Construction

 

 

https://sm.asisonline.org/Pages/Disaster-Recovery.aspxDisaster RecoveryGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652014-09-01T04:00:00ZSean M. Scoot; Reviewed by Mayer Nudell ​Heritage Communications Ltd; theredguidetorecovery.com<br>172 pages; $19.95<br><br>The police, firemen, and other first responders have left, and you are taking stock of the emergency that has befallen you, your organization, or your family. What now? A Step-By-Step Guide to Disaster Recovery can help everyone prepare for and deal with such situations.<br><br>This compact, easy-to-use guide begins with the departure of the first responders and sets out the key considerations and pitfalls to be faced during recovery and reconstruction. Author Sean Scott brings more than 30 years of experience in construction and restoration to walk readers through the real world of “getting back to normal.” Chapters cover everything from insurance and choosing a contractor to trauma interventions, and an associated Web site provides tools, checklists, and templates for everything from home inventories to contractor questionnaires to lost pet posters. It is a comprehensive package that will help victims find a path to recovery without being victimized.<br><br>The publisher offers customization for use by agencies, corporations, universities, and other groups—for example, if an organization would like to have a custom cover and specific contact information added.<br><br> Reviewer: Mayer Nudell, CSC (Certified Security and Safety Consultant), is an independent consultant on crisis management and related issues. He is also an adjunct professor at Webster University and the coauthor of The Handbook for Effective Emergency and Crisis Management and No One a Neutral: Political Hostage-Taking in the Modern World. He is a member of ASIS.<br><br><br>

Construction

 

 

https://sm.asisonline.org/Pages/Disaster-Recovery.aspx2014-09-01T04:00:00ZDisaster Recovery
https://sm.asisonline.org/Pages/21st-century-security-and-cpted-designing-critical-infrastructure-protection-and-crime-prev-0.aspx2014-05-01T04:00:00Z21st Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition.
https://sm.asisonline.org/Pages/security-design-abu-dhabi-0013246.aspx2014-04-01T04:00:00ZSecurity by Design in Abu Dhabi
https://sm.asisonline.org/Pages/hard-lessons-0010123.aspx2012-08-01T04:00:00ZHard Lessons
https://sm.asisonline.org/migration/Pages/greening-security.aspx2008-07-01T04:00:00ZThe Greening of Security
https://sm.asisonline.org/Pages/builders-contstruct-better-security.aspx2005-05-01T04:00:00ZBuilders Construct Better Security
https://sm.asisonline.org/Pages/cctv-lowers-stakes.aspx2005-04-01T05:00:00ZCCTV Lowers the Stakes
https://sm.asisonline.org/Pages/challenge-making-safer-structures.aspx2005-03-01T05:00:00ZThe Challenge of Making Safer Structures
https://sm.asisonline.org/Pages/buzz-over-zigbee.aspx2004-11-01T05:00:00ZThe Buzz Over ZigBee
https://sm.asisonline.org/migration/Pages/security-planning-and-design-guide-architects-and-building-design-professionals.aspx2004-06-01T04:00:00ZSecurity Planning and Design: A Guide for Architects and Building Design Professionals

