Security by Industry

 

 

https://sm.asisonline.org/Pages/February-2019-Industry-News.aspxFebruary 2019 Industry NewsGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a43444652019-02-01T05:00:00Zhttps://adminsm.asisonline.org/pages/flora-szatkowski.aspx, Flora Szatkowski<h4>​MARITIME SURVEILLANCE </h4><p>Elbit Systems Ltd. has a contract with the European Maritime Safety Agency to provide maritime unmanned aircraft system patrol services to countries in the European Union. In cooperation with CEiiA, the company will operate its Hermes 900 Maritime Patrol and its Ground Control Station. The long-range maritime surveillance system is tailored for littoral and blue water operations with a maritime radar, satellite communication, and a receiver to enable persistent monitoring of vast areas of sea and shore and identification of suspicious activities and potential hazards.<br></p><h4>AWA​RD</h4><p>The Forte Wireless Data Glove from BeBop Sensors was named one of TIME Magazine’s Best Inventions 2018. The affordable glove incorporates haptics and rapid sensing for a wide variety of applications, including industrial, medical, virtual reality, design, and more. ​​</p><div><h4>CONTRACT</h4><p>The Central Bank of Armenia worked with Louisenthal to produce new banknotes using the latest security features, including a security thread with machine-readable design elements, a watermark, a window, and an iridescent strip. G+D Currency Technology contributed the design and printing of the series. ​</p><h4>Announcement</h4><p>Nonprofit Warrior to Cyber Warrior Foundation announced a nationwide program to provide veterans of the U.S. armed forces with free cybersecurity training and certifications to help veterans succeed as cyber professionals. </p><div><h4>PARTNERSHIPS​</h4><p><b>Retail Security<br></b>Edesix and CBES teamed up with British retailer Asda to create a wearable CCTV system.</p><p><b>Access and Video<br></b>ISONAS INC. is integrating its Pure Access software with Panasonic Video Insight 7 for combined video and access control.</p><p><b>Communications<br></b>Titan HST provided emergency communications for the Annual Rockefeller Center Christmas Tree Lighting.</p><p><b>Armored Vehicles<br></b>The Arab Organization for Industrialization and the Armored Group, LLC, formed a strategic alliance to combat terrorism and improve armored vehicles.​</p><div><h4>Mergers & Moves</h4><div><p><b>Convergint Technologies & SI Technologies, Inc.<br></b>The acquisition will augment Convergint’s service capabilities. </p><div><p><b>Moxa Inc. & Trend Micro.<br></b>Joint venture TXOne Networks will focus on the Industrial Internet of Things.</p><div><p><b>Infineon Technologies AG & NEXT Biometrics<br></b>The companies will develop a reference design for biometric payment cards that include a fingerprint. </p><div><p><b>PRÆSIDIAD & Drehtainer GmbH<br></b>PRÆSIDIAD’s Hesco will incorporate Drehtainer to innovate military and security technologies.​</p></div></div></div></div></div></div></div>

 

 

https://sm.asisonline.org/Pages/FLASHBACK-April-1965-Vol-9-No-2.aspx2019-01-01T05:00:00ZFlashback
https://sm.asisonline.org/Pages/Shooing-off-Copper-Crime-Waves.aspx2018-11-01T04:00:00ZShooing off Copper Crime Waves
https://sm.asisonline.org/Pages/Disaster-Recovery.aspx2014-09-01T04:00:00ZDisaster Recovery

 

 

https://sm.asisonline.org/Pages/Book-Review-Surgery-Center-Safety.aspx2018-12-01T05:00:00ZBook Review: Surgery Center Safety
https://sm.asisonline.org/Pages/Book-Review-Urban-Emergency-Management.aspx2018-12-01T05:00:00ZBook Review: Urban Emergency Management
https://sm.asisonline.org/Pages/Next-Gen-911.aspx2018-06-01T04:00:00ZNext-Gen 911

 

 

https://sm.asisonline.org/Pages/Data-Driven-Traffic-Management-Solutions.aspx2018-12-01T05:00:00ZData-Driven Traffic Management Solutions
https://sm.asisonline.org/Pages/December-2018-Industry-News.aspx2018-12-01T05:00:00ZDecember 2018 Industry News
https://sm.asisonline.org/Pages/Maritime_Maladies.aspx2018-12-01T05:00:00ZMaritime Maladies

 

 

https://sm.asisonline.org/Pages/FLASHBACK-April-1965-Vol-9-No-2.aspx2019-01-01T05:00:00ZFlashback
https://sm.asisonline.org/Pages/Dancing-With-Yourself.aspx2018-12-01T05:00:00ZDancing With Yourself
https://sm.asisonline.org/Pages/Transport-to-Transhumanism.aspx2018-12-01T05:00:00ZTransport To Transhumanism

