicant’s history impress employers, describe what they look for in interviews, and provide advice on how to stand out from the crowd. </p><p>The day culminates with a session for ambitious professionals who have set their eyes on the top and are looking for an answer to the question, “How do you become a CSO?” This is their opportunity to hear straight from senior executives how they reached the top, lessons learned along the way, and how attendees can benefit from their experiences. </p><p>On Wednesday, the Career Center will hold another Coffee and Careers Networking Event for those looking to transition into the security field to help them create new professional connections, foster ones already made, and take part in engaging discussions on career development. Afterwards, attendees will have a chance to further build on those discussions when they take part in the “Career Development in Security” session, which will offer young security professionals the tools and best practices they need to grow their security careers.</p><p>The Career Center wraps up with a bang on Thursday with two of its most impactful sessions. The first, “Mentoring: Guiding Tomorrow’s Leaders” will provide the next generation of security industry leaders with another avenue to hone their skills to achieve their career goals, whether it’s to embark on a new challenge or advance within their organization. Panelists will examine the importance of mentoring, as well as what to look for in a mentor, key factors in building an effective relationship, and the qualities of a successful mentee. </p><p>Attendees will continue examining the future of security with a convergence panel that will explore the ever-changing relationship between information technology and physical security. As threats around the globe become increasingly sophisticated, it is vital that security professionals in every focus area can collaborate and identify comprehensive solutions for the risks facing citizens, industry, and governments around the world.</p><p>Career Coaching and résumé reviews will take place during exhibit hours. Stop by to book an appointment. </p><p>“ASIS has been instrumental to my professional development and as cochair of the Young Professionals Council, it has been particularly rewarding to help shape the high-caliber programming. From CSO perspectives to employer hiring needs to mentorship best practices and leadership skills, ASIS 2017 will provide security professionals at every stage of their careers with the tools they need to succeed in today’s job environment,” says Angela Osborne, PCI, regional director for Guidepost Solutions. “I encourage security professionals across every sector to take advantage of the breadth of career-enhancing education, advice, and professional development that will be available.”</p><p>Whether attendees are new to the security field and looking for those first valuable connections, or seasoned veterans of the industry seeking to further their existing careers, the Career Center offers a world of opportunity ready to be explored.</p><h4>International Buyer Program Helps Expand ASIS 2017’s Global Footprint</h4><p>Attendees and exhibitors at ASIS 2017 will have the chance to expand the scope of their business opportunities to a global level. Thanks to the U.S. Department of Commerce International Buyer Program (IBP), a joint government-industry effort, hundreds of global buyers from multiple delegations will attend ASIS 2017 for business-to-business matchmaking with exhibitors and attendees. The buyers represent security professionals from around the world.  </p><p>“The International Buyer Program provides an excellent opportunity for security professionals globally to benefit from the collective wisdom of the 22,000 attendees and exhibitors at ASIS 2017,” says Godfried Hendriks, CPP, managing consultant at GOING Consultancy BV and secretary of the ASIS International Board of Directors. “In today’s threat environment, security professionals need a global community of peers they can turn to year-round for support, best practices, and information sharing. ASIS 2017 will help facilitate these relationships.” </p><p>Every year, the IBP generates approximately $1 billion in new business for U.S. companies, primarily through increased international attendance at participating U.S. trade shows. </p><p>ASIS 2017’s participation in the IBP provides attendees with access to a broad array of security professionals, qualified international buyers, representatives, and distributors. It also increases the chances of finding the right international business partner. Not only will attendees meet more global buyers, representatives, and distributors, but exhibitors’ products and services can be listed in the Export Interest Directory and distributed to all international visitors for additional awareness.</p><p>Once a potential partner is identified, attendees have complimentary use of the on-site International Trade Center, where companies can meet privately with prospective international buyers, prospective sales representatives, and other business partners.</p><p>To assist in facilitating conversations, international trade specialists will be available on-site in the International Trade Center to provide matching assistance and expert trade counseling to global delegates and U.S. exhibitors.</p><p>Don’t miss out on the chance to expand your global footprint. Stop by the International Trade Center on the expo floor to learn more. ​</p><h4>All the Hub-Bub</h4><p>ASIS 2017 promises a show floor filled with fantastic networking opportunities, groundbreaking security products and service solutions from industry-leading exhibitors, and second-to-none education opportunities. At the center of it all is the ASIS Hub, an enormous 1,600-square-foot presence on the show floor that is serving as the place for all things ASIS International. </p><p>The Hub is the primary location for meeting with ASIS staff and learning more about becoming a member, obtaining one of the three board certifications, and getting involved in one of the professional interest councils. It’s also the place to unwind and recharge—literally—in the lounge with several charging stations.</p><p>The Hub will function as the go-to space for everything related to ASIS councils, with council members standing by to answer questions and offer expertise. The 34 ASIS councils explore focus areas like Crime Prevention and Loss Prevention, Healthcare Security, Information Technology Security, Investigations, Physical Security, and much more. There is a council for security professionals in nearly every discipline and industry sector.</p><p>The staging point for multiple Fireside Chats, the Hub will provide attendees an opportunity to interact in small groups with speakers after select education sessions. Members can visit the Hub for updates on the certification programs and exhibitor press conferences. And this year, the prize booth is located inside the Hub, where, twice a day, lucky attendees will walk away with exciting prizes.