Thursday, January 29, 2009

Achieving Recognition as a Competent Security Manager

Security Management Stage 1 (Postgraduate University Accredited)

“The course is EXCELLENT content & procedure wise. A MUST for the Security Manager.” Corporate Security Manager, Manufacturing Company

9 – 20 March, Cape Town
23 March – 3 April, UK

http://www.arc-tc.com/pages/university_acredited_sm.asp#sm1

***


Security Management Stage 2 (Postgraduate University Accredited)

“The SM2 was challenging ….overall a very successful programme and highly recommended for security professionals..” Security Manager, Multinational Oil Company

10 – 20 February, UK

http://www.arc-tc.com/pages/university_acredited_sm.asp#sm2

***

Security Management Stage 3 (Postgraduate University Accredited)

“Excellent presentation of topics. Leant a lot, especially when focussing on the more strategic elements.” Security Manager, Logistics Company

9 – 20 February, Kuala Lumpur (Discounted Fee)
11 – 22 May, UK

http://www.arc-tc.com/pages/university_acredited_sm.asp#sm3

***
Security Coordination and Management

“Not only a learning experience, but one of the most enjoyable courses I’ve been on.”Company Fire Prevention & Security Manager, Manufacturer

23 – 27 February

http://www.arc-tc.com/pages/other_accredited_sm.asp#s1b

***

Investigating and Interviewing Skills

“An excellent course, that met my needs very well….. that is, to have sufficient understanding to conduct investigations, and to commission investigations by another party.”

2 – 5 March 2009


http://www.arc-tc.com/pages/accredited_investigation.asp#f1

For details on any ARC course, or to make a booking, contact Janet.

If you book a UK course before 31 January you will be entitled to a 10% discount.
Many more courses can be found at http://www.arc-tc.com/

Monday, January 26, 2009

Can You Be Sued for not Having Adequate Security?

The general assumption would be no, unless there is a statutory or legal requirement to do so. But lawyers representing the parents of a young man shot dead as he was closing a restaurant at a US retail and leisure complex last year think differently. They have filed a lawsuit alleging security negligence against the complex's owners. The complex, for its part, has responded with plans to upgrade its cameras to provide facial recording and number plate recognition.

This case raises some interesting issues for security professionals. Was the complex prior to the incident the subject of a security review, and was this carried out by a qualified (certified) security professional. The security profession is awash with individuals offering such services, but precious few are formally qualified to do this work.

In the case of litigation, where does the buck stop? With an establishment that contracts in an unqualified consultant to carry out a security review? Or with the consultant himself, or herself, in promoting professional services without professional certification?

In the UK, many leading security consultancy companies have foreseen this litigation exposure, and are busy getting their consultants professionally credentialed by undertaking either the ASIS CPP or PSP certification. For more information on how to certify as a security professional, contact David.

Sunday, January 25, 2009

Should IT Take over Physical Security?

As convergence drives CCTV to be not only multi-functional (delivering dynamic return on investment) but also IP-based, the debate is heating up over who should be leading on new CCTV projects.

Can the traditional hegemony of the security manager over all things CCTV - and all things physical security - be taken for granted, or should IT now lead on such projects? CCTV expert John Hononvich suggests that IT leadership may be a “when” and not “if”. And what then will be the implications for the traditional security manager as other IP-based physical security technologies emgerge (and converge!)

Read the online debate here and be prepared for some interesting viewpoints!
http://ipvideomarket.info/report/should_it_take_over_physical_security

Terrorism, Radicalisation and the Internet

Download the Chatham House report here:
http://www.chathamhouse.org.uk/publications/papers/view/-/id/656/

Recording Your Every Word.......

A visitor to the US Consumer Electronics Show (CES) this year reported that a number of booth personnel were wearing cameras on their chests that recorded video & audio of every person they talked to the entire day. The cameras had enough quality to pick up the names on the badges of the people they talked with. According to one booth occupant, the camera allowed him to focus on talking with the person and not wasting time getting his/her badge information.

Will we see this trend at security exhibitions? Will we even be able to detect the tiny buttonhole cameras? Should we lobby organisers of security exhibitions not to allow this potential threat to confidentiality?

Technology Focus: IP-Based Voice Communications

Security managers face an increasingly complex technological landscape in which a detailed technical knowledge is becoming ever more important to making sound decisions about the purchase of security equipment. Convergence and dynamic return on investment are key considerations.

One area that is increasing in complexity is that of the introduction of IP (internet protocol). Many security managers are now aware that return on investment for new IP CCTV systems can be achieved dynamically - and rapidly - by installing in parallel a business-wide voice over IP telephony system. The ROI is achieved by savings in telephony call charges.

VoIP telephony (replacing traditional packet-switched telephony with new IP-based telephony) is one application of this new technology, but VoIP extends far beyond telephony. Now, portable hand radios are becoming IP-based, in part or in whole, making it necessary for managers of security teams to make difficult purchasing decisions based often on a rudimentary understanding of the technology.