 

 

https://sm.asisonline.org/Pages/FLASHBACK-April-1965-Vol-9-No-2.aspx2019-01-01T05:00:00ZFlashback
https://sm.asisonline.org/Pages/Maritime_Maladies.aspx2018-12-01T05:00:00ZMaritime Maladies
https://sm.asisonline.org/Pages/January-2018-Industry-News.aspx2018-01-01T05:00:00ZJanuary 2018 Industry News

 

 

https://sm.asisonline.org/Pages/Resilience-Trends.aspx2016-09-01T04:00:00ZResilience Trends
https://sm.asisonline.org/Pages/Required-License-to-Operate.aspx2015-02-01T05:00:00ZRequired: License to Operate
https://sm.asisonline.org/Pages/chemical-facilities-tackle-explosive-problem-0013191.aspx2014-03-01T05:00:00ZChemical Facilities Tackle an Explosive Problem

 

 

https://sm.asisonline.org/Pages/February-2019-Industry-News.aspx2019-02-01T05:00:00ZFebruary 2019 Industry News
https://sm.asisonline.org/Pages/A-Global-Safety-Plan-Protects-Corporate-Travelers.aspx2019-01-01T05:00:00ZA Global Safety Plan Protects Corporate Travelers
https://sm.asisonline.org/Pages/January-2019-Industry-News.aspx2019-01-01T05:00:00ZJanuary 2019 Industry News

 

 

https://sm.asisonline.org/Pages/A-Global-Safety-Plan-Protects-Corporate-Travelers.aspx2019-01-01T05:00:00ZA Global Safety Plan Protects Corporate Travelers
https://sm.asisonline.org/Pages/Wellspring Of Safety.aspx2019-01-01T05:00:00ZWellspring Of Safety
https://sm.asisonline.org/Pages/Something-in-the-Water.aspx2018-11-01T04:00:00ZSomething in the Water

 

 

https://sm.asisonline.org/Pages/Guidance-on-Threat-Assessment-Teams.aspx2019-01-01T05:00:00ZGuidance on Threat Assessment Teams
https://sm.asisonline.org/Pages/Resourceful-Relationships-.aspx2019-01-01T05:00:00ZResourceful Relationships
https://sm.asisonline.org/Pages/Access-With-A-Twist.aspx2018-12-01T05:00:00ZAccess With A Twist

 

 

https://sm.asisonline.org/Pages/Book-Review---Financial-Investigations.aspx2018-08-01T04:00:00ZBook Review: Financial Investigations
https://sm.asisonline.org/Pages/Giving-Security-Credit.aspx2018-05-01T04:00:00ZGiving Security Credit
https://sm.asisonline.org/Pages/The-Fraudians-Slip-In.aspx2018-03-01T05:00:00ZThe Fraudians Slip In

 

 

https://sm.asisonline.org/Pages/Haunting-After-Heroism.aspx2019-01-01T05:00:00ZHaunting After Heroism
https://sm.asisonline.org/Pages/How-To-Investigate-MeToo.aspx2019-01-01T05:00:00ZHow to Investigate #MeToo
https://sm.asisonline.org/Pages/Four-Ways-to-Improve-Healthcare-Security.aspx2018-06-01T04:00:00ZFour Ways to Improve Healthcare Security

 

 

https://sm.asisonline.org/Pages/A-Global-Safety-Plan-Protects-Corporate-Travelers.aspx2019-01-01T05:00:00ZA Global Safety Plan Protects Corporate Travelers
https://sm.asisonline.org/Pages/Gaming-Security-Patrons-Players-And-Cheats.aspx2018-12-01T05:00:00ZGaming Security: Patrons, Players, And Cheats
https://sm.asisonline.org/Pages/SHOOTING-AT-BORDERLINE-BAR-IN-THOUSAND-OAKS,-CALIFORNIA.aspx2018-11-08T05:00:00ZBreaking News: Shooting at Borderline Bar in Thousand Oaks, California

 

 

https://sm.asisonline.org/Pages/November-2018-Industry-News.aspx2018-11-01T04:00:00ZNovember 2018 Industry News
https://sm.asisonline.org/Pages/October-2018-Industry-News.aspx2018-10-01T04:00:00ZOctober 2018 Industry News
https://sm.asisonline.org/Pages/Open-Doors,-Secure-Spaces.aspx2018-09-01T04:00:00ZOpen Doors, Secure Spaces

 

 

https://sm.asisonline.org/Pages/The-Fight-Against-Fake-Pharmaceuticals.aspx2015-02-01T05:00:00ZThe Fight Against Fake Pharmaceuticals
https://sm.asisonline.org/Pages/uncovering-smart-solutions-0013513.aspx2014-07-01T04:00:00ZUncovering Smart Solutions
https://sm.asisonline.org/Pages/online-pharmacies-0013326.aspx2014-05-01T04:00:00ZRogue Online Pharmacies

