Construction RecoveryGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652014-09-01T04:00:00ZSean M. Scoot; Reviewed by Mayer Nudell ​Heritage Communications Ltd;<br>172 pages; $19.95<br><br>The police, firemen, and other first responders have left, and you are taking stock of the emergency that has befallen you, your organization, or your family. What now? A Step-By-Step Guide to Disaster Recovery can help everyone prepare for and deal with such situations.<br><br>This compact, easy-to-use guide begins with the departure of the first responders and sets out the key considerations and pitfalls to be faced during recovery and reconstruction. Author Sean Scott brings more than 30 years of experience in construction and restoration to walk readers through the real world of “getting back to normal.” Chapters cover everything from insurance and choosing a contractor to trauma interventions, and an associated Web site provides tools, checklists, and templates for everything from home inventories to contractor questionnaires to lost pet posters. It is a comprehensive package that will help victims find a path to recovery without being victimized.<br><br>The publisher offers customization for use by agencies, corporations, universities, and other groups—for example, if an organization would like to have a custom cover and specific contact information added.<br><br> Reviewer: Mayer Nudell, CSC (Certified Security and Safety Consultant), is an independent consultant on crisis management and related issues. He is also an adjunct professor at Webster University and the coauthor of The Handbook for Effective Emergency and Crisis Management and No One a Neutral: Political Hostage-Taking in the Modern World. He is a member of ASIS.<br><br><br>

Construction Recovery Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition. by Design in Abu Dhabi Lessons Greening of Security Construct Better Security Lowers the Stakes Challenge of Making Safer Structures Buzz Over ZigBee Planning and Design: A Guide for Architects and Building Design Professionals

 You May Also Like... Top Five Executive Protection Challenges<div class="body"> <p> <strong>1. New landscapes.</strong> Protection agents must have knowledge well beyond security issues to give advice to their clients. Vectors such as cyberthreats and the ease of information sharing brought on by social media have added to the responsibilities of a protection agent. </p> <p> <strong>2. New players. </strong>The events of 9-11 led to lasting changes in the security industry as a whole. The protection field experienced a marked increase in private military and security contractors as these groups participated in paramilitary activities around the world. Flashing forward, drawdowns and sequestration activities have many of these professionals seeking to develop and refine new skills as they look for employment in the executive protection field. </p> <p> <strong>3. New targets. </strong>While any good advance tries to cover all aspects of the detail, there are some random events that contain a “black swan” element. For example, the Al Shabaab attack in Nairobi, Kenya, last September was unexpected in many ways. The Westgate Mall was known to be frequented by the expatriate community, making it a high-value target. It is difficult to protect against being at the wrong place at the wrong time, but planning and training help to mitigate issues. </p> <p> <strong>4. New environments.</strong> Activists have found a new voice via social media outlets. In addition to Facebook and Twitter, an ever increasing pool of apps such as Instagram, Vine, and Snapchat are becoming social media mainstays. Managing the social media bubble around the designate can also help set up a screen or cover for movements by sending multiple messages to draw attention away from your location. </p> <p> <strong>5. New skills. </strong>Protection agents have long been asked to play many roles—bodyguard, butler, travel agent, medic—and the toolbox is expanding even further. Appropriately merging these extra skills is what can turn an agent into a trusted advisor. Executive protection professionals may find themselves checking on dietary requirements, financial markets, and baseball scores to facilitate movement and keep the client focused. ​</p> </div>GP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465 Trends<p>​<span style="line-height:1.5em;">On June 9, the U.S. Department of Homeland Security’s (DHS) newly-created Countering Violent Extremism Subcommittee of the Homeland Security Advisory Council quietly released a report detailing the spread of violent extremist ideology in the United States and urging DHS to take significant action. Two days later, 29-year-old Omar Mateen, a U.S. citizen, walked into a nightclub in Orlando and killed 49 people, committing the nation’s worst terrorist attack since 9/11. During the hours-long attack on the nightclub, Mateen called police and pledged allegiance to ISIS, and subsequent investigations revealed he was self-radicalized. The horrific massacre on the night of June 11 reminded government leaders around the world that the real threat often comes from within the country’s borders. Within two days of its publication, the 38-page subcommittee report became exponentially more relevant.