</p><p>Members of ASIS International are part of the largest community of security professionals worldwide, all with the shared goal of advancing global security. Engaged in their local communities year-round, members are dedicated to the security mission and making all communities safer places to live. Additionally, ASIS certifications are recognized worldwide as the gold standard of excellence in security management. Offering Certified Protection Professional® (CPP), Professional Certified Investigator® (PCI), and Physical Security Professional® (PSP) accreditations that are transferable across all industry sectors and geographic borders, ASIS certifications are valuable investments in advancing a security career. </p><p>Those who stop by the Hub can gain insights and tools needed to further their careers, get more involved in the Society, and learn about the unmatched benefits of membership in ASIS International. ​</p><h4>LIFETIME CERTIFICATION</h4><p>Congratulations to the following members who have been named Lifetime Certificants.</p><p>• Thomas M. Prochaska, CPP</p><p>• W. David Rabern, CPP</p><p>• David O. Best, CPP</p><p>• Walter F. Bodner, CPP</p><p>• James M. Gill, CPP</p><p>• Peter Urbach, CPP, PCI, PSP</p><p>• Richard G. Steele, CPP</p><p>• Samuel E. Manto, CPP​</p><h4>LIFE MEMBER </h4><p>The ASIS Board of Directors has granted life membership to Bob Battani, CPP.</p><h4>MEMBER BOOK REVIEW</h4><p><em>The Key to Keys: 5 Steps to Developing an Effective Access Control System</em>. By Randy Neely. CreateSpace Publishing; available from Amazon.com; 118 pages; $15.95.</p><p>While this book could more aptly be titled <em>Keys: A Memoir</em>, author Randy Neely does a sound job of highlighting a widespread challenge that everyone in the security business has experienced at one time or another—the effective control and accountability of key and access systems.</p><p>Neely employs first-person narrative to recount his professional history and how he invented key and access control systems, relying too much on personal description for a professional publication. </p><p>Nonetheless, the author does a superb job of bringing to life the adage that necessity is the mother of invention. After experiencing a series of expensive lost key episodes, he created a system to more effectively manage keys. Valuable first-hand stories help round out the problem-impact-solution triad. </p><p>Neely chronicles the financial and legal impacts that inadequate controls can bring. For example, a single set of lost master keys cost a university nearly $350,000. The impact doesn’t end with the bottom line, but it can also adversely affect legal documents and court cases, as well as an organization’s reputation.</p><p><em>The Key to Keys </em>has some instructive value to students of security management, but it goes too far in promoting the author’s products. Further, some of the photos, tables, and figures lack defining labels or captions, are presented out of focus, or do not adequately line up.  </p><p>The most valuable lesson from this book is that motivation and initiative can inspire an earnest practitioner to not only safeguard people and property, but also to take that next step and invent new and effective ways to help improve security practices.</p><p><em><strong>Reviewer: Terry Lee Wettig, CPP</strong>, is an independent security consultant. He was previously director of risk management with Brink’s Incorporated and a U.S. Air Force chief master sergeant. He is a doctoral candidate in organizational management and a member of ASIS. ​</em></p>
https://sm.asisonline.org/Pages/Book-Review---Weakest-Link.aspxBook Review: Weakest LinkGP0|#91bd5d60-260d-42ec-a815-5fd358f1796d;L0|#091bd5d60-260d-42ec-a815-5fd358f1796d|Cybersecurity;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p><em>Bloomsbury Business; Bloomsbury.com; 240 pages; eBook; $21.99.</em></p><p>Cybersecurity is a complex issue that spans multiple disciplines and occupational fields, and it’s a topic that can make executives nervous. <em>The Weakest Link: Why Your Employees Might Be Your Biggest Cyber Risk </em>offers an in-depth look at the cyber vulnerabilities that exist within organizations. It offers an international perspective on how to implement simple strategies through situational awareness, observation, and other methods. </p><p>The authors are seasoned practitioners with excellent credentials. Their real-world experience translates into viable text as they articulate their viewpoints through practical standards, charts, graphs, diagrams, behavioral explanations, scenario-based examples, and other materials.</p><p>Research indicates that employees create one of a company’s biggest vulnerabilities as they connect to the Internet through internal resources. Today nearly all employees complete at least some of their duties on a computer, tablet, machine, or other peripheral that is connected to a computer network. This book highlights just how easily they can put an entire organization at risk.</p><p>The authors explain the import­ance of having specific policies, procedures, and protocols in place to prevent internal vulnerabilities from becoming active threats. They recommend implementing a strong security culture throughout the organization by engaging leaders and creating a plan that involves all of the internal stakeholders. The plan must be purposeful, collaborative, defined, communicated, accountable, enforced, and—perhaps most importantly—realistic. Other practical strategies from the textbook are based on strict historical and proven principles. </p><p>The only shortfall of this book is that some of the examples and models provided are brief and not fully explained. Additional real-world examples and case studies would help the reader see how the principles can be applied. That said, this interdisciplinary book is a great addition to security management literature and applicable to other organizations in the international community.  </p><p><em><strong>Reviewer: Thomas Rzemyk, Ed.D.</strong>, is a professor of criminal justice at Columbia Southern University and director of technology and cybersecurity instructor at Mount Michael Benedictine School. He is a criminology discipline reviewer in the Fulbright Scholar Program, and he is a member of ASIS.</em></p>
