Security by Industry

 

 

https://sm.asisonline.org/Pages/Book-Review-Urban-Emergency-Management.aspxBook Review: Urban Emergency ManagementGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a43444652018-12-01T05:00:00ZThomas Henkey; Reviewed by Dan McArthur<p><em>Urban Emergency Management: Planning and Response for the 21st Century. </em>By Thomas Henkey. Butterworth-Heinemann; <a href="https://www.elsevier.com/" target="_blank">Elsevier.com</a>; 260 pages; $99.95.<br></p><p>Author Thomas Henkey provides an excellent review of the fundamental concepts of emergency management in Urban Emergency Management: Planning and Response for the 21st Century. The book contends that emergency management is constantly changing and there is no one approach to fit all emergencies.</p><p>Using the five phases of emergency management—prevention, preparedness, mitigation, response, and recovery—as a starting point, the author balances the discussion of academic and operational approaches by applying them to real-world events.</p><p>The author is quick to point out that emergency management in urban areas is a topic that has not yet been fully explored. One key to effective urban emergency response is the ability for responder organizations to be able to communicate with one another, however, the topic of interoperability among tri-service agencies is not discussed in detail.</p><p>Henkey has done a great job in bringing current information on urban emergency management into a single publication. It is a good source of review for all emergency management practitioners and offers a thoughtful analysis of emergency management techniques as applied to recent events.</p><p><em>Reviewer: Dan McArthur has more than 30 years of experience in the nuclear industry and serves as senior strategist at Bruce Power, where he focuses on emergency management policy.​</em></p><div><br></div>

 

 

https://sm.asisonline.org/Pages/Shooing-off-Copper-Crime-Waves.aspx2018-11-01T04:00:00ZShooing off Copper Crime Waves
https://sm.asisonline.org/Pages/Disaster-Recovery.aspx2014-09-01T04:00:00ZDisaster Recovery
https://sm.asisonline.org/Pages/21st-century-security-and-cpted-designing-critical-infrastructure-protection-and-crime-prev-0.aspx2014-05-01T04:00:00Z21st Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition.

 

 

https://sm.asisonline.org/Pages/Book-Review-Surgery-Center-Safety.aspx2018-12-01T05:00:00ZBook Review: Surgery Center Safety
https://sm.asisonline.org/Pages/Book-Review-Urban-Emergency-Management.aspx2018-12-01T05:00:00ZBook Review: Urban Emergency Management
https://sm.asisonline.org/Pages/Next-Gen-911.aspx2018-06-01T04:00:00ZNext-Gen 911

 

 

https://sm.asisonline.org/Pages/Data-Driven-Traffic-Management-Solutions.aspx2018-12-01T05:00:00ZData-Driven Traffic Management Solutions
https://sm.asisonline.org/Pages/December-2018-Industry-News.aspx2018-12-01T05:00:00ZDecember 2018 Industry News
https://sm.asisonline.org/Pages/Maritime_Maladies.aspx2018-12-01T05:00:00ZMaritime Maladies

 

 

https://sm.asisonline.org/Pages/Dancing-With-Yourself.aspx2018-12-01T05:00:00ZDancing With Yourself
https://sm.asisonline.org/Pages/Transport-to-Transhumanism.aspx2018-12-01T05:00:00Ztransport to transhumanism
https://sm.asisonline.org/Pages/Happy-Holidays-from-Security-Management.aspx2017-12-22T05:00:00ZHappy Holidays from Security Management

 

 

https://sm.asisonline.org/Pages/Maritime_Maladies.aspx2018-12-01T05:00:00ZMaritime Maladies
https://sm.asisonline.org/Pages/January-2018-Industry-News.aspx2018-01-01T05:00:00ZJanuary 2018 Industry News
https://sm.asisonline.org/Pages/December-2017-Industry-News.aspx2017-12-01T05:00:00ZDecember 2017 Industry News

 

 

https://sm.asisonline.org/Pages/Resilience-Trends.aspx2016-09-01T04:00:00ZResilience Trends
https://sm.asisonline.org/Pages/Required-License-to-Operate.aspx2015-02-01T05:00:00ZRequired: License to Operate
https://sm.asisonline.org/Pages/chemical-facilities-tackle-explosive-problem-0013191.aspx2014-03-01T05:00:00ZChemical Facilities Tackle an Explosive Problem