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/21st-century-security-and-cpted-designing-critical-infrastructure-protection-and-crime-prev-0.aspx21st Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition.<div class="body"> <p> <em> <span style="font-size:small;"> <span style="font-family:arial;">CRC Press. Available from ASIS, item #2078; 954 pages; $120 (ASIS member), $132 (nonmember). Also available as e-book.</span> </span> </em> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">As good as the first edition of 21st Century Security and CPTED was, this second edition surpasses it. Atlas, known in security circles as a consummate professional, has done an outstanding job in creating this second edition, which has twice as much material as the original edition. It also includes voluminous references and hundreds of outstanding clarifying photos in both color and black-and-white. Using humor and candid insight he incorporates all the concepts of CPTED, including design, construction, security countermeasures, and risk management strategies, and merges them into a highly informative reference manual for security practitioners at every level.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">There is a logical flow to the book. It lays a solid foundation by discussing architecture and its intent, as well as environmental crime control theories and premises liability. There is something here for everyone as it also discusses terrorism and critical infrastructure from differing perspectives. Several chapters on problem solving provide guidance on conducting threat, risk, and vulnerability assessments.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Throughout, Atlas provides a roadmap for merging security and CPTED into management principles and practices in a wide variety of facility settings, including healthcare facilities, critical infrastructure, ATMs, office buildings, parking lots and structures, and parks and green spaces. The latter portion of the book is reserved for concepts including lighting, LEED and GREEN certification, workplace violence, signage, data capture and analysis, and conducting CPTED surveys.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Atlas has created the definitive book on CPTED and security. Despite the magnitude and complexity of the science and art of security management, he has done an outstanding job of merging these and other disciplines and concepts together into a cogent display of information that the reader should be able to apply in a wide variety of locations and situations. If you are only going to buy one book this year, it is strongly suggested you purchase this one. </span> </span> </p> <hr /> <p> <span style="color:#800000;"> <strong> <span style="font-size:small;"> <span style="font-family:arial;">Reviewer:</span> </span> </strong> </span> <span style="font-size:small;"> <span style="font-family:arial;"> Glen Kitteringham, CPP, has worked in the security industry since 1990. He holds a master’s degree in security and crime risk management. He is president of Kitteringham Security Group Inc., which consults with companies around the globe. </span> </span> </p> </div>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/top-five-executive-protection-challenges-0013240.aspxThe Top Five Executive Protection Challenges<div class="body"> <p> <strong>1. New landscapes.</strong> Protection agents must have knowledge well beyond security issues to give advice to their clients. Vectors such as cyberthreats and the ease of information sharing brought on by social media have added to the responsibilities of a protection agent. </p> <p> <strong>2. New players. </strong>The events of 9-11 led to lasting changes in the security industry as a whole. The protection field experienced a marked increase in private military and security contractors as these groups participated in paramilitary activities around the world. Flashing forward, drawdowns and sequestration activities have many of these professionals seeking to develop and refine new skills as they look for employment in the executive protection field. </p> <p> <strong>3. New targets. </strong>While any good advance tries to cover all aspects of the detail, there are some random events that contain a “black swan” element. For example, the Al Shabaab attack in Nairobi, Kenya, last September was unexpected in many ways. The Westgate Mall was known to be frequented by the expatriate community, making it a high-value target. It is difficult to protect against being at the wrong place at the wrong time, but planning and training help to mitigate issues. </p> <p> <strong>4. New environments.</strong> Activists have found a new voice via social media outlets. In addition to Facebook and Twitter, an ever increasing pool of apps such as Instagram, Vine, and Snapchat are becoming social media mainstays. Managing the social media bubble around the designate can also help set up a screen or cover for movements by sending multiple messages to draw attention away from your location. </p> <p> <strong>5. New skills. </strong>Protection agents have long been asked to play many roles—bodyguard, butler, travel agent, medic—and the toolbox is expanding even further. Appropriately merging these extra skills is what can turn an agent into a trusted advisor. Executive protection professionals may find themselves checking on dietary requirements, financial markets, and baseball scores to facilitate movement and keep the client focused. ​</p> </div>GP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Terrorism-Trends.aspxTerrorism Trends<p>​<span style="line-height:1.5em;">On June 9, the U.S. Department of Homeland Security’s (DHS) newly-created Countering Violent Extremism Subcommittee of the Homeland Security Advisory Council quietly released a report detailing the spread of violent extremist ideology in the United States and urging DHS to take significant action. Two days later, 29-year-old Omar Mateen, a U.S. citizen, walked into a nightclub in Orlando and killed 49 people, committing the nation’s worst terrorist attack since 9/11. During the hours-long attack on the nightclub, Mateen called police and pledged allegiance to ISIS, and subsequent investigations revealed he was self-radicalized. The horrific massacre on the night of June 11 reminded government leaders around the world that the real threat often comes from within the country’s borders. Within two days of its publication, the 38-page subcommittee report became exponentially more relevant.