https://sm.asisonline.org/Pages/Global-Water-Risk.aspxGlobal Water RiskGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p>​If, as biblical wisdom reveals, the meek shall inherit the earth, then perhaps it will be the dirty, not the pure, who help build a sustainable global future—at least when it comes to water, say scientists.</p><p>As an issue of global significance, water security has recently vaulted to prominence. Half of the world’s largest cities now experience water scarcity, and roughly two-thirds of the world’s populace face seasonal or annual water stress. </p><p>The future looks even drier. Demand for water is expected to exceed supply by 40 percent within 15 years, if current conditions continue. By 2025, absolute water scarcity will be a daily reality for an estimated 1.8 billion people, according to a United Nations (UN) estimate. Water scarcity can lead to instability and violence; the crisis in Syria was triggered by, among other factors, a historic drought from 2007 to 2010.</p><p>But water security is a complex issue, and scarcity is merely one of its components.</p><p>Most activities that require water produce wastewater. As water usage grows, so does the production of wastewater. And more than 80 percent of wastewater worldwide is released into the environment untreated according to some estimates. </p><p>This discharge can contribute to devastating consequences. In 2012, for example, more than 800,000 deaths worldwide were caused by contaminated drinking water, inadequate handwashing facilities, and insufficient sanitation services. </p><p>In the oceans and larger seas, wastewater discharge sometimes causes deoxygenated dead zones that harm an estimated 245,000 square kilometers of marine ecosystems, according to UN estimates.</p><p>But instead of being discharged, wastewater can be treated—and reused. And more officials and experts are realizing the benefits of this new approach. </p><p>“Wastewater is gaining momentum as a reliable alternative source of water,” says the recently released United Nations World Water Development Report for 2017: Wastewater, the Untapped Resource. </p><p>“Wastewater is no longer seen as a problem in need of a solution, rather it is part of the solution to challenges that societies are facing today,” the report finds. “Wastewater can also be a cost-efficient and sustainable source of energy, nutrients, organic matter, and other useful by-products.” </p><p>Given the skyrocketing demand for water, the positive effect that wastewater reuse could have on the global water crisis is “immense,” says Robert Glennon, a water policy expert at the University of Arizona and author of Unquenchable: America’s Water Crisis and What to Do About It.</p><p>“This is a very big deal,” Glennon tells Security Management. He cites the example of the state of Arizona, which has been active in reusing water for a few decades now. Facilities like golf courses and ballparks can consume large amounts of water, he says, so Arizona’s water reuse practices have been helpful. </p><p>Moreover, state officials have formed WateReuse Arizona, a group that assists communities in achieving sustainable water supplies through reuse. Among other things, the group offers scholarships for Arizona college students interested in specializing in water reuse and reclamation.</p><p>On the U.S. federal level, the U.S. Department of the Interior announced in May that it awarded $23.6 million to seven states for researching, planning, designing, and constructing water reuse projects. </p><p>Often, treating wastewater so that it can be reused for agricultural purposes is less expensive than purifying it to the level where it can be used as drinking water. Given this, countries are becoming more aggressive in their water reuse programs, according to the report. </p><p>For example, in 2013, 71 percent of the wastewater collected in the Arab states was safely treated, and 21 percent was being reused, mostly for irrigation and groundwater recharge.   </p><p>Other regions are realizing the potential benefits of wastewater reuse. In the Asia Pacific region, some countries have discovered that byproducts from domestic wastewater, such as nitrogen, phosphorous, and salt, have potential economic value. </p><p>For example, case studies in Southeast Asia have shown that revenues generated from wastewater byproducts, such as fertilizer, are significantly higher than the operational costs of treating the wastewater. That provides an economic incentive for water reuse, the report finds. </p><p>However, “more needs to be done across the region to support municipal and local governments in managing urban wastewater and capturing its resource benefits,” the report adds. </p><p>In Latin America and the Caribbean, urban wastewater treatment has almost doubled since the late 1990s, so that between 20 and 30 percent of wastewater collected in all sewer systems is now treated. </p><p>“Treated wastewater could be an important source of water supply in some cities, particularly those located in arid areas (such as Lima), or where long-distance transfers are required to meet growing demands, particularly during drought (such as São Paulo),” the report finds.   </p><p>While progress in reusing wastewater has been made in the United States and around the world, there are still constraining factors hindering even more progress, Glennon says. One is cost; some localities in developing countries struggle to afford construction of wastewater treatment plants.   </p><p>Another is that countries like China and India continue to use unsustainable practices when it comes to their water supply, such as “pumping groundwater with impunity.” India, for example, has yet to truly face up to its water shortage crisis and change its practices. “The rules of groundwater pumping remain so relaxed,” Glennon says. </p><p>And in places where water scarcity is currently not a huge issue, some officials have the attitude of, “Why should I bother to reuse water if I can just drill a well?” Glennon says. He compares this attitude to the mistaken belief that an unlimited number of straws can be placed in the same glass—eventually, all the liquid will be sucked out. </p><p>In addition, there are some security issues related to the practice of wastewater reuse, says Yves Duguay, CEO and founder of HCIWorld, who has had on-the-ground experience with audits of water works and other infrastructure systems. For example, systematic controls in the process are needed to ensure that health, safety, and security requirements are maintained. “Most of the time, my audits have shown a lack of oversight and controls, along with poor contract performance management. This can increase the risk for water reuse,” he says. </p><p>This is doubly important in areas where waste management operations, which can include water reuse, are linked to corruption and even organized crime. “How certain are we that waste, solid or liquid, is being disposed as expected and regulated?” he asks. </p><p>Still, developed countries like the United States and Canada can show leadership by developing a systematic approach to the recycle and reuse of wastewater, Duguay says. And since it is not an “in-your-face issue,” wastewater reuse needs more awareness and advocacy so it is not crowded out by more publicized political concerns. “There is little room on our governments’ agenda for such a topic, unless it is talked about and frequently communicated to the general public,” he explains.</p><p>Nonetheless, in areas of the world where water scarcity hits hardest, it will ultimately become a necessity to reuse treated wastewater, because supply will not hold out, Glennon says. “Some places will have to use that for drinking water—there is simply no alternative,” Glennon explains. Duguay echoes this view: “There is no doubt that we need to control our utilization of water; it’s a unique resource that is not infinite,” he says. </p><p>In the end, the UN report argues that, in a world where limited water resources are increasingly stressed by over-abstraction, pollution, and climate change, it is imperative for officials around the globe to focus on wastewater treatment and reuse.   </p><p>“Neglecting the opportunities arising from improved wastewater management,” the report concludes, “is nothing less than unthinkable.”  ​ ​</p>