 

 

https://sm.asisonline.org/Pages/Building-a-Hostility-Free-Work-Place.aspx2018-11-01T04:00:00ZBuilding a Hostility-Free Workplace
https://sm.asisonline.org/Pages/Book-Review-First-Responders-Handbook.aspx2018-10-01T04:00:00ZBook Review: First Responders Handbook
https://sm.asisonline.org/Pages/September-2018-Industry-News.aspx2018-09-01T04:00:00ZSeptember 2018 Industry News

 

 

https://sm.asisonline.org/Pages/Something-in-the-Water.aspx2018-11-01T04:00:00ZSomething in the Water
https://sm.asisonline.org/Pages/Paving-the-Way.aspx2018-03-01T05:00:00ZPaving the Way
https://sm.asisonline.org/Pages/GridEx-IV-Tests-The-North-American-Power-Grid.aspx2017-11-17T05:00:00ZGridEx IV Tests The North American Power Grid

 

 

https://sm.asisonline.org/Pages/Access-With-A-Twist.aspx2018-12-01T05:00:00ZAccess With A Twist
https://sm.asisonline.org/Pages/A-Transformative-Tuesday-for-Education.aspx2018-09-26T04:00:00ZA Transformative Tuesday for Education
https://sm.asisonline.org/Pages/Security-Cares-Focuses-on-School-Safety.aspx2018-09-24T04:00:00ZSecurity Cares Focuses on School Safety

 

 

https://sm.asisonline.org/Pages/Book-Review---Financial-Investigations.aspx2018-08-01T04:00:00ZBook Review: Financial Investigations
https://sm.asisonline.org/Pages/Giving-Security-Credit.aspx2018-05-01T04:00:00ZGiving Security Credit
https://sm.asisonline.org/Pages/The-Fraudians-Slip-In.aspx2018-03-01T05:00:00ZThe Fraudians Slip In

 

 

https://sm.asisonline.org/Pages/Four-Ways-to-Improve-Healthcare-Security.aspx2018-06-01T04:00:00ZFour Ways to Improve Healthcare Security
https://sm.asisonline.org/Pages/Top-Five-Challenges-in-Healthcare.aspx2018-06-01T04:00:00ZTop Five Challenges in Healthcare
https://sm.asisonline.org/Pages/Access-Control-for-Healthcare-and-Nursing-Facilities.aspx2018-04-19T04:00:00ZAccess Control for Healthcare and Nursing Facilities

 

 

https://sm.asisonline.org/Pages/Gaming-Security-Patrons-Players-And-Cheats.aspx2018-12-01T05:00:00ZGaming Security: Patrons, Players, And Cheats
https://sm.asisonline.org/Pages/SHOOTING-AT-BORDERLINE-BAR-IN-THOUSAND-OAKS,-CALIFORNIA.aspx2018-11-08T05:00:00ZBreaking News: Shooting at Borderline Bar in Thousand Oaks, California
https://sm.asisonline.org/Pages/Pittsburgh-Shooting-Updates-and-ASIS-Houses-of-Worship-Resources.aspx2018-10-29T04:00:00ZPittsburgh Shooting: Updates and ASIS Houses of Worship Resources

 

 

https://sm.asisonline.org/Pages/November-2018-Industry-News.aspx2018-11-01T04:00:00ZNovember 2018 Industry News
https://sm.asisonline.org/Pages/October-2018-Industry-News.aspx2018-10-01T04:00:00ZOctober 2018 Industry News
https://sm.asisonline.org/Pages/Open-Doors,-Secure-Spaces.aspx2018-09-01T04:00:00ZOpen Doors, Secure Spaces

 

 

https://sm.asisonline.org/Pages/The-Fight-Against-Fake-Pharmaceuticals.aspx2015-02-01T05:00:00ZThe Fight Against Fake Pharmaceuticals
https://sm.asisonline.org/Pages/uncovering-smart-solutions-0013513.aspx2014-07-01T04:00:00ZUncovering Smart Solutions
https://sm.asisonline.org/Pages/online-pharmacies-0013326.aspx2014-05-01T04:00:00ZRogue Online Pharmacies