</span></p><p>The spread of violent extremism has been more palpable in Europe and the Middle East, where dozens of recent headline-grabbing attacks have occurred from Britain to Turkey. Shiite Muslims were targeted across the world by ISIS during the holy month of Ramadan: 45 people were killed in a suicide bombing at Istanbul’s main airport, a hostage situation in Dhaka resulted in the deaths of 23, and a truck bomb killed at least 250 people in Baghdad. France and Belgium are still reeling from separate coordinated soft target attacks that killed hundreds over the past year. </p><p>Not all extremist attacks are ISIS-inspired, either. A domestic terrorist who supported a far-right political party stabbed and killed Britain’s Labour MP Jo Cox in June.</p><p>An inquiry was released in July by a French parliamentary committee calling for more coordinated counterterrorism efforts, much like the DHS subcommittee report. The inquiry, which examined terrorist attacks in France last year, made 40 proposals to strengthen national security agencies. The nonpartisan committee encouraged the government to create a new national agency similar to the National Counterterrorism Center in the United States. Both European and American national security leaders are focusing on information sharing and addressing radicalization at its source.</p><p>“We are very concerned about violent extremists, lone offenders, and copycats, given how we understand that [ISIS] uses its propaganda, how it recruits, how it trains,” says Scott Breor, director of DHS’s Protective Security Coordination Division. “At the end of the day, while we may not have operatives per se here in the United States, we do know that [ISIS] is using the Internet and social media to recruit and train people who may have grievances against Western interests. They help them understand how to make devices that could be used in these attacks, and have been clear that they don’t need to travel overseas to be part of the [ISIS] machine, that the battlefield can be here in the United States.”</p><p>The subcommittee report does not shy away from detailing the significant, immediate threat violent extremism has on the United States, nor from calling on government officials, the technology and philanthropic sectors, and individual Americans to “conquer the challenge of violent extremism.” The subcommittee makes it clear that violent extremism is not just a problem for DHS.</p><p>“DHS itself is not equipped to counter violent extremism,” the report notes. DHS is significantly under-resourced to address online and offline radicalization and recruitment, and beyond recommending a budget increase of up to $100 million, the subcommittee emphasizes leveraging private sector support—and finances. The current budget “is insufficient to effectively counter the spread of violent extremist ideology in the United States, and does not in itself offer the chance to level—much less gain advantage against—increasingly aggressive efforts to recruit and radicalize our youth by violent extremist organizations,” according to the report.</p><p>The subcommittee is looking to the private sector for more than just money. Private sector talent and expertise should be used to create targeted online content to combat “a constant feed of reinforcing ideologies that are spread both on and offline.” The U.S. government must also work to extend counterterrorism efforts to the state and local levels, which have more direct impact on at-risk communities, the report notes. DHS leaders agree.</p><p>“Building bridges to the Muslim communities in this country and encouraging and helping American Muslim leaders to amplify the counter message to the Islamic state’s message and support these communities” is key to outreach at the local level, DHS Secretary Jeh Johnson tells Security Management. “I see it as a three-step mission: building bridges, counter message, and supporting these communities directly. I’ve been to a lot of them across the country. Everyone is different, but they are receptive to the message, and they’re almost always extraordinarily patriotic, too.”</p><p>Both Breor and DHS Assistant Secretary for Infrastructure Protection Caitlin Durkovich point to DHS’s Office for Bombing Prevention (OBP) as a way to empower local communities in preparing for a potential attack. The OBP enhances the nation’s ability to prepare for and respond to the use of explosives against critical infrastructure and local communities alike. The program’s resources and training are constantly evolving to stay a step ahead of terror trends, Durkovich tells Security Management. </p><p>“I think our adversaries are growing increasingly sophisticated and getting increasingly smarter in regards to how we do security,” Durkovich says. “I do think they have realized it’s a lot harder to attack a military installation or government building, and even some of these large public gatherings, because security is pretty robust. I think they have made a calculation that it is easier to target the smaller public gathering places and whether that is a crowded street of restaurants, a concert hall, or where people are gathering to get through security, you don’t have as much security in place. I think it is safe to say that these smaller and medium sized venues that don’t have in-depth security are becoming the targets because, candidly, it’s just easier to carry out an attack.”