Security by Industry

 

 

https://sm.asisonline.org/Pages/Marquez-Memorial-Honoree-Named-Tonight.aspxMarquez Memorial Honoree Named TonightGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a43444652017-09-25T04:00:00ZShow Daily staff<p>​The ASIS Women in Security Council will pay tribute to Bonnie Michelman, CPP, on Monday night at the annual Karen Marquez Honors award ceremony. “It gives our council great pleasure to recognize Michelman’s countless contributions to our industry,” says Council Chair Donna Kobzaruk.</p><p>Michelman has extensive leadership and security management experience in diverse industries. She is currently the executive director of police, security, and outside services at Massachusetts General Hospital in Boston, Massachusetts. She is also the security consultant for Partners Healthcare, Inc., an organization comprising 13 hospitals, hundreds of offsite facilities, and a workforce of more than 100,000.</p><p>A former president of ASIS International, Michelman was chair of the ASIS Board of Directors in 2002 and president of the ASIS Foundation Board of Trustees from 2003 to 2005.</p><p>She has held many leadership positions with other security- or healthcare-related national and international organizations. In 2010, she was appointed by U.S. Department of Homeland Security Secretary Janet Napolitano to the Homeland Security Advisory Council, a position she held until 2015.</p><p>Michelman is also a frequent lecturer and has published many articles on safety, security, leadership, and management. The award is named for Karen Marquez, the co-owner and executive vice president of MVM, Inc., a physical security services firm based in Virginia, who passed away in 2006 after a long battle with cancer. During her 23-year career, Marquez brought hands-on expertise to global security management issues.</p><p>To be considered for this prestigious award, candidates must be ASIS members in good standing or an ASIS Life Member. The experience criteria include several significant benchmarks: a minimum of 15 years of experience or the equivalent in law enforcement or military service, or 10 years of experience if the candidate has achieved an ASIS certification.</p><p>Those making the nomination should describe the significant contributions made by the women being nominated to the advancement of the physical security industry. Candidates must also attend the ASIS annual seminar to be considered.</p><p>The awards ceremony will be held from 6:00 p.m. to 8:00 p.m. on the 48th floor of the Thanksgiving Tower of the Tower Club of Dallas (1601 Elm Street). The event is free, and drinks and hors d’oeuvres will be served.</p><p>To attend, interested persons should register today using the registration link via the ASIS website: https://asisonline.org/About-ASIS/Who-We-Are/Whats-New/ Pages/Nominations-open-for-Karen- Marquez-Honor.aspx.</p><p>Information on the 2018 deadline for the Karen Marquez Honors and the nomination form can be found at asisonline.org. Scroll down to ASIS councils and click on Women in Security to access details.</p>

 

 

https://sm.asisonline.org/Pages/Disaster-Recovery.aspx2014-09-01T04:00:00ZDisaster Recovery
https://sm.asisonline.org/Pages/21st-century-security-and-cpted-designing-critical-infrastructure-protection-and-crime-prev-0.aspx2014-05-01T04:00:00Z21st Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition.
https://sm.asisonline.org/Pages/security-design-abu-dhabi-0013246.aspx2014-04-01T04:00:00ZSecurity by Design in Abu Dhabi

 

 

https://sm.asisonline.org/Pages/Houston’s-Game-Day-Solutions.aspx2017-07-01T04:00:00ZHouston’s Game Day Solutions
https://sm.asisonline.org/Pages/Protecting-Executives-at-Home.aspx2017-06-19T04:00:00ZProtecting Executives at Home
https://sm.asisonline.org/Pages/Industry-News-September-2016.aspx2016-09-01T04:00:00ZIndustry News September 2016

 

 

https://sm.asisonline.org/Pages/July-2017-Industry-News.aspx2017-07-01T04:00:00ZJuly 2017 Industry News
https://sm.asisonline.org/Pages/The-Next-Tase-Phase.aspx2016-10-01T04:00:00ZThe Next Tase Phase
https://sm.asisonline.org/Pages/A-Vote-for-Biometrics.aspx2016-05-01T04:00:00ZA Vote for Biometrics

 