https://sm.asisonline.org/Pages/Peer-2-Peer-Protection.aspxPeer 2 Peer ProtectionGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p>​Daisy Torres wants to pursue a career in law enforcement after she graduates from the University of Iowa in Iowa City, Iowa. So, when she was looking for student employment opportunities, she discovered that the university hired students to work in its public safety dispatch center.</p><p>She applied for a position, but wasn’t hired. That didn’t deter her, however, and during her sophomore year of college in 2016 she found out about another opportunity for undergraduates to work with the University’s Department of Public Safety: becoming a student security officer.</p><p>Torres filled out an application, interviewed, passed a background check, and was offered a position as an officer that fall, patrolling the campus and interacting with students.</p><p>“At first, the whole thing was intimidating, but the officers have been very helpful and supportive. They guide you,” Torres says. “They encourage you to ask questions to make sure you don’t mess up.”</p><p>The experience has also offered her a chance to see what a career in law enforcement might look like and gain a better understanding of how first responders interact with students and respond to incidents.</p><p>“As a regular person, you just see the ambulance come or you see the officer coming to take care of something—but going through the training you realize this is hard work,” she explains. “It definitely humanizes the process, so it’s really fun for me. It’s fun getting to know the people, the officers you are working with. You get to see the person behind the badge.”</p><p>That’s the goal of the Student Security Officer Program at the University of Iowa, which was created in the fall of 2016 when Assistant Vice President and Director of Public Safety Scott Beckner was hired to lead the Public Safety Department.</p><p>Beckner has spent more than 30 years in law enforcement, including 25 in higher education law enforcement with roles at Georgia College and State University in Milledgeville, Georgia; Shepherd University in Shepherdstown, West Virginia; and Michigan State University in East Lansing, Michigan. </p><p>“I believe in a community policing philosophy, meaning that our police and security officers need to go where the students are comfortable to build positive relationships with them, even if it’s not the environment in which the officers themselves are most comfortable,” Beckner says. “This enables both parties to establish meaningful communication and receive better feedback from both the law enforcement officers and the students.”​</p><h4>The Program</h4><p>The University of Iowa covers 1,880 acres that straddle the Iowa River. Approximately 33,000 students are enrolled each semester, and most freshman undergraduates live on campus.</p><p>Protecting the campus community is the University of Iowa Public Safety Department, which has two major divisions: the police division and the security division. The police division is made up of roughly 45 armed state-certified police officers who patrol campus around the clock. The security division is made up of nine full-time security officers.</p><p>The university also has a dispatch center, which is the main dispatch center for campus 911 calls and the back-up dispatch center for the county. </p><p>When Beckner came on board in 2016, the university hired students as dispatchers in the dispatch center and also as security staff at the University of Iowa Art Museum. Based on his experience at prior institutions, Beckner wanted to expand the university’s use of student employees for campus security positions.</p><p>“Hiring student security officers is another layer of our community policing approach,” Beckner says. “It gives our officers another opportunity to connect with students to get a pulse of what’s happening on campus from the student perspective.”</p><p>With this mind-set, Beckner instructed the department to create the Student Security Officer Program to hire students to be the eyes and ears of campus public safety.</p><p>“I’m not afraid to try new things, and I’m not afraid to fail,” Beckner explains. “I think it’s just as valuable to know what doesn’t work as what does work, and you don’t always know until you try. So many people in law enforcement are afraid to fail because of the spotlight we’re in, and we have to learn to get beyond that mind-set.”</p><p>To push the program forward, Security Supervisor Beau Hartsock was pulled off his regular assignment at the time—head of security at the University of Iowa Art Museum—and brought in to recruit students and interview them for officer positions.</p><p>To recruit students, Hartsock and others in the department used the university’s Hire a Hawk program that lists student employment opportunities and attended the campus job fair. They also went to Introduction to Criminology classes—the first core class in the Criminology, Law, and Justice major—to contact students who might be interested in the program. </p><p>“The Intro to Criminology is a prerequisite to the program that every student coming in has to go through,” Hartsock explains. “We go to those classes and do a 10-minute pitch of what we have to offer and tell them about the department. If they wish to apply, they can.”</p><p> Within one month, the program had 30 students on staff as security officers, with a peak in the middle of the academic year of 75 student officers. The students completed training conducted by full-time security staff on mandated issues, including radio operation, the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, bloodborne pathogens, and CPR. </p><p>The student officers were then trained for each of their particular assignments. These assignments included dorm patrol, building checks, the art museum, athletic events security, the campus transportation service called Nite Ride, and the Hawkeye Storage Lot.