</span></p><p>The spread of violent extremism has been more palpable in Europe and the Middle East, where dozens of recent headline-grabbing attacks have occurred from Britain to Turkey. Shiite Muslims were targeted across the world by ISIS during the holy month of Ramadan: 45 people were killed in a suicide bombing at Istanbul’s main airport, a hostage situation in Dhaka resulted in the deaths of 23, and a truck bomb killed at least 250 people in Baghdad. France and Belgium are still reeling from separate coordinated soft target attacks that killed hundreds over the past year. </p><p>Not all extremist attacks are ISIS-inspired, either. A domestic terrorist who supported a far-right political party stabbed and killed Britain’s Labour MP Jo Cox in June.</p><p>An inquiry was released in July by a French parliamentary committee calling for more coordinated counterterrorism efforts, much like the DHS subcommittee report. The inquiry, which examined terrorist attacks in France last year, made 40 proposals to strengthen national security agencies. The nonpartisan committee encouraged the government to create a new national agency similar to the National Counterterrorism Center in the United States. Both European and American national security leaders are focusing on information sharing and addressing radicalization at its source.</p><p>“We are very concerned about violent extremists, lone offenders, and copycats, given how we understand that [ISIS] uses its propaganda, how it recruits, how it trains,” says Scott Breor, director of DHS’s Protective Security Coordination Division. “At the end of the day, while we may not have operatives per se here in the United States, we do know that [ISIS] is using the Internet and social media to recruit and train people who may have grievances against Western interests. They help them understand how to make devices that could be used in these attacks, and have been clear that they don’t need to travel overseas to be part of the [ISIS] machine, that the battlefield can be here in the United States.”</p><p>The subcommittee report does not shy away from detailing the significant, immediate threat violent extremism has on the United States, nor from calling on government officials, the technology and philanthropic sectors, and individual Americans to “conquer the challenge of violent extremism.” The subcommittee makes it clear that violent extremism is not just a problem for DHS.</p><p>“DHS itself is not equipped to counter violent extremism,” the report notes. DHS is significantly under-resourced to address online and offline radicalization and recruitment, and beyond recommending a budget increase of up to $100 million, the subcommittee emphasizes leveraging private sector support—and finances. The current budget “is insufficient to effectively counter the spread of violent extremist ideology in the United States, and does not in itself offer the chance to level—much less gain advantage against—increasingly aggressive efforts to recruit and radicalize our youth by violent extremist organizations,” according to the report.</p><p>The subcommittee is looking to the private sector for more than just money. Private sector talent and expertise should be used to create targeted online content to combat “a constant feed of reinforcing ideologies that are spread both on and offline.” The U.S. government must also work to extend counterterrorism efforts to the state and local levels, which have more direct impact on at-risk communities, the report notes. DHS leaders agree.</p><p>“Building bridges to the Muslim communities in this country and encouraging and helping American Muslim leaders to amplify the counter message to the Islamic state’s message and support these communities” is key to outreach at the local level, DHS Secretary Jeh Johnson tells Security Management. “I see it as a three-step mission: building bridges, counter message, and supporting these communities directly. I’ve been to a lot of them across the country. Everyone is different, but they are receptive to the message, and they’re almost always extraordinarily patriotic, too.”</p><p>Both Breor and DHS Assistant Secretary for Infrastructure Protection Caitlin Durkovich point to DHS’s Office for Bombing Prevention (OBP) as a way to empower local communities in preparing for a potential attack. The OBP enhances the nation’s ability to prepare for and respond to the use of explosives against critical infrastructure and local communities alike. The program’s resources and training are constantly evolving to stay a step ahead of terror trends, Durkovich tells Security Management. </p><p>“I think our adversaries are growing increasingly sophisticated and getting increasingly smarter in regards to how we do security,” Durkovich says. “I do think they have realized it’s a lot harder to attack a military installation or government building, and even some of these large public gatherings, because security is pretty robust. I think they have made a calculation that it is easier to target the smaller public gathering places and whether that is a crowded street of restaurants, a concert hall, or where people are gathering to get through security, you don’t have as much security in place. I think it is safe to say that these smaller and medium sized venues that don’t have in-depth security are becoming the targets because, candidly, it’s just easier to carry out an attack.”</p><p>One of the most important roles of the OBP is to bring together multiple jurisdictions in a community to raise awareness about the latest threats, Durkovich explains. “We talk about how they can plan both around special events and large gatherings to reduce the vulnerabilities of improvised explosive devices (IED), but equally important, if there is some sort of explosion or detonation, what the capabilities of each jurisdiction are, how they would respond, and who has the lead.” OBP training programs conducted around the country have already paid dividends, she says.