 

 

https://sm.asisonline.org/Pages/Book-Review-Are-We-Safe-Enough.aspx2018-11-01T04:00:00ZBook Review: Are We Safe Enough?
https://sm.asisonline.org/Pages/Safer-Shipping.aspx2018-11-01T04:00:00ZSafer Shipping
https://sm.asisonline.org/Pages/Preventing-Port-Problems.aspx2018-10-01T04:00:00ZPreventing Port Problems

 

 

https://sm.asisonline.org/Pages/Safer-Shipping.aspx2018-11-01T04:00:00ZSafer Shipping
https://sm.asisonline.org/Pages/Preventing-Port-Problems-.aspx2018-10-01T04:00:00ZPreventing Port Problems
https://sm.asisonline.org/Pages/Preventing-Port-Problems.aspx2018-10-01T04:00:00ZPreventing Port Problems

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/Soft-Targets,-Hard-Challenges.aspxSoft Targets, Hard Challenges<p>​Soft targets pose a particularly difficult protection challenge. Take, for example, the 2017 Las Vegas shooting, when concertgoers enjoying a music festival at the Las Vegas Village open performance venue suddenly became targets for an active shooter firing more than 1,100 rounds from his hotel suite.</p><p>The scope of the tragedy—the deadliest U.S. mass shooting committed by an individual, which left 58 dead—made a deep impression on many interested in security, including officials at the U.S. Department of Homeland Security (DHS). "The Las Vegas shooting was really a catalyzing moment for our department," Bob Kolasky, DHS deputy assistant secretary for infrastructure protection, tells Security Management.  </p><p>Ten days after the shooting, U.S. President Donald Trump nominated Kirstjen Nielsen to be the new secretary of homeland security. When Nielsen took over the position, one of her first priorities was to raise awareness of DHS' existing security guidance and resources, so that they could be well-used by those who need them, Kolasky says.   </p><p>"We want to make sure our security resources are publicized, so they can help," he explains. As the Vegas shooting illustrated, soft targets seemed to be a good initial focus for DHS "to advance the security of things that traditionally haven't been that secure," he adds. </p><p>And so earlier this year DHS issued a resource guide and security plan overview for Soft Targets and Crowded Places (ST-CPs). In the overview, DHS defines ST-CPs as "locations that are easily accessible to large numbers of people and that have limited security or protective measures in place making them vulnerable to attack." This includes spaces such as schools, sports venues, transportation hubs, shopping venues, bars, restaurants, hotels, places of worship, tourist attractions, theaters, and civic spaces, according to DHS. </p><p>"ST-CPs do not have to be buildings and can include open spaces such as parks and pedestrian malls. ST-CPs will not necessarily be crowded at all times—crowd densities may vary," DHS says in the overview. "Securing these locations and venues is essential to preserving our way of life and sustaining the engine of our economy."</p><p>The guide is a catalog of soft target resources for businesses, first responders, government, and the general public. It is broken up into action categories such as identify suspicious behavior; protect, screen, and allow access to facilities; prepare and respond to active assailants; prevent and respond to bombings; and protect against unmanned aircraft systems (UAS).</p><p>DHS decided to include the latter category on UAS because of two recent developments, Kolasky says. First, various incidents overseas have demonstrated that some terrorists have the capacity to use UAS to cause harm. "We see that the threat is real," he explains. Second, for some U.S. sports facilities, defending against UAS "is something that is a top-of-mind concern," he says. </p><p>"There's demand from the security profession and there's a threat that warranted it," Kolasky explains.</p><p>The resources that the guide links to in each action category vary, and include informational materials, in-person and online training opportunities, videos, websites, and other tools. Although some of the resources were created in collaboration with partners, the DHS guide does not link to any resources that have no government connection. "That would be a more time-consuming effort and one that is fraught, at least a little bit, with the implications that recommending suggests endorsement," Kolasky says. "For now, we haven't worked through that."</p><p>One soft target expert, Jennifer Hesterman, says she was "really surprised" when the resource guide and overview were made public, because previously the agency had not been active with resource promotion. "They have been pretty quiet on the DHS side," says Hesterman, the author of Soft Target Hardening: Protecting People from Attack, which won ASIS International's 2015 Security Book of the Year Award.