A recent article in Police Chief magazine, written by Motorola, goes some way to explaining the options available. See: http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=1634&issue_id=102008

Convergence and IP-based security systems are one of many subjects covered in the new Specifying Security Technology Course, 13-17 July 2009. For details go to: http://www.arc-tc.com/pages/other_accredited_sm.asp#s4 . The course will also be held in Dubai, 31 May – 4 June. Contact Janet for details.

Friday, January 23, 2009

Glossary of Crime Terms and Phrases

No guide to crime would be complete without definitions for all the terminology associated with all aspects of criminal activity, including statistics, descriptions of offences, punishments, the judiciary process, sentencing, law enforcement information and crime reduction strategies.
Here you'll find a complete A to Z of all the jargon you may come across when dealing with the subject, from phrases like "Absolute Discharge" to terms such as "Zombie", along with everything in between.

Click on:

http://www.intercrime.co.uk/glossary/

Wednesday, January 21, 2009

JI Trial Reveals Plans to Attack Singapore Airport

Mohammed Hassan, a Singaporean Jemaah Islamiyah (JI) member, has admitted during his trial in Jakarta that he had planned to hijack an aircraft in Bangkok and crash it into Singapore’s Changi Airport, according to global risk specialists Stirling Assynt. The scheme was, however, abandoned six years ago when Thai security agencies discovered it. Although by no means an indicator of current tactics, the admission nonetheless illustrates JI’s ambition to emulate the spectacular attacks of al-Qaeda.

Critical infrastructure nodes, especially those associated with transportation, remain a favourite terrorist target due to obvious spectacluar and disruptive consequences of an attack. The protection of critical infrastructure is addressed in the new ARC Training Course, Protecting Critical Infrastructure, 17-21 August 2009. For details go to: http://www.arc-tc.com/pages/other_accredited_sm.asp#s5

Kidnap Focus - SE Asia

Three International Committee of the Red Cross (ICRC) workers - a Filipino, a Swiss and an Italian national - were kidnapped by the Abu Sayyaf Group in Jolo, in the southern archipelago on 13 January,according to global risk consultants Stirling Assynt. The authorities are investigating whether their abduction was linked to the escape of thirteen inmates, including some ASG members, from a prison in Sulu on the same day.

Kidnap Risk Reduction and Response forms part of the postgraduate university-accredited Security Management Stage 3 Course, which takes place as follows:

Malaysia, 10-20 February
UK, 11-22 May

Contact Janet for more information.

Security Managers Start the New Year Running

ARC has welcomed a new group of security professionals to our rapidly growing family through their attendance on our Security Management Stage 1 Course, currently taking place in Bahrain. This, the first such course of 2009, involves security managers from a range of disciplines and business sectors who are either looking to improve their current ability or to start along the path of academic and security credibility by earning their MSc.

The delegates, from critical national infrastructure, finance, oil and gas, transportation and security operations sectors have been discussing the importance of risk analysis as an underpinning security principle and through their deep involvement in the course project, ‘Sumatran Tiger’, are exploring the multiple facets of security management and planning.

The group is attacking the course content with relish and Phil is looking forward to an excellent performance in the project and to presenting the delegates with their course certificates which will demonstrate their commitment and professionalism in a rapidly changing security environment.

Dates for forthcoming Security Management Stage 1 courses are:

South Africa, 9-20 March 2009
http://www.arc-tc.com/pages/reg_train.asp

UK, 23 March – 3 April 2009
http://www.arc-tc.com/pages/university_acredited_sm.asp#sm1

Contact Janet for details.

OSAC and the Terrorism Risk for US Business

Source: Security Director
Terrorism loomed as one of the top security concerns of 2008 for U.S. businesses, nongovernmental organizations and academic institutions operating overseas, according to private sector constituents of the Overseas Security Advisory Council. Terrorist attack against the United States and other Western interests in northern Africa, the Arabian peninsula, Afghanistan, Pakistan and Turkey have targeted not only U.S. government facilities and personnel, but in some cases U.S.-based businesses and non-governmental organizations, said Todd Brown, OSAC executive director and U.S. State Department Bureau of Diplomatic Security special agent.

For more go to: http://www.securitydirectornews.com/article/sd200901iBqTLT/OSAC:%20Terrorism%20main%20risk%20for%20private%20sector%20in%202008

Tuesday, January 20, 2009

Terrorism Monitor

A number of informative publications can be accessed free at the site of the US-based Jamestown Foundation:

http://www.jamestown.org/programs/gta/

Monday, January 19, 2009

Business Continuity: US Homeland Security Says Country Not Prepared for Pandemic Flu

The US Committee on Homeland Security released a majority staff report examining the nation’s state of preparedness and response capabilities in the event of a pandemic influenza outbreak. The report identifies current weaknesses and provides recommendations for what Congress, the incoming administration and the public and private sectors can do to achieve national readiness to combat this threat.