</p><p>Breor notes that one of the most difficult—and important—aspects of the OBP is staying abreast of the latest bombing trends. “If you’ve ever picked up one of those books on how to do home improvements, how detailed they are with respect to pictures and the language they use, that’s the type of documentation that we see in these magazines that are out there in social media,” he says. “It is a great concern.” </p><p>Also of concern is the age of those most targeted by violent extremist efforts. The subcommittee report notes that millennials are by far the most susceptible to recruitment. “Our nation’s youth are at risk of online radicalization and recruitment like never before. They are by far the largest demographic being targeted by extremists, especially online. It is therefore our duty to protect them.”</p><p>ISIS supporters use approximately 46,000 Twitter accounts worldwide, and last year the Internet contributed to the radicalization of 83 percent of aspirants who attempted to travel to Iraq or Syria. On top of that, approximately half of successful travelers maintained an active presence on social media to encourage others to travel, document experiences, and share tips for evading law enforcement detection, the report notes.</p><p>Reaching millennials through constructive, positive, and identity-building approaches will encourage belonging with their American community, the subcommittee found. An emphasis on alternative narratives, from both the government and community influencers, is needed to reach millennials. “The private, non-governmental sector—including the full range of civil society across all communities, working hand-in-hand with leaders in science, faith, and technology—and with the full endorse-ment of our elected leaders at all levels offers the best chance to counter the threat of violent extremism for future generations,” the report states.</p><p>Another group targeted by ISIS and other extremist organizations is women of all ages. Professor and author Mia Bloom tells Security Management that ISIS targets Western and Arab women in two different ways: they give Western women the idea that they will have a very active, front-line role in ISIS, and tell Arab women that they will still be subservient, but will have more rights.</p><p>“Both of the underlying themes are about empowerment, but highly constrained empowerment, versus this false notion that they’re going to be some sort of superfighter,” Bloom says. ISIS also targets women based on their age and status—young women and students are recruited with positive messages of altruism, while older women with questionable pasts are offered a chance at reinvention. </p><p>ISIS is also using women to recruit other women because recruiters need to be able to relate to potential fighters, Bloom explains. “If you’re a 14-year-old girl, you’ve probably been warned to be careful of some dude on the Internet, but you may not have been warned about the cool 19-year-old Scottish girl.”</p><p>Women are rarely used on the front lines or as suicide bombers, Bloom notes: “If there’s a woman suicide bomber, it’s a one-off. It’s an exception to the rule,” she says. The primary contribution of women tends to be giving birth to fighters and raising them in a revolutionary environment. “Women in many ways are just like a commodity for ISIS, and although they are selling this message of empowerment, it’s actually the opposite,” Bloom explains.</p><p>Despite this, there has been a rise in non-Syrian or Iraqi women joining ISIS: the percentage of female extremists has risen from 10 percent a few years ago to 15 or even 20 percent today. And Bloom says that based on historical patterns, that number will continue to rise.</p><p>“They’re losing territory, they’re losing recruits, the men aren’t joining nearly as much, and they’re executing their own people who are leaving. That’s not a sign of strength,” Bloom explains. “When women join, it allows ISIS to goad men, it’s basically saying, ‘You aren’t especially manly because you’re letting women do your job.’”</p><p>It is possible that the role of women in ISIS would shift towards a more active one due to evolving tactics. “Women tend to be used in particular circumstances when groups shift from hard targets to soft targets and civilians,” Bloom explains. “When instead of trying to attack a tank, you’re going after a mosque of Shia parishioners, that’s where a woman comes into play. There are so many assumptions about the inherent peacefulness of a woman, and it’s popular to put an IED around a woman’s midsection and it looks like a late-term pregnancy.”</p><p>The subcommittee findings have been submitted to the DHS Homeland Security Advisory Council, and, if approved, will be sent to DHS Secretary Johnson for acceptance. In the meantime, agencies like the OBP are working to empower communities to prepare for and respond to attacks, and DHS leaders continue to encourage the public to embrace the See Something, Say Something mantra. “It’s not just a slogan, it’s really a shared responsibility in today’s environment,” Breor says.  </p>GP0|#21788f65-8908-49e8-9957-45375db8bd4f;L0|#021788f65-8908-49e8-9957-45375db8bd4f|National Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465 Training for Six Sigma<p>​</p><p>In early 2013, a multimedia entertainment company explored Six Sigma as a way to address access control concerns. Several members of the company’s security leadership were already familiar with Six Sigma, and they wanted to know how it might be used and implemented within a security environment.