</p><p>Nevertheless, Hesterman says she is pleased with the issuance of the guide, for a few reasons. One is that it is a valuable public acknowledgment by the federal government of the risks of attacks. This is helpful at a time when some members of the public suspect that security professionals sometimes overplay risk because it benefits them professionally. "I've been called a merchant of doom," she says. "People think we just want to generate business, and so we will tell them horrible and scary things."  </p><p>Moreover, given the frequency of attacks like school shootings, some people are experiencing "security fatigue," and they simply do not want to discuss the topic any more, Hesterman explains. And to avoid causing widespread panic among the citizenry, federal officials are often measured in their communications about risk, so sometimes no sense of urgency comes through.</p><p>This is understandable, she says, but it's also important to realize that growing threats are out there, such as more attacks on critical infrastructure facilities. Citizens have the right to understand such risks, so in that respect the new DHS guide is helpful, she adds.</p><p>As for the section on UAS, Hesterman says it is a valuable asset for security practitioners. "Terrorists are already using drones to advance their goals," she explains. She also emphasizes that, on this issue like many others, "we have to think about what's next." Drones are also being used for security purposes, "but we have to think about how drones can be hacked. They can he hacked and grounded," she says. </p><p>Another growing area of vulnerability for soft targets is insider threats, she adds. In part, this is driven by a principle she explains as: "People have a public life, a private life, and a secret life." That secret life could include a gambling problem or another secret addiction that could push the person to extreme actions, and even those close to them may not realize that they are unraveling. "Insider threat is huge, and it's totally overlooked," Hesterman says.</p><p>Finally, Hesterman says the potential soft target threat of terror groups like ISIS has also grown.  Overseas, these groups have attacked soft targets like schools, whether it be Boko Haram kidnapping students in Nigeria or the Taliban killing more than 100 in an officer school in Pakistan. For these militant groups, soft targets are legitimate ones. "Terror groups and lone actors can leverage those to fit their agenda," she says. In fact, one statistic holds that 90 percent of war casualties are civilians, she adds. "Now it's like downtown is where the battle is."</p><p>The soft target guide and overview may turn out to be the first in a series of efforts by DHS to better leverage its preventative resources, officials say. The department released a similar guide and overview for school shootings in August (which will be covered in a future issue of Security Management), and officials are con­ducting a departmentwide review to determine what other resources can be promoted. ​</p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/21st-century-security-and-cpted-designing-critical-infrastructure-protection-and-crime-prev-0.aspx21st Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition.<div class="body"> <p> <em> <span style="font-size:small;"> <span style="font-family:arial;">CRC Press. Available from ASIS, item #2078; 954 pages; $120 (ASIS member), $132 (nonmember). Also available as e-book.</span> </span> </em> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">As good as the first edition of 21st Century Security and CPTED was, this second edition surpasses it. Atlas, known in security circles as a consummate professional, has done an outstanding job in creating this second edition, which has twice as much material as the original edition. It also includes voluminous references and hundreds of outstanding clarifying photos in both color and black-and-white. Using humor and candid insight he incorporates all the concepts of CPTED, including design, construction, security countermeasures, and risk management strategies, and merges them into a highly informative reference manual for security practitioners at every level.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">There is a logical flow to the book. It lays a solid foundation by discussing architecture and its intent, as well as environmental crime control theories and premises liability. There is something here for everyone as it also discusses terrorism and critical infrastructure from differing perspectives. Several chapters on problem solving provide guidance on conducting threat, risk, and vulnerability assessments.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Throughout, Atlas provides a roadmap for merging security and CPTED into management principles and practices in a wide variety of facility settings, including healthcare facilities, critical infrastructure, ATMs, office buildings, parking lots and structures, and parks and green spaces. The latter portion of the book is reserved for concepts including lighting, LEED and GREEN certification, workplace violence, signage, data capture and analysis, and conducting CPTED surveys.