 

 

https://sm.asisonline.org/Pages/A-Global-Safety-Plan-Protects-Corporate-Travelers.aspx2019-01-01T05:00:00ZA Global Safety Plan Protects Corporate Travelers
https://sm.asisonline.org/Pages/Book-Review-Are-We-Safe-Enough.aspx2018-11-01T04:00:00ZBook Review: Are We Safe Enough?
https://sm.asisonline.org/Pages/Safer-Shipping.aspx2018-11-01T04:00:00ZSafer Shipping

 

 

https://sm.asisonline.org/Pages/Safer-Shipping.aspx2018-11-01T04:00:00ZSafer Shipping
https://sm.asisonline.org/Pages/Preventing-Port-Problems-.aspx2018-10-01T04:00:00ZPreventing Port Problems
https://sm.asisonline.org/Pages/Preventing-Port-Problems.aspx2018-10-01T04:00:00ZPreventing Port Problems

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/21st-century-security-and-cpted-designing-critical-infrastructure-protection-and-crime-prev-0.aspx21st Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition.<div class="body"> <p> <em> <span style="font-size:small;"> <span style="font-family:arial;">CRC Press. Available from ASIS, item #2078; 954 pages; $120 (ASIS member), $132 (nonmember). Also available as e-book.</span> </span> </em> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">As good as the first edition of 21st Century Security and CPTED was, this second edition surpasses it. Atlas, known in security circles as a consummate professional, has done an outstanding job in creating this second edition, which has twice as much material as the original edition. It also includes voluminous references and hundreds of outstanding clarifying photos in both color and black-and-white. Using humor and candid insight he incorporates all the concepts of CPTED, including design, construction, security countermeasures, and risk management strategies, and merges them into a highly informative reference manual for security practitioners at every level.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">There is a logical flow to the book. It lays a solid foundation by discussing architecture and its intent, as well as environmental crime control theories and premises liability. There is something here for everyone as it also discusses terrorism and critical infrastructure from differing perspectives. Several chapters on problem solving provide guidance on conducting threat, risk, and vulnerability assessments.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Throughout, Atlas provides a roadmap for merging security and CPTED into management principles and practices in a wide variety of facility settings, including healthcare facilities, critical infrastructure, ATMs, office buildings, parking lots and structures, and parks and green spaces. The latter portion of the book is reserved for concepts including lighting, LEED and GREEN certification, workplace violence, signage, data capture and analysis, and conducting CPTED surveys.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Atlas has created the definitive book on CPTED and security. Despite the magnitude and complexity of the science and art of security management, he has done an outstanding job of merging these and other disciplines and concepts together into a cogent display of information that the reader should be able to apply in a wide variety of locations and situations. If you are only going to buy one book this year, it is strongly suggested you purchase this one. </span> </span> </p> <hr /> <p> <span style="color:#800000;"> <strong> <span style="font-size:small;"> <span style="font-family:arial;">Reviewer:</span> </span> </strong> </span> <span style="font-size:small;"> <span style="font-family:arial;"> Glen Kitteringham, CPP, has worked in the security industry since 1990. He holds a master’s degree in security and crime risk management. He is president of Kitteringham Security Group Inc., which consults with companies around the globe. </span> </span> </p> </div>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Soft-Targets,-Hard-Challenges.aspxSoft Targets, Hard Challenges<p>​Soft targets pose a particularly difficult protection challenge. Take, for example, the 2017 Las Vegas shooting, when concertgoers enjoying a music festival at the Las Vegas Village open performance venue suddenly became targets for an active shooter firing more than 1,100 rounds from his hotel suite.</p><p>The scope of the tragedy—the deadliest U.S. mass shooting committed by an individual, which left 58 dead—made a deep impression on many interested in security, including officials at the U.S. Department of Homeland Security (DHS). "The Las Vegas shooting was really a catalyzing moment for our department," Bob Kolasky, DHS deputy assistant secretary for infrastructure protection, tells Security Management.  </p><p>Ten days after the shooting, U.S. President Donald Trump nominated Kirstjen Nielsen to be the new secretary of homeland security. When Nielsen took over the position, one of her first priorities was to raise awareness of DHS' existing security guidance and resources, so that they could be well-used by those who need them, Kolasky says.   </p><p>"We want to make sure our security resources are publicized, so they can help," he explains. As the Vegas shooting illustrated, soft targets seemed to be a good initial focus for DHS "to advance the security of things that traditionally haven't been that secure," he adds. </p><p>And so earlier this year DHS issued a resource guide and security plan overview for Soft Targets and Crowded Places (ST-CPs). In the overview, DHS defines ST-CPs as "locations that are easily accessible to large numbers of people and that have limited security or protective measures in place making them vulnerable to attack." This includes spaces such as schools, sports venues, transportation hubs, shopping venues, bars, restaurants, hotels, places of worship, tourist attractions, theaters, and civic spaces, according to DHS. </p><p>"ST-CPs do not have to be buildings and can include open spaces such as parks and pedestrian malls. ST-CPs will not necessarily be crowded at all times—crowd densities may vary," DHS says in the overview. "Securing these locations and venues is essential to preserving our way of life and sustaining the engine of our economy."