 

https://sm.asisonline.org/Pages/Accolades-Entries-Spotlight-Innovation.aspx2016-09-11T04:00:00ZAccolades Entries Spotlight Innovation
https://sm.asisonline.org/Pages/SM-Online-February-2016.aspx2016-02-01T05:00:00ZSM Online February 2016
https://sm.asisonline.org/Pages/SM-Online-October-2015.aspx2015-10-01T04:00:00ZSM Online October 2015

 

 

https://sm.asisonline.org/Pages/Changing-Course-for-Success.aspx2017-07-10T04:00:00ZChanging Course for Corporate Success
https://sm.asisonline.org/Pages/Industry-News-May-2017.aspx2017-05-01T04:00:00ZIndustry News May 2017
https://sm.asisonline.org/Pages/Maturity--Model-101.aspx2016-12-01T05:00:00ZMaturity Model 101

 

 

https://sm.asisonline.org/Pages/Resilience-Trends.aspx2016-09-01T04:00:00ZResilience Trends
https://sm.asisonline.org/Pages/Required-License-to-Operate.aspx2015-02-01T05:00:00ZRequired: License to Operate
https://sm.asisonline.org/Pages/chemical-facilities-tackle-explosive-problem-0013191.aspx2014-03-01T05:00:00ZChemical Facilities Tackle an Explosive Problem

 

 

https://sm.asisonline.org/Pages/ASIS-2017-Product-Showcase.aspx2017-09-19T04:00:00ZASIS 2017 Product Showcase
https://sm.asisonline.org/Pages/Less-is-More.-A-KISS-Approach-to-ESRM.aspx2017-09-12T04:00:00ZLess is More: A KISS Approach to ESRM
https://sm.asisonline.org/Pages/A-Professional-Path.aspx2017-09-01T04:00:00ZA Professional Path

 

 

https://sm.asisonline.org/Pages/Global-Water-Risk.aspx2017-09-01T04:00:00ZGlobal Water Risk
https://sm.asisonline.org/Pages/Solar-Technology-Can-Help-Secure-Military-Grids,-New-Paper-Finds.aspx2017-05-08T04:00:00ZSolar Technology Can Help Secure Military Grids, New Paper Finds
https://sm.asisonline.org/Pages/Infrastructure-Protection-Trends.aspx2016-09-01T04:00:00ZInfrastructure Protection Trends

 

 

https://sm.asisonline.org/Pages/An-Education-Connection.aspx2017-09-01T04:00:00ZAn Education Connection
https://sm.asisonline.org/Pages/Responding-to-San-Bernardino.aspx2017-05-01T04:00:00ZResponding to San Bernardino
https://sm.asisonline.org/Pages/Industry-News-February-2017.aspx2017-02-01T05:00:00ZIndustry News February 2017

 

 

https://sm.asisonline.org/Pages/Business-Theft-and-Fraud--Detection-and-Prevention.aspx2017-07-17T04:00:00ZBook Review - Business Theft and Fraud: Detection and Prevention
https://sm.asisonline.org/Pages/Accesos-Bajo-Control.aspx2017-06-01T04:00:00ZAccesos bajo Control
https://sm.asisonline.org/Pages/Teller-Trouble.aspx2017-03-01T05:00:00ZTeller Trouble

 

 

https://sm.asisonline.org/Pages/The-Dirty-Secret-of-Drug-Diversion.aspx2017-08-01T04:00:00ZThe Dirty Secret of Drug Diversion
https://sm.asisonline.org/Pages/Senior-Safety.aspx2017-07-01T04:00:00ZSenior Safety
https://sm.asisonline.org/Pages/Responding-to-Violence-in-Healthcare.aspx2017-06-26T04:00:00ZResponding to Violence in Healthcare

 

 

https://sm.asisonline.org/Pages/House-Rules.aspx2017-09-01T04:00:00ZQ&A: House Rules
https://sm.asisonline.org/Pages/Houston’s-Game-Day-Solutions.aspx2017-07-01T04:00:00ZHouston’s Game Day Solutions
https://sm.asisonline.org/Pages/Terrorists-Check-In.aspx2017-05-01T04:00:00ZTerrorists Check In

 