</p><p>While senior management believed that the security program could benefit from Six Sigma, their questions and concerns centered on how to implement the program. Executives requested that, regardless of the approach taken for implementation, various team members be trained, with the intent that the security department could eventually take on additional improvement projects.</p><p>The company chose a blended learning program, which incorporates different learning modes, is designed to appeal to different learning styles, and is engineered to meet the requirements of effectiveness, cost, and flexibility. Common components of a good model include interactive e-learning, classroom simulations, live and recorded web­inars, online or paper-based testing, one-on-one coaching, support structures such as study halls, interactive Six Sigma software tools, and reference sources.</p><p><strong>Getting Acquainted</strong></p><p>Although technically not part of the official training, the company decided to have an initial meeting on the project to provide an op­portunity for the trainer to understand the company culture. The meeting provided the security team with a chance to evaluate the personality and expectations of the trainer. The meeting was also used to codify the scope of the overall initiative, ask any questions, and discuss benefits and concerns.</p><p>Individuals within the company came to the meeting with varying degrees of buy-in, from skepticism to total acceptance. However, as ideas for applying Six Sigma began to develop and projects were of­fered for consideration, cotmpany employees agreed that several key security projects could benefit from using this methodology.</p> At the conclusion of the meeting, the company agreed to set up an e-learning program for each security team member.<br><p> <strong>E-learning</strong></p><p>For the e-learning portion of the blended training program, the company chose, which specializes in online Six Sigma training. Over several weeks, each security team member worked on the online beginner class, which provided a cost effective way to evaluate Six Sigma. Individuals worked at their own pace until completing the program. Each member’s progress was monitored via the Web by tracking online quiz results. Teleconfer­ences were held to support the e-learning, as well as to discuss pos­sible projects.</p><p>The subjects taught during the class included the DMAIC process, process mapping, measurement and basic statistics, understanding variation, and standardized work documentation.</p><p>One team member was given additional training and served as the Six Sigma project leader after the trainer left. The remaining team members stopped after the in­i­tial training.</p><p>The purpose for training each member at a basic level was to give all members an understanding of terminology as well as driving cultural change. The goal was not just to save money and improve quality on a project-by-project basis, but to create an en­vironment driven by data and measurements.</p><p><strong>Implementation</strong></p><p>As an initial project, the company chose to address access control issues. The overall problem was that security received a sig­­nificant number of access control alarms. When security responded to these alarms, they often found that the access control devices were malfunctioning. The data had been collected from the system audit reports that showed thousands of data points indicating various potential security breaches. However, security eventually responded to these alarms as if they were false, creating the potential for a real security incident to be ignored or handled poorly. Once the project was chosen, the Six Sigma project leader worked alongside the trainer to apply to the real world what had been learned in the online training class.</p> Applying the Six Sigma process, the company decided to work with the access control vendor and address each malfunctioning device. After this was completed, a maintenance schedule was de­vised to ensure that devices remained in good working order.<br><br><p> The accumulated data also revealed failures in access control points not associated with component failure. Other problems resulted from failures of system design and employee use, such as tailgating. These issues were addressed through reconfiguration of access control readers and training for nonsecurity employees.</p><p>Once those problems were addressed, remaining alarms were treated as potential breaches in security. With this in mind, security used Six Sigma methodology to devise a prioritization of responses for each access control point. The ranking considered the location of each access control point and what the security device was meant to protect. This led to the next project: identifying individual access rights.</p><p><strong>Goals</strong></p><p>The company’s goal was to reap ROI on the training and consultation services associated with the initial project, and to carry on with future projects without the need for outside consultation.</p><p>The access control project recouped 150 percent of the training and consultation costs. The cost savings were associated with wasted resources responding to false alarms or low-priority alarms, and the reduction in risk achieved when security was able to respond to actual incidents.</p> The company continued the Six Sigma program through the employee who was trained as a project leader. This ensured that the program, and the culture of continuous improvement, remained strong once the advisor and trainers departed.<br><br>GP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465