</p><p>One of the most important roles of the OBP is to bring together multiple jurisdictions in a community to raise awareness about the latest threats, Durkovich explains. “We talk about how they can plan both around special events and large gatherings to reduce the vulnerabilities of improvised explosive devices (IED), but equally important, if there is some sort of explosion or detonation, what the capabilities of each jurisdiction are, how they would respond, and who has the lead.” OBP training programs conducted around the country have already paid dividends, she says.</p><p>Breor notes that one of the most difficult—and important—aspects of the OBP is staying abreast of the latest bombing trends. “If you’ve ever picked up one of those books on how to do home improvements, how detailed they are with respect to pictures and the language they use, that’s the type of documentation that we see in these magazines that are out there in social media,” he says. “It is a great concern.” </p><p>Also of concern is the age of those most targeted by violent extremist efforts. The subcommittee report notes that millennials are by far the most susceptible to recruitment. “Our nation’s youth are at risk of online radicalization and recruitment like never before. They are by far the largest demographic being targeted by extremists, especially online. It is therefore our duty to protect them.”</p><p>ISIS supporters use approximately 46,000 Twitter accounts worldwide, and last year the Internet contributed to the radicalization of 83 percent of aspirants who attempted to travel to Iraq or Syria. On top of that, approximately half of successful travelers maintained an active presence on social media to encourage others to travel, document experiences, and share tips for evading law enforcement detection, the report notes.</p><p>Reaching millennials through constructive, positive, and identity-building approaches will encourage belonging with their American community, the subcommittee found. An emphasis on alternative narratives, from both the government and community influencers, is needed to reach millennials. “The private, non-governmental sector—including the full range of civil society across all communities, working hand-in-hand with leaders in science, faith, and technology—and with the full endorse-ment of our elected leaders at all levels offers the best chance to counter the threat of violent extremism for future generations,” the report states.</p><p>Another group targeted by ISIS and other extremist organizations is women of all ages. Professor and author Mia Bloom tells Security Management that ISIS targets Western and Arab women in two different ways: they give Western women the idea that they will have a very active, front-line role in ISIS, and tell Arab women that they will still be subservient, but will have more rights.</p><p>“Both of the underlying themes are about empowerment, but highly constrained empowerment, versus this false notion that they’re going to be some sort of superfighter,” Bloom says. ISIS also targets women based on their age and status—young women and students are recruited with positive messages of altruism, while older women with questionable pasts are offered a chance at reinvention. </p><p>ISIS is also using women to recruit other women because recruiters need to be able to relate to potential fighters, Bloom explains. “If you’re a 14-year-old girl, you’ve probably been warned to be careful of some dude on the Internet, but you may not have been warned about the cool 19-year-old Scottish girl.”</p><p>Women are rarely used on the front lines or as suicide bombers, Bloom notes: “If there’s a woman suicide bomber, it’s a one-off. It’s an exception to the rule,” she says. The primary contribution of women tends to be giving birth to fighters and raising them in a revolutionary environment. “Women in many ways are just like a commodity for ISIS, and although they are selling this message of empowerment, it’s actually the opposite,” Bloom explains.</p><p>Despite this, there has been a rise in non-Syrian or Iraqi women joining ISIS: the percentage of female extremists has risen from 10 percent a few years ago to 15 or even 20 percent today. And Bloom says that based on historical patterns, that number will continue to rise.</p><p>“They’re losing territory, they’re losing recruits, the men aren’t joining nearly as much, and they’re executing their own people who are leaving. That’s not a sign of strength,” Bloom explains. “When women join, it allows ISIS to goad men, it’s basically saying, ‘You aren’t especially manly because you’re letting women do your job.’”</p><p>It is possible that the role of women in ISIS would shift towards a more active one due to evolving tactics. “Women tend to be used in particular circumstances when groups shift from hard targets to soft targets and civilians,” Bloom explains. “When instead of trying to attack a tank, you’re going after a mosque of Shia parishioners, that’s where a woman comes into play. There are so many assumptions about the inherent peacefulness of a woman, and it’s popular to put an IED around a woman’s midsection and it looks like a late-term pregnancy.”</p><p>The subcommittee findings have been submitted to the DHS Homeland Security Advisory Council, and, if approved, will be sent to DHS Secretary Johnson for acceptance. In the meantime, agencies like the OBP are working to empower communities to prepare for and respond to attacks, and DHS leaders continue to encourage the public to embrace the See Something, Say Something mantra. “It’s not just a slogan, it’s really a shared responsibility in today’s environment,” Breor says.  </p>GP0|#21788f65-8908-49e8-9957-45375db8bd4f;L0|#021788f65-8908-49e8-9957-45375db8bd4f|National Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465