 

https://sm.asisonline.org/Pages/Safety-in-Shared-Spaces.aspx2017-09-01T04:00:00ZSafety in Shared Spaces
https://sm.asisonline.org/Pages/Protecting-Fine-Art-and-Other-Industry-News.aspx2017-09-01T04:00:00ZProtecting Fine Art and Other Industry News
https://sm.asisonline.org/Pages/Securing-Sacred-Spaces.aspx2017-08-01T04:00:00ZSecuring Sacred Spaces

 

 

https://sm.asisonline.org/Pages/The-Fight-Against-Fake-Pharmaceuticals.aspx2015-02-01T05:00:00ZThe Fight Against Fake Pharmaceuticals
https://sm.asisonline.org/Pages/uncovering-smart-solutions-0013513.aspx2014-07-01T04:00:00ZUncovering Smart Solutions
https://sm.asisonline.org/Pages/online-pharmacies-0013326.aspx2014-05-01T04:00:00ZRogue Online Pharmacies

 

 

https://sm.asisonline.org/Pages/Industry-News-June-2017.aspx2017-06-01T04:00:00ZIndustry News June 2017
https://sm.asisonline.org/Pages/The-Evolution-of-Airport-Attacks.aspx2017-04-01T04:00:00ZThe Evolution of Airport Attacks
https://sm.asisonline.org/Pages/Insights-on-Asia.aspx2016-08-01T04:00:00ZInsights on Asia

 

 

https://sm.asisonline.org/Pages/The-Most-Resilient-Countries-in-the-World.aspx2017-05-11T04:00:00ZThe Most Resilient Countries in the World
https://sm.asisonline.org/Pages/Redefining-Loss.aspx2017-04-01T04:00:00ZRedefining Loss
https://sm.asisonline.org/Pages/Surveillance-and-Stereotypes.aspx2017-04-01T04:00:00ZSurveillance and Stereotypes