</p><p>The guide is a catalog of soft target resources for businesses, first responders, government, and the general public. It is broken up into action categories such as identify suspicious behavior; protect, screen, and allow access to facilities; prepare and respond to active assailants; prevent and respond to bombings; and protect against unmanned aircraft systems (UAS).</p><p>DHS decided to include the latter category on UAS because of two recent developments, Kolasky says. First, various incidents overseas have demonstrated that some terrorists have the capacity to use UAS to cause harm. "We see that the threat is real," he explains. Second, for some U.S. sports facilities, defending against UAS "is something that is a top-of-mind concern," he says. </p><p>"There's demand from the security profession and there's a threat that warranted it," Kolasky explains.</p><p>The resources that the guide links to in each action category vary, and include informational materials, in-person and online training opportunities, videos, websites, and other tools. Although some of the resources were created in collaboration with partners, the DHS guide does not link to any resources that have no government connection. "That would be a more time-consuming effort and one that is fraught, at least a little bit, with the implications that recommending suggests endorsement," Kolasky says. "For now, we haven't worked through that."</p><p>One soft target expert, Jennifer Hesterman, says she was "really surprised" when the resource guide and overview were made public, because previously the agency had not been active with resource promotion. "They have been pretty quiet on the DHS side," says Hesterman, the author of Soft Target Hardening: Protecting People from Attack, which won ASIS International's 2015 Security Book of the Year Award.</p><p>Nevertheless, Hesterman says she is pleased with the issuance of the guide, for a few reasons. One is that it is a valuable public acknowledgment by the federal government of the risks of attacks. This is helpful at a time when some members of the public suspect that security professionals sometimes overplay risk because it benefits them professionally. "I've been called a merchant of doom," she says. "People think we just want to generate business, and so we will tell them horrible and scary things."  </p><p>Moreover, given the frequency of attacks like school shootings, some people are experiencing "security fatigue," and they simply do not want to discuss the topic any more, Hesterman explains. And to avoid causing widespread panic among the citizenry, federal officials are often measured in their communications about risk, so sometimes no sense of urgency comes through.</p><p>This is understandable, she says, but it's also important to realize that growing threats are out there, such as more attacks on critical infrastructure facilities. Citizens have the right to understand such risks, so in that respect the new DHS guide is helpful, she adds.</p><p>As for the section on UAS, Hesterman says it is a valuable asset for security practitioners. "Terrorists are already using drones to advance their goals," she explains. She also emphasizes that, on this issue like many others, "we have to think about what's next." Drones are also being used for security purposes, "but we have to think about how drones can be hacked. They can he hacked and grounded," she says. </p><p>Another growing area of vulnerability for soft targets is insider threats, she adds. In part, this is driven by a principle she explains as: "People have a public life, a private life, and a secret life." That secret life could include a gambling problem or another secret addiction that could push the person to extreme actions, and even those close to them may not realize that they are unraveling. "Insider threat is huge, and it's totally overlooked," Hesterman says.</p><p>Finally, Hesterman says the potential soft target threat of terror groups like ISIS has also grown.  Overseas, these groups have attacked soft targets like schools, whether it be Boko Haram kidnapping students in Nigeria or the Taliban killing more than 100 in an officer school in Pakistan. For these militant groups, soft targets are legitimate ones. "Terror groups and lone actors can leverage those to fit their agenda," she says. In fact, one statistic holds that 90 percent of war casualties are civilians, she adds. "Now it's like downtown is where the battle is."</p><p>The soft target guide and overview may turn out to be the first in a series of efforts by DHS to better leverage its preventative resources, officials say. The department released a similar guide and overview for school shootings in August (which will be covered in a future issue of Security Management), and officials are con­ducting a departmentwide review to determine what other resources can be promoted. ​</p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Active-Shooter.aspxActive Shooter Guidelines<p>​How to handle an active shooter situation is the subject of two new guidelines, including one <a href="http://www.dhs.gov/publication/active-shooter-how-to-respond" target="_blank">released by the Department of Homeland Security</a> that​ targets a more general audience of managers and employees.</p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465