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Atlas has created the definitive book on CPTED and security. Despite the magnitude and complexity of the science and art of security management, he has done an outstanding job of merging these and other disciplines and concepts together into a cogent display of information that the reader should be able to apply in a wide variety of locations and situations. If you are only going to buy one book this year, it is strongly suggested you purchase this one. </span> </span> </p> <hr /> <p> <span style="color:#800000;"> <strong> <span style="font-size:small;"> <span style="font-family:arial;">Reviewer:</span> </span> </strong> </span> <span style="font-size:small;"> <span style="font-family:arial;"> Glen Kitteringham, CPP, has worked in the security industry since 1990. He holds a master’s degree in security and crime risk management. He is president of Kitteringham Security Group Inc., which consults with companies around the globe. </span> </span> </p> </div>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Bag-Checks-At-Hotels-Unlikely-To-Become-New-Normal,-Expert-Says.aspxBag Checks At Hotels Unlikely To Become New Normal, Expert Says<p>​In the aftermath of the Las Vegas shooting that killed 59 people and wounded more than 500 others, many are wondering if hotels will change their security policies and procedures. </p><p>One area of concern is if hotels will begin implementing bag checks because gunman Stephen Paddock was able to smuggle 23 firearms, along with other equipment, into his suite at Mandalay Bay to carry out Sunday’s massacre.<br></p><p>The Wynn resort in Las Vegas—located on the opposite end of the Vegas Strip from the Mandalay Bay resort—introduced security guards on Monday afternoon to screen visitors with metal-detector wands. It also implemented a bag check, which created a 10-minute wait to get inside the facility. <br></p><p>This is unlikely to become the new normal for hotel security in the near future, however, says Russell Kolins, CEO of the Kolins Security Group and chair of the ASIS International Hospitality, Entertainment, and Tourism Security council.<br></p><p>“Hotels are in the business of selling privacy—they’re offering hospitality and selling privacy,” Kolins explains, adding that hotels would likely start to lose business if they began checking bags—especially in locations like Las Vegas. <br></p><p>“In Vegas especially, what happens in Vegas stays in Vegas,” Kolins says. “People bring items they don’t want other people to see.”<br></p><p>At airports, travelers are subject to bag searches—as well as body scans—because they are a different kind of target than a hotel. Travelers also have no expectation of privacy while on a plane, except for in the bathroom, unlike in a hotel where travelers expect privacy within their room, Kolins says.<br></p><p>One policy that might need to be revisited following the shooting, however, is how hotels handle checking rooms that have a “Do Not Disturb” sign on the door. <br></p><p>Paddock checked into the Mandalay Bay on Thursday and kept a “Do Not Disturb” sign on his hotel door throughout his stay. This meant hotel cleaning staff did not enter his room, <a href="https://www.nytimes.com/2017/10/03/us/las-vegas-gunman.html?hp&action=click&pgtype=Homepage&clickSource=story-heading&module=a-lede-package-region&region=top-news&WT.nav=top-news&_r=0" target="_blank">according to a hotel worker who spoke to The New York Times,​</a> because housekeeping is only allowed to enter a room with such a sign on it if a security guard is present.<br></p><p>Requiring a security guard be present to enter rooms with privacy signs is the right move, Kolins says, but hotels should consider changing their policies to require room checks every other day.<br></p><p>“That’s an arbitrary period of time, but I think a policy should be instilled to at least check on the rooms,” Kolins says, adding that hotels would have to make patrons aware of the policy. But such a policy could, potentially, prevent an individual from using a hotel room for an extended period of time to plot a criminal act.<br></p><p>Kolins leads a team of court-certified security experts at his firm. He says he thinks it’s unlikely that Mandalay Bay will be sued for negligence for the shooting because to sue for negligence, plaintiffs must be able to show foreseeability. <br></p><p>“This is unprecedented—nothing like this has ever happened,” Kolins explains. “If something happens the first time, it’s not foreseeable.”<br></p><p>Now that such an attack has happened, though, if a similar attack happens plaintiffs could potentially bring a lawsuit saying it was foreseeable. In response, Kolins says he expects the hotel security industry to begin having seminars and tabletop meetings to determine how they would handle a similar case.<br></p><p>“I think what this has done is show that the slogan ‘expect the unexpected’ is again proven to be true,” Kolins says. “It wasn’t foreseeable because it was unprecedented.”​<br></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465