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/Book-Review---Physical-Security.aspxPhysical Security<p><em>Butterworth-Heinemann; Elsevier.com; 204 pages; $79.95.</em></p><p>​The second edition of <em>Physical Security: 150 Things You Should Know</em> is an excellent reference for security practitioners and managers. Written by Lawrence J. Fennelly and Marianna Perry, CPP, the book covers the most common concepts and concerns in security today; from lighting and CPTED to cyber and drones. To borrow from the book’s opening lines, it is a roadmap to building and enhancing an organization’s security program.</p><p>The authors do a great job of organizing an overwhelming amount of material. The book is likely to serve more as a go-to reference for a particular topic rather than to be read from cover to cover. </p><p>A security practitioner with a fundamental understanding of security will find this book to be an exceptional resource for planning security upgrades, training security staff, and finding justification for best practices with the C-suite. Many sections are nothing more than easy-to-follow checklists, so retrieving the information is remarkably simple and quick.   </p><p>The broad range of topics addressed in the book makes it impossible for the authors to dig too deep on any single issue, so many of the sections do not offer full explanations. This, however, does not take anything away from the quality or usefulness of the book. </p><p>The concepts are outlined in carefully selected paragraphs that provide just enough detail to jog the memory or provide a starting point for further research from more-focused sources. All in all, this book offers great ideas and best practices for a broad range of security topics, not just physical security.</p><p><em><strong>Reviewer: Yan Byalik, CPP,</strong> is the security administrator for the City of Newport News Virginia. He is a graduate of the Virginia Tech Corps of Cadets and has worked in a variety of security roles in higher education, amusement park, and telecommunication security sectors since 2001. He is the assistant regional vice president for ASIS Region 5A in southeast Virginia.</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/House-Rules.aspxQ&A: House Rules<p><strong><em>​Q. How are gaming security professionals leveraging technology to protect their assets? </em></strong></p><p><strong>A. </strong>While the protection of gaming assets is important, what about the nongaming areas of the operation such as food and beverage outlets, nightclubs, bars, lounges, and retail outlets? Many security professionals believe the second most-observed area for surveillance personnel should be food and beverage. Data from Moody’s Investors Service from September 2016 said that nongaming revenue was 55 to 65 percent of the revenue of a gaming property, with food and beverage being the largest portion of that. So no matter what city or property patrons visit, of the disposable income that people bring to the gaming industry, it appears that the food and beverage revenue is becoming at least as important to casinos as the gaming revenue. </p><p>To more closely monitor losses and possible theft in the food and beverage departments, security teams can leverage an effective point-of-sale control solution that is integrated with a hotel and casino’s surveillance recording system, which identifies errors in procedures and theft.</p><p>With a point-of-sale (POS) terminal, you basically have a cashier device of some type, such as a register. That transmits data to the server, where the data is analyzed and stored. Depending on what the food and beverage management team wants and what their parameters are, the POS generates reports. For example, if you’re talking about a bar, you have data on who the employee is, the time of day, what drink was ordered, what drink was served, what food was ordered, and what food was served. The solution takes that data and overlays it with the video of that POS terminal. You can go back and see what the employee is actually ringing up, and what their actions are compared to what the electronic data is coming out of that POS–and hopefully they are going to match. If you see any anomalies in the data, then you can go back and watch what actually happened, which is very helpful in catching any improper actions, mistakes, or thefts.</p><p><br></p><p><strong><em>Q. Some thieves have learned to steal thousands of dollars by hacking and cheating slot machines. How can these incidents be avoided? </em></strong></p><p><strong>A. </strong>In 2009, virtually all gambling was outlawed in Russia, so the casinos there had to sell their slot machines to whoever would buy them. A lot of their machines wound up in organized crime groups. In 2011 the casinos in Europe started noticing certain brands of slot machines that were losing large amounts of money, but no physical cheating was noticed. That led to the theory that maybe the cheaters had figured out a way to predict slot machine behavior. </p><p>It was later discovered that cheaters were uploading footage of slot machines  to technical staff in Russia. Someone would analyze the video, calculate the machine’s spin pattern, somehow interfering with or being able to determine that slot machine model in their pseudo-random number generator, and send a reply back to the cheater. This information would set certain markers for their play, giving them a better-than-average idea of when the machines were going to hit. </p><p>In the United States, law enforcement investigations led to the arrest of one Russian national in California in a casino in July 2014 who was engaging in this sort of cheating. The FBI later indicted all four individuals involved in the ring. </p><p>To give you an idea of the potential losses, the Russian cheaters tried to limit their winnings to less than $1,000 per incident, but a four-person team working multiple casinos could earn upwards of a quarter of a million dollars a week. </p><p>While some responsibility falls on the slot machine manufacturing company, the basic protection effort is still on the casino surveillance and security personnel. It’s up to them to follow up with surveillance observations and review that slot machine play to see if there’s anything that does not match up with the daily slot exception reports, which highlight unusually large losses.  </p><p><br></p><p><strong><em>Q. We’ve seen armed robberies take place at gaming properties over the years, most recently at a casino in Manila where 36 people died. What is being done to combat those incidents? </em></strong></p><p><strong>A.