</p><p>“We don’t train everybody on everything; we train on an as-needed basis in accordance with whatever assignment they are working,” Hartsock says. </p><p>This is because each assignment has different requirements. For instance, students assigned to Nite Ride—a transportation service that provides rides for students between 7:00 p.m. and 6:00 a.m.—act as dispatchers, taking calls and managing the app that sends the vehicle out to pick students up.</p><p>Dorm patrol requires that students walk the dormitories, using a pipe check-in system from Guard1Plus to track their progress throughout the campus. “A student could potentially walk five or six miles a night, especially on the weekends, looking for any safety concerns, damage to property, and things like that,” Hartsock says.</p><p>Student officers have similar responsibilities when they are assigned to the libraries or the Voxman Music Building, which is a new building on campus that houses valuable musical equipment. </p><p>The art museum job is a“sought-after” assignment, Hartsock says, because students sit at a desk, greet people who come into the building, and keep an eye on the building’s video camera feeds, making it a relatively low-key assignment. </p><p>The other assignment for students is Hawkeye Storage Lot, which is vulnerable to thefts from parked cars because it is separated from the main campus, Hartsock says. </p><p>“We have students that also sit out there and do patrols every half hour in an electric car around the lot for about 10 minutes,” he explains.</p><p>Students on patrol wear yellow polos and black pants and have utility belts with pipes for the check-in system, masks for CPR, and radios to reach the dispatch office. If they notice suspicious activity or an incident unfolding, student officers are instructed to radio into the dispatch office and a police officer or security officer will be sent to their location to respond.</p><p>“First and foremost, students are trained to be the eyes and ears of the university only,” according to Hartsock. “In no way are they to physically or verbally intervene…we train them on what could potentially get them in danger, and to use their best judgment.” </p><p>So far, the university has had no incidents of harm to a student security officer while on duty, according to Hartsock. </p><p>“We have the benefit of our student security officers carrying radios—the same exact radios that our police officers and our full-time security officers carry—so they are literally a key click away from our dispatch,” he adds. “And a lot of times our police officers are scanning our student security officer channels, and they can start heading that way even before it is actually dispatched by a dispatcher.”​</p><h4>Campus Impact</h4><p>When Torres was initially hired, her friends and fellow students’ first question was: Do you get to carry a gun? Student security officers are not armed, but they are taken seriously by their peers and this support has helped them build relationships on campus.</p><p>“I’ve been the night dispatcher for Nite Ride and [my friends] don’t bother calling the phones because they know I’m working, so they’ll text me and say, ‘Is there a chance you could send a Nite Ride my way?’” Torres says. “They think it’s interesting because they get to see me in the dorm sometimes and say, ‘I know the security officer.’” </p><p>Building this sense of community helps give credibility to the campus police because the student security officers get to know police officers as real people, says Police Captain Mark Bullock. </p><p> “Kids, when they talk about these officers as people rather than as a profession, it takes away some of those barriers that may have previously been there,” he explains.</p><p>Another benefit to having the student security officers on patrol is that it can make reporting a sensitive crime, such as a sexual assault, easier for students because they are talking to a peer instead of a police officer.</p><p>“If it is a sensitive crime, and if you have a familiar face or a peer who is part of an organization like ours, we would hope that would make reporting that crime just a little bit easier,” Bullock says. “It’s a well-known thing that sexual assaults are underreported. We would like to do anything we can to make the occurrences go down—ideally eliminate them completely. But at least knowing about them is a step in the right direction.”</p><p>For less serious offenses, such as smoking in a dorm room, Bullock says students are much more likely to bring that up to a student security officer on dorm patrol than to a security officer.</p><p>Students are “not going to be as open to saying that to a police officer as they would to one of their peers,” he adds. “General quality of life issues within our campus have been easier to report by having a peer to talk to.”</p><p>And in instances like smoking in a prohibited space, student security officers have several options on how to handle the situation, including reporting it to the residence assistant on duty, the front desk of the building they are in, or dispatch for a police response, if necessary.</p><p>Student security officers are all equipped with a radio, "so it’s a direct line of access to the police so information is coming in in real time,” according to Bullock. “There’s nothing lost in translation.”​</p><h4>Future Plans</h4><p>The Student Security Officer Program has been viewed as a success so far, and the university plans to expand it during the fall of 2017 to hire approximately 125 student officers for the academic year.</p><p>“We’re actually getting ready to do a very large hiring surge of possibly 40 to 50 more students just to cover one assignment that’s in the works right now,” says Hartsock, who declined to provide more detail about what the assignment was.</p><p>The department itself is also making a push to have student security officers, police officers, and security staff be increasingly more involved with campus life in their off hours. One initiative is paying for staff to participate in intramural sports on campus. </p><p>“So you’re interacting with the university community, humanizing us in the sense that students get to know us personally, see a familiar face out of uniform as well as in uniform,” Hartsock explains. “Being more approachable and being looked at in a way that we’re really genuinely here to help.”</p><p>All of this goes back to Beckner’s focus of creating a community policing approach to campus security at the university.</p><p>“If University of Iowa officers can begin to know students on a personal level—when it’s not in the context of punitive action—I believe we’ll be able to solve more problems proactively,” he says. “One of my early goals was to begin to break down the barriers between students and campus police, and I think this program is helping us do that.”  ​</p>