For more:
http://ehstoday.com/health/news/nation_not_ready_pandemic_flu_2244/

Sunday, January 18, 2009

Free-to-Download Security Management Resources

Sign up for free-to-download security management resources at:

http://www.arc-tc.com/extranet/login.asp

Excellent Reports and Views on Terrorism from LLoyds

An excellent collection of reports on terrorism and business can be downloaded from:

http://www.lloyds.com/News_Centre/360_risk_project/The_debate_on_terrorism_and_political_risk/Reports_and_views_on_terrorism.htm

What Makes a Cyber Criminal?

Cyber crime - internet banking and credit card fraud - is now the fastest growing sector of global organised crime, increasing at a rate of about 40% per year. With Brazil thought to have by far the largest number of cyber criminals, Misha Glenny, reporting for the BBC World Service's How Crime Took On The World, went to meet some of those trying to profit from the $100bn (£51bn) industry.

Read on here:
http://news.bbc.co.uk/1/hi/world/americas/7403472.stm

Friday, January 16, 2009

Biometrics Identification System News

First introduced about 15 years ago, biometrics systems are now rapidly being introduced as a means of identification and access control. As with the phenomenal expansion of CCTV, privacy concerns are being swept aside as the need for foolproof identity recognition systems becomes absolute. For the latest news on biometrics visit http://www.prosecurityzone.com/Customisation/News/Biometrics/


Biometrics is one of many subjects covered on the university-accredited Security Management Stage 1 Course, which has been attended by hundreds of security managers from literally all over the world.


Forthcoming Security Management Stage 1 dates include:

UK, 23 March – 3 April http://www.arc-tc.com/pages/university_acredited_sm.asp#sm1

South Africa, 9 – 20 March http://www.arc-tc.com/pages/reg_train.asp

For more information, contact Janet.

New Police Unit to Tackle Metal Theft

The UK Government has announced the setting up of a pilot specialist police unit to tackle the problem of scrap metal theft, which has increased by about 150% in the last two years and cost the UK around £360m.

London Train Passengers to Be Searched?

Passengers who buy a London train or tube ticket would automatically be giving their consent to be searched for knives and other weapons, under proposals now under consideration, according to the Guardian Unlimited. For the full story go to: http://www.guardian.co.uk/uk/2009/jan/13/knife-crime-police-gang-violence

Tuesday, January 13, 2009

Developing Your Security Management Skills

Security Management Stage 1 (Postgraduate University Accredited)

“The course is EXCELLENT content & procedure wise. A MUST for the Security Manager.” Corporate Security Manager, Manufacturing Company


18 – 29 January, Bahrain

9 – 20 March, Cape Town

23 March – 3 April, UK

http://www.arc-tc.com/pages/university_acredited_sm.asp#sm1

***

Security Management Stage 2 (Postgraduate University Accredited)

“The SM2 was challenging ….overall a very successful programme and highly recommended for security professionals..” Security Manager, Multinational Oil Company

9 – 20 February, UK

http://www.arc-tc.com/pages/university_acredited_sm.asp#sm2

***

Security Management Stage 3 (Postgraduate University Accredited)

“Excellent presentation of topics. Leant a lot, especially when focussing on the more strategic elements.” Security Manager, Logistics Company

9 – 20 February, Kuala Lumpur

11 – 22 May, UK

http://www.arc-tc.com/pages/university_acredited_sm.asp#sm3

***

Security Coordination and Management

“Not only a learning experience, but one of the most enjoyable courses I’ve been on.”Company Fire Prevention & Security Manager, Manufacturer

23 – 27 February

http://www.arc-tc.com/pages/other_accredited_sm.asp#s1b

***


Retail and Supply Chain Security Management

New Course - Conducted by Barry Vincent MSc, MA and Mike Goodman MSc - former heads of security with leading international retailers and specialists in supply chain and distribution

27 – 29 January

http://www.arc-tc.com/pages/other_accredited_sm.asp#s6

***

For details on any ARC course, or to make a booking, contact Janet.

Many more courses can be found at www.arc-tc.com

Retail Security Focus

Worsening economic conditions and job insecurity will undoubtedly lead to an increase in employee-perpetrated thefts in the retail sector. The ARC Retail and Supply Chain Security Management Course, 27-29 January 2009, aims to teach you the following:


- How to appreciate the key competencies required for security management in the retail sector
- To carry out security risk assessments appropriate to the retail sector
- To evaluate the importance of shrinkage and the impact that this has on the business
- To apply an analytical approach to inventory management
- To set KPIs and measure the effectiveness of security measures
- To explain in detail how theft and fraud affect their respective organisations
- To carry out a security review of their respective supply chains to ascertain vulnerabilities and exposures
- To develop appropriate approaches to mitigate risks, while demonstrating sensitivity to individual business cultures
- To appreciate how the law influences the application of security measures and responses
- To conduct a tender process and identify manned guarding and security service/product needs
- To write a business security plan

Delivered by two of the foremost retail security experts in the UK, both former senior managers with leading UK retailers, this three-day programme is sure to stimulate thought!
Contact Janet for more information.