</strong> Armed robberies in the industry are a concern; they don’t happen that frequently, but they are very troubling when they do. In June of this year in Gardena, California, two men followed a victim who had just won a large sum of money from a casino and rammed into the back of his vehicle to create an accident as he left the property. When he pulled into a gas station to look at the damage to his car, they robbed him of his cash winnings and shot him four times. Fortunately, the victim survived. </p><p>And then you have the shooting in Manila. It was an active shooter situation where 36 people died. The motive for that individual? Also robbery. How do we prevent things like that? It’s very difficult. Most of the robberies occur at night, and most of the casino hotels are so large they have multiple entrances and exits. </p><p>For cage [money-handling area] robberies, the training is, give the subjects the money, don’t cause any problems, and hit the holdup alarm when the robber leaves your window. And you want him to get away—you want him to get out of the property, especially if he is armed. We don’t want our security personnel to try to stop them. We notify law enforcement and let them handle it. </p><p>You need to look at the scheduling of your security staff during hours of darkness, and you may want to increase the external patrols during those times. If you have winners who have large amounts of winnings, you may want to encourage them to take a check rather than cash. If they decide to take cash, offer them an escort to their mode of transportation. Most of the time it’s their own personal vehicle, so offer them a security escort to their vehicle. </p><p>If properties don’t already do it, they may want to consider posting a security officer by the cage. A lot of casinos have security podiums for public relations and assistance for guests that are located by the cage and serve as a deterrent. And finally, you can use plainclothes officers to be on the lookout for any unusual activity.</p><p><br></p><p><strong><em>Q. How has the active shooter trend affected gaming security? Are more properties deciding to arm their guards? </em></strong></p><p><strong>A. </strong>One trend is that some gaming regulators are now requiring a copy of a licensee’s active shooter plan. The Mississippi Gaming Commission, for example, recently announced such a policy. Some casino companies are also considering arming some of their security force to be able to quickly react to an active shooter situation, if state law allows it. In many jurisdictions where gaming is a business, the state regulations do not allow security to be armed. </p><p>The approach has some pros and cons, and I would not disagree with any of my peers on what their decisions might be to protect their company. </p><p>Most active shooter situations are over in 11 minutes if it’s not a hostage situation, and in many cases first responders from law enforcement can’t get there that quickly. Sometimes they do, but if you had individuals on site, obviously their response would be much quicker. </p><p>Now your armed response team could contain and neutralize an active shooter, but they also have to be cognizant of what is lawful for a citizen’s reaction to such a violent situation. State laws pretty much dictate when deadly force can be used against an armed suspect. So if you’re going to arm these personnel, you have to be sure to operate within whatever your state law says about using deadly force on an individual.</p><p><br></p><p><strong>Q. What are the pros and cons of arming plainclothes officers?</strong></p><p><em>A. </em> If your armed security guards are in uniform, that could be a deterrent to an active shooter in and of itself. But if your armed officers are in plainclothes they can blend in with the customers, concealing the fact that they’re armed. One of the disadvantages of such a policy—and this is strictly my opinion—how are your law enforcement first responders going to be able to identify a plainclothes security officer as a friendly with a gun in his hand? For law enforcement personnel responding to an active shooter, their first goal is to neutralize that shooter. And if they come into a property and you’ve got one of your plainclothes security officers standing with a weapon, it’s quite possible they’re going to be neutralized by law enforcement, which is not good.</p><p>You also need to take a look at how your security personnel with weapons are trained to respond. This training has to be thorough, the policies and procedures must be able to withstand legal scrutiny. How are security personnel trained in the use of firearms? What’s the selection process for such officers? Are they retired or former law enforcement personnel, are they military personnel? Finally, what’s your lability if one of your security personnel accidentally shoots an innocent bystander in a situation like that? All these things must be considered when deciding whether to arm officers.   ​</p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Book-Review---Biosecurity.aspxBook Review: Biosecurity<p><em>Academic Press: Elsevier.com; 270 pages; $79.95.</em></p><p>Carole Baskin and Alan Zelicoff of the Institute of Biosecurity at St. Louis University bring together a distinguished list of contributors to deliver an outstanding overview of biosafety and biosecurity in <em>Ensuring National Biosecurity: Institutional Biosafety Committees. </em>Beginning with a historical perspective, it thoroughly examines the operational and regulatory challenges of biosafety and biosecurity within biomedical research.</p><p>Thirteen well-conceived chapters introduce the reader to the complexities of regulatory requirements imposed by the government, the institutional roles and responsibilities for biosafety and biosecurity, and best practices to ensure successful management of an institution’s biomedical research mission.</p><p>The content flows easily from the early beginnings of biosecurity to the present day and what lies ahead. Every contributor shares expertise and professional knowledge in an easily understandable manner. For example, Ryan Burnette and Nancy Connell characterize the importance of expanding the expertise of the Institutional Biosafety Committee to embrace biosecurity with the delivery of key bio and physical security training topics.</p><p>This book is recommended for everyone working in biosecurity and biosafety positions. It should be in bioresearch libraries, and managers should promote it as required reading. The book is that good. <em>Academic Press; Elsevier.com; 270 pages; $79.95.</em></p><p><em><strong>Reviewer: Mark A. Hammargren, CPP</strong>, is director of security for Texas Biomedical Research Institute. He has worked in the security industry for more than 35 years in both the public and private sectors and currently serves as regional vice president for ASIS Region 3C (Texas).</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465