https://sm.asisonline.org/Pages/Safety-in-Shared-Spaces.aspxSafety in Shared SpacesGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p>​Coworking spaces  are on the rise around the globe. These flexible work settings allow people without a traditional office building to still enjoy many of the amenities that come along with having a dedicated work environment. </p><p><em>The 2017 Global Coworking Survey</em>, conducted by Deskmag, along with SocialWorkplaces.com, found that there are an estimated 13,800 active coworking spaces worldwide, hosting more than 1 million people. </p><p>This represents a major increase from five years ago, when just 2,070 coworking spaces were used by 81,000 people globally. COCO, a coworking company based in St. Paul, Minnesota, offers several different levels of membership and types of space, so clients are only paying for the amount of time they need and space they require, says Megan Dorn, director of operations at COCO. </p><p>“Our idea in doing that was to be with our clients as they grow—from the beginning of their business, to hiring employees, to maybe needing private offices—which we also have,” she says. “So that’s what makes us a little bit different than your typical coworking space.” </p><p>When the company started in 2010, it had to distribute physical keys to its members, “which is a nightmare as you’re trying to grow,” she notes, and a security concern if a key was ever lost. </p><p>Because COCO normally leases its space in a larger building, it needed a security solution that was as flexible as the working environment it provides. “We usually have to find ways—when we’re opening a space or acquiring a space—to work with the building to find ways to get our security system installed,” Dorn explains. </p><p>When COCO acquired a new space in Chicago last May, the existing security system was a door locked by a PIN code, which the building never changed. The PIN code was distributed to a large number of people.</p><p>“The space got broken into a week before we acquired it. Laptops were stolen, and people were really on edge,” she notes. “So as soon as we came in to the Chicago space, one of our top priorities was to get a really solid access and security system in place.” </p><p>COCO turned to Brivo’s OnAir, a cloud-based access control system that easily integrated into the company’s membership dashboard, called Bamboo. Using Brivo, COCO can easily distribute keycards to its clients and manage membership usage and levels. </p><p>To set up the system, Brivo representatives come to COCO’s space and add card readers to the appropriate doors. They also set up schedules and the different access levels for membership types.</p><p>COCO has one membership accountant who works out of the company’s headquarters and oversees assigning new members a keycard number through Brivo. “It’s all digital, so it can be done remotely,” she notes. </p><p>A community manager at the member’s location—the lead COCO employee for that site—can then log on to Brivo and see which card number has been assigned for that client, add the number to their member profile in Bamboo, and distribute it. </p><p>Changing, granting, and revoking access levels, as well as keeping track of when members come and go throughout the building, are all managed through the Brivo platform. </p><p>“Say you want to upgrade a member from part-time to full-time. We’re able to just go into Brivo and quickly change your access. It’s active the moment that you do it,” she notes. “That’s actually been really helpful for us, given we have all this variability in types of membership.” </p><p>When a member badges in, a wealth of information comes up on the Brivo dashboard for the community manager to see. “Their picture, their name, their membership level, how many times they’ve checked in already that month, it immediately shows up,” she says. “So it tells you in real time exactly who’s in your space and when.”</p><p>The business value of OnAir is immense for COCO, Dorn points out, because the company can tell how often members are actually using the space, and whether they have made payments, as soon as they present their access card to the door reader. </p><p>“Let’s say someone is delinquent on payment. As soon as the member checks in, there’s going to be big red circle with an exclamation point [on the dashboard]–you can’t miss it,” she says. “It’s definitely helped us lower the sheer amount of delinquent payments that we have, and receive that payment.”</p><p>When a member badges in, Brivo also alerts the community manager if that person hasn’t been in the space very often that month. </p><p>“If we can find a member who we consider at-risk, who hasn’t been using the space, and we’re alerted to that we can reach out to them, invite them to an event, or try whatever we can to reengage them,” Dorn says. </p><p>COCO is also in the initial stages of using Brivo MobilePass, which lets COCO staff remotely lock and unlock doors via a smart device, for members who want to access the space after-hours but forget their keycard. </p><p>Because of how easily it can deactivate and reactivate access, COCO also encourages members who leave the company to keep their keycards. </p><p>“The goal is to try to get the member to come back. So if you have that card and you come back, you’re already set up in our system, all we have to do is reactivate the card and then we’ll also waive any setup fees,” Dorn says. </p><p>She notes the combination of security and business insights from Brivo has been tremendous for COCO. </p><p>“Brivo as a security system has helped us go from being a group of people working out of a space to a full-fledged company,” she says. “It really helps us manage all of the different types of membership and the stages of business they’re in.” </p><p><em>For more information: Nicki Saffell, sales@brivo.com, www.brivo.com, 301.664.5242 ​</em></p>
https://sm.asisonline.org/Pages/Protecting-Fine-Art-and-Other-Industry-News.aspxProtecting Fine Art and Other Industry NewsGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<h4>​PROTECTING FINE ART</h4><p>Thousands of visitors enter El Museo Thyssen-Bornemisza in Madrid each day to view the museum’s priceless masterpieces. To safeguard the precious art, the museum recently switched from analog video surveillance to an IP-based system. Bosch Security Systems helped the museum create a single integrated security system with a Bosch Video Management System and IP cameras that provide recording and storage of images, in addition to video analytics.</p><p>A special “museum mode” enables administrators to predefine a perimeter around an artwork, creating a virtual, invisible protective barrier. When the perimeter is breached by, say, an attempt to touch an artwork, an alarm is sent to the control center and security’s mobile devices, so personnel can quickly take action. This virtual barrier is a convenient alternative to conventional infrared barriers.</p><p>For those exhibits displayed in low-light conditions, the museum selected Bosch IP cameras with starlight technology. These cameras ensure that dimly lit areas can be properly monitored without additional lighting, and the museum need not compromise artistic concepts and ambience for security reasons.​</p><h4>PARTNERSHIPS AND DEALS</h4><p>BriefCam video analytics embedded in Milestone’s video management platform are making efficient video investigation possible for Massachusetts General Hospital.</p><p>Bristow U.S. LLC won a contract from Hess Corporation for medevac services in the Gulf of Mexico.</p><p>Disaster recovery service provider Databarracks has announced that it is now a corporate partner of the Business Continuity Institute.</p><p>EyeLock LLC entered into a partnership with STANLEY Security to deliver EyeLock’s suite of access control solutions to North America.</p><p>Hikvision will help secure the iconic Holocaust Memorial Miami Beach.</p><p>BSE (formerly the Bombay Stock Exchange Ltd.) selected IBM Security to design, build, and manage a cybersecurity operations center.</p><p>IDSecurityOnline entered into an exclusive distribution agreement with ScreenCheck for its new line of durable ID card printers.</p><p>Lexmark International, Inc., announced that its Secure Document Monitor uses Intelligent ID’s Endpoint ID.</p><p>XProtect IP video management software from Milestone Systems was selected to protect a Picasso exhibit at the Tomie Ohtake Institute in São Paulo, Brazil.</p><p>Scania AB is using a Morse Watchmans key control and management system. </p><p>NAPCO Security Technologies, Inc., will supply Pepperdine University with its Trilogy Networx Locks for use on the Malibu, California, campus.</p><p>OnSSI is integrating its Ocularis 5.3 with S2 Security Corporation’s NetBox software.</p><p>Quantum Corp. announced that Zhejiang Uniview Technologies Co. Ltd., will become a Quantum value-added reseller and strategic alliance partner. </p><p>Razberi Technologies will embed CylancePROTECT software from Cylance in Razberi ServerSwitchIQ appliances.</p><p>Security Door Controls added Ascheman Marketing Group to its national family of security industry sales and support centers.</p><p>Siklu Inc. signed a distribution agreement with ALLNET, which will carry Siklu’s complete line of millimeter wave wireless radios.</p><p>TierPoint, LLC, is partnering with Compass Datacenters to build a new facility in Broken Arrow, Oklahoma.​</p><h4>GOVERNMENT CONTRACTS</h4><p>American Traffic Solutions won a contract from the Houston-Galveston Area Council for traffic control, enforcement, and signal pre-emption equipment.</p><p>ASPIDER-NGI and SURFnet, the Dutch National Research and Education Network, are partnering on eSIM to develop applications with an initial focus on identity management and authentication.</p><p>Axon announced that the Alameda County Sheriff’s Office in California purchased Axon Body 2 cameras and a five-year Evidence.com license.</p><p>An updated Disaster Resilience Scorecard was developed for the United Nations Office for Disaster Risk Reduction by AECOM and IBM with support from USAID and the European Commission.</p><p>Mosaic451 was awarded a contract for technology products and related services from the city of Charlotte, North Carolina.</p><p>The STRATTON U.S. Coast Guard cutter recently deployed with a small unmanned aerial system, the Insitu ScanEagle, which helped in four interdictions—seizing more than 1,676 kilograms of illicit contraband and apprehending 10 suspected drug traffickers.</p><p>Nextdoor social network for neighborhoods is partnering with the U.S. Federal Emergency Management Agency to support its mission to help communities prepare for and mitigate all hazards.</p><p>UL received a grant from the U.S. Defense Advanced Research Projects Agency for cybersecurity testing of Internet of Things (IoT) gateways for industrial control system applications to help mitigate security risks.​</p><h4>AWARDS AND CERTIFICATIONS</h4><p>Forbes named Allied Universal to its America’s Best Employers list for 2017.</p><p>ByteGrid Holdings LLC was awarded FedRAMP Ready status by the U.S. Federal Risk and Authorization Management Program.</p><p>ClearDATA was granted EU-U.S. Privacy Shield Certification.</p><p>Concurrent Technologies Corporation was recognized as a 2017 Best for Vets employer by Military Times.</p><p>Conformance Technologies announced that its InConRadar offering received the Electronic Transactions Association’s PayPal Tech Innovation Award for best risk solution.</p><p>Crowe Horwath has been designated as a HITRUST CSF Assessor by HITRUST. </p><p>At KuppingerCole’s recent European Identity & Cloud Conference in Munich, Germany, the Danfoss IoT security framework project was recognized with an award in the Best IoT Security Project category.</p><p>EventTracker announced that SC Magazine awarded EventTracker SIEMphonic with a perfect five-star rating in the 2017 UTM/SIEM/NGFW annual product Group Test review.</p><p>EyeLock LLC received a U.S. patent for enabling a single camera to acquire iris biometrics, as well as a face image, by providing suitable illumination for both.</p><p>FreeWave Technologies, Inc., announced that its ZumLink 900 Radio Series and Industrial IoT Programmable Radio were named bronze award winners by the American Business Awards and the IT World Awards, respectively.</p><p>G2’s Payment Laundering Detection was named a 2017 Pay Awards winner in the Fraud Fighter category. The selection was made by a panel of payment industry experts assembled by Paybefore.</p><p>The G4S North America Training Institute was named one of the best organizations for learning and development by Chief Learning Officer magazine for the fourth consecutive year.</p><p>Hikvision announced that its DS-2TD4035D-25 Bi-Spectrum PTZ Camera System was named the 2017 ESX Innovation Award winner in the video </p><p>surveillance category.</p><p>Hillard Heintze announced that it achieved ISO/IEC 27001:2013 information security certification from the BSI Group.</p><p>NAPCO Security Technologies announced that its StarLink Connect was awarded a 2017 ESX Innovation Award in the intrusion systems category.</p><p>OpSec Security gained ISO 14298 security standard accreditation for its Washington and Leicester facilities.</p><p>The Protection Bureau announced that The Monitoring Association renewed its TMA Five Diamond Monitoring Center designation.</p><p>Zenitel Group announced that TMC named Vingtor Stentofon’s TCIV-6 IP SIP Video Intercom a 2017 Unified Communications Product of the Year Award winner.​</p><h4>ANNOUNCEMENTS</h4><p>Boon Edam Inc. announced that a new production line for its Lifeline Optical Turnstiles is now operational at the company’s Lillington, North Carolina, factory.</p><p>Continental Access, a division of NAPCO, launched a newly revitalized website at www.cicaccess.com.</p><p>The Cross-Cultural Institute introduced Badges2Bridges, a new training program that helps police officers and law enforcement professionals work effectively with minority communities.</p><p>DataPath, Inc., expanded operations in the Washington, D.C., area to complement its existing Maryland office. </p><p>Detection Technology Plc. completed the expansion of its Beijing factory, with a larger production floor and new investments in automation and technology.</p><p>Frontier Services Group Limited acquired 25 percent of the International Security and Defense College in Beijing, becoming the largest private security training school in China.</p><p>F-Secure acquired Digital Assurance, a U.K.-based security consultancy firm.</p><p>The former Giesecke & Devrient Banknote business unit is now the Giesecke+Devrient Currency Technology independent subgroup.</p><p>Sheriff’s agencies will use the Lockheed Martin Indago quadrotor small unmanned aerial system to perform search-and-rescue operations as part of the Project Lifesaver International program that supports clients with autism, Down syndrome, and dementia.</p><p>The Master Lock Company relocated its headquarters to a newly renovated campus in Oak Creek, Wisconsin.</p><p>Point Blank Enterprises acquired Gould and Goodrich.</p><p>PSA Security Network acquired USAV, a team of audio-visual integrators, and its affiliate CI Edge. </p><p>The Security Industry Association (SIA) established the SIA Public Safety Working Group to develop recommendations to improve the safety, security, and sustainability of cities.</p><p>Security On-Demand Inc. acquired Infobright Approximate Query technology and intellectual property assets from Infobright Corporation.</p><p>Software Assurance Forum for Excellence in Code released two best practices documents to help combat growing security vulnerabilities. One is on threat modeling, and the other is about third-party components.</p><p>Tyco Security Products is partnering with the mayor of Boston and the Boston Women’s Workforce Council in a program designed to close the gender wage gap for women in the Boston area.</p><p>In a team-building exercise, Vector Security’s managers and senior executives constructed travel-version wheelchairs for donation to the Keystone Chapter of the Paralyzed Veterans of America.</p><p>Vision-Box reinforced its support to border control officials in Portugal, sponsoring the Conference “SEF and the Economy.” ​ ​</p>

 

 

https://sm.asisonline.org/Pages/Harassment-Prevention-.aspx2017-08-01T04:00:00ZHarassment Prevention
https://sm.asisonline.org/Pages/The-Dirty-Secret-of-Drug-Diversion.aspx2017-08-01T04:00:00ZThe Dirty Secret of Drug Diversion
https://sm.asisonline.org/Pages/How-to-Protect-Your-House-of-Worship.aspx2017-08-01T04:00:00ZHow to Protect Your House of Worship
https://sm.asisonline.org/Pages/Certification-Profile---Chuck-McCormick,-PSP.aspx2017-08-01T04:00:00ZCertification Profile: Chuck McCormick, PSP
https://sm.asisonline.org/Pages/Book-Review---Data-Hiding.aspx2017-08-01T04:00:00ZBook Review: Data Hiding
https://sm.asisonline.org/Pages/Counterterrorism-or-Coercion.aspx2017-08-01T04:00:00ZCounterterrorism or Coercion
https://sm.asisonline.org/Pages/Data-Breach-Trends.aspx2017-08-01T04:00:00ZData Breach Trends
https://sm.asisonline.org/Pages/Javits-Embraces-High-Tech-Hospitality.aspx2017-08-01T04:00:00ZJavits Embraces High-Tech Hospitality
https://sm.asisonline.org/Pages/Editor's-Note---Truth-and-Lies.aspx2017-08-01T04:00:00ZEditor's Note: Truth and Lies
https://sm.asisonline.org/Pages/Securing-Sacred-Spaces.aspx2017-08-01T04:00:00ZSecuring Sacred Spaces
https://sm.asisonline.org/Pages/August-2017-ASIS-News.aspx2017-08-01T04:00:00ZASIS News: ASIS 2017 Updates, Board Certifications, ASIS NYC Recap, and More
https://sm.asisonline.org/Pages/A-Shift-in-Global-Risk.aspx2017-08-01T04:00:00ZESRM: A Shift in Global Risk

 

 

https://sm.asisonline.org/Pages/Houston’s-Game-Day-Solutions.aspx2017-07-01T04:00:00ZHouston’s Game Day Solutions
https://sm.asisonline.org/Pages/The-Meaning-of-a-Merger.aspx2017-07-01T04:00:00ZThe Meaning of a Merger
https://sm.asisonline.org/Pages/Certification-Profile---Malcolm-Reid,-CPP.aspx2017-07-01T04:00:00ZCertification Profile: Malcolm Reid, CPP
https://sm.asisonline.org/Pages/Editor's-Note---A-Stronger-Web.aspx2017-07-01T04:00:00ZEditor's Note: A Stronger Web
https://sm.asisonline.org/Pages/July-2017-Industry-News.aspx2017-07-01T04:00:00ZJuly 2017 Industry News
https://sm.asisonline.org/Pages/What’s-New-in-Technology.aspx2017-07-01T04:00:00ZQ&A: What’s New in Technology

- Issues

September 2017 August 2017 July 2017 June 2017 May 2017 April 2017 March 2017 February 2017 January 2017 December 2016 November 2016 October 2016 September 2016 August 2016 July 2016 June 2016 May 2016 April 2016 March 2016 February 2016 January 2016 December 2015 November 2015 October 2015 September 2015 August 2015 July 2015 June 2015 May 2015 April 2015 March 2015 February 2015 January 2015 December 2014 November 2014 October 2014 September 2014 August 2014 July 2014 June 2014 May 2014 April 2014 March 2014 February 2014 January 2014 December 2013 November 2013 October 2013 September 2013 August 2013 July 2013 June 2013 May 2013 April 2013 March 2013 February 2013 January 2013 December 2012 November 2012 October 2012 September 2012 August 2012 July 2012 June 2012 May 2012 April 2012 March 2012 February 2012 January 2012 December 2011 November 2011 October 2011 September 2011 August 2011 July 2011 June 2011 May 2011 April 2011 March 2011 February 2011 January 2011 December 2010 November 2010 October 2010 September 2010 August 2010 July 2010 June 2010 May 2010 April 2010 March 2010 February 2010 January 2010 December 2009 November 2009 October 2009 September 2009 August 2009 July 2009 June 2009 May 2009 April 2009 March 2009 February 2009 January 2009 December 2008 November 2008 October 2008 September 2008 August 2008 July 2008 June 2008 May 2008 April 2008 March 2008 February 2008 January 2008 December 2007 November 2007 October 2007 September 2007 August 2007 July 2007 June 2007 May 2007 April 2007 March 2007 February 2007 January 2007 December 2006 November 2006 October 2006 September 2006 August 2006 July 2006 June 2006 May 2006 April 2006 March 2006 February 2006 January 2006 December 2005 November 2005 October 2005 September 2005 August 2005 July 2005 June 2005 May 2005 April 2005 March 2005 February 2005 January 2005 December 2004 November 2004 October 2004 September 2004 August 2004 July 2004 June 2004 May 2004 April 2004 March 2004 February 2004 January 2004 December 2003 November 2003 October 2003 September 2003 August 2003 July 2003 June 2003 May 2003 April 2003 March 2003 February 2003 January 2003 December 2002 November 2002 October 2002 September 2002 August 2002 July 2002 June 2002 May 2002 April 2002 March 2002 February 2002 January 2002 December 2001 November 2001 October 2001 September 2001 August 2001 July 2001 June 2001 May 2001 April 2001 March 2001 February 2001 January 2001 December 2000 November 2000 October 2000 September 2000 August 2000 July 2000 June 2000 May 2000 April 2000 March 2000 February 2000 January 2000