Monday, August 23, 2010

Developing Your Security Management Potential

Already this year, literary hundreds of security managers have studied security management with the ARC Training International Academy for Security Management. For the full-time security management professional ARC offers two options: university-accredited, interactive and highly-participatory security management courses - which can lead into an option to work towards an MSc Professional Practice in Corporate Security Management - or preparation courses for the ASIS CPP and PSP certifications.

Forthcoming university-accredited (postgraduate NQF Level 7) courses include (clickable links):

Security Management Stage 3, 6-17 September
Security Management Stage 2, 11-22 October
Security Management Stage 1, 15-26 November

For those who are required to conduct investigations, ARC can offer the following:

Investigating and Interviewing Skills, 25-28 October

If your work requires you to survey, the very practical (site-based) Security Surveying and Design Course, 20-24 September, is recommended.

If you have reached the pinnacle of security management, or have completed Security Management Stages 1-3, have a security management degree, or CPP, challenge yourself to participate in the very practical one-week BurrillGreen Masterclass in Strategic Security Management, 4-8 October, where you will be put through your paces across a range of “board engagement” scenarios under the guidance of two former multinational corporate heads of security. A unique opportunity – a unique challenge.

As always, Janet will be happy to provide all the details of any of the above programmes.

Kidnap – The Hostage Survival Guide

Source: The Discovery Channel

8,000: the number of annual worldwide kidnappings.
$5,000-100 million: the range of individual ransom demands.
$500m: the annual global takings of the kidnap industry.
100%: the increase in kidnapping around the world in the last six years.
90% of kidnap victims are locals not foreigners.
21%: the number of hostages in Latin America who survive rescue attempts.
11% of kidnap victims are released without a ransom being paid, either through negotiation or because the abductors realise that no-one’s going to pay up.

For more go to: http://www.yourdiscovery.com/crime/kidnapandrescue/avoidance/index.shtml

Kidnap and Ransom: Initial Responders Course – November 2010

Delivered by red24 on behalf of ARC, this two-day course will provide you with a high level of practical skills and theoretical knowledge needed to act confidently, objectively and effectively when protecting the physical integrity of your people and to provide you with the skills to act effectively as a ‘first responder’ if a kidnap or extortion event affects your organisation.


Course leaders:


Dr Rob Kennett MBE Former Deputy Head Metropolitan Police Hostage and Crisis Negotiation Unit.

Peter Young MBE Former UK police expert in hostage, kidnap and crisis situations. Helped develop the Serious Organised Crime Agency (SOCA) Anti Kidnap and Extortion Unit (AKEU), working closely with the business sector. Currently advises worldwide on kidnap and crisis management.

For more information email Janet.

Friday, August 20, 2010

Managing Security Risks in the Oil and Gas Sector

ARC’s second annual Managing Security Risks in the Oil and Gas Sector Course has been a very successful event for the 11 delegates attending. Represented were some of the biggest oil and gas enterprises from Angola, Kazakhstan, Nigeria, and Pakistan, as well as the UK nuclear power industry, which shares some of the key point concerns of its critical infrastructure partners in oil and gas.

The course covered security risk analysis, community engagement and human rights, activism, managing militancy and terrorism, oilfield and pipeline security, offshore security, refinery security and retail security, and culminated in a project in which delegates presented a five-year strategic security plan for a notional oil and gas project.

Next year’s Managing Security Risks in the Oil and Gas Sector Course will take place 18-22 July 2011, immediately following the Security Management Stage 2 Course, allowing delegates to take advantage of a specially discounted package to attend both courses. For more details, contact Janet.

Maritime Security and Choke Points - The Mystery of the M-Star

Choke points are narrow waterways through which vital maritime trade passes, and as such are attractive to terrorists wishing to cause disruption and economic damage. The points include (but are not limited to):

The Malacca Straits
The Straits of Hormuz
The Bosphorus Strait
The Suez Canal
The Panama Canal

There is much debate surrounding what happened to the Japanese tanker M-STAR in the Straits of Hormuz on 28 July 2010. The vessel, laden with 200,000 barrels of oil, was travelling to Japan via the Straits of Hormuz, when there were reports of an external explosion, causing a large dent in the side of the vessel.

For conflicting accounts of the attack, go to the following links:

http://www.seatradeasia-online.com/News/5937.html

http://www.stratfor.com/analysis/20100804_dispatch_ongoing_questions_m_star_case

Security Managers Now Surpassing all Previous Records


Typical of comments following the recent Security Management Stage 1 Course were:

“One of the most enjoyable courses I have attended”.

“It was an extremely rewarding course”.



So how do we maintain the quality of our courses?

Delegates Assess Trainers: Of the 26 delegates who have attended the two recent postgraduate-accredited, core-skills Security Management Stage 1 courses, 25 students rated the course as “excellent” and 1 student rated it as “good”. This typifies the feedback on what is now the world’s most popular course in security management, which has been undertaken by hundreds of security managers worldwide.

Trainers Assess Delegates: The number of delegates achieving a Distinction grade in the end-of-course examination has risen for each of the past five years. This year over 80% of delegates have achieved this; a significant feat considering the examination is closed book, and Distinctions are awarded only to those delegates who score 90% and over!

ARC Training - Securing Your Success!

For details of the Security Management Stage 1 Course click here, or contact Janet.

Web Attack Knows Where You Live

Source: BBC

One visit to a booby-trapped website could direct attackers to a person's home, a security expert has shown. The attack, thought up by hacker Samy Kamkar, exploits shortcomings in many routers to find out a key identification number. It uses this number and widely available net tools to find out where a router is located. Demonstrating the attack, Mr Kamkar located one router to within nine metres of its real world position.

IT and Information security is covered in depth on the postgraduate accredited Security Management Stage 1 Course, a core-skills security management programme undertaken by over 100 security professionals worldwide every year.

For details of the course, click here, or contact Janet.

Is There a Role for Private Security Industry in the United Kingdom’s Strategy for Countering International Terrorism

Email received from Corneius Wussah:

I am currently working on my MSc Dissertation and will require assistance to help complete my questionnaire via the ARC community. The topic of my Dissertation is, "Is there a role for private security Industry in the United Kingdom’s Strategy for Countering International Terrorism (CONTEST)?"

If possible, I would be very grateful if you forward the questionnaire link below to my colleagues via your ARC alumina and mailing list.


http://www.surveymonkey.com/s/P2H22K7

10th ASIS International European Security Conference & Exhibition, 2011

The 10th ASIS International European Security Conference & Exhibition will take place in Vienna, April 3-6, 2011. The call for presentations is now open. Outside the US, this is probably the best security management conference in the world, and ARC would be delighted to see you there.

Monday, August 2, 2010

Coordinating Security in Nigeria

“Nearing the end of their Security Coordination and Management course in Lagos, Nigeria, these delegates ponder over the details of the final exercise, preparing for their management presentations the next day. Representing a wide range of security functions, their roles include personnel protection, field operations, administrative and general security management. This group graduate on Friday 30th July.”

Friday, July 23, 2010

Credit Card Fraud - The Hotel Risk

One of the points raised in the Business Travel Workshop which takes place as part of Security Management Stage 2 is the risk of business executives on assignment overseas having their credit cards compromised and then being arrested and missing their flight because they do not the funds to pay for their hotel bill. Ironically, it may be hotel which is the source of the card details compromise!

http://www.nytimes.com/2010/07/06/business/06road.html?_r=2

Even ARC’s MD, David Cresswell, has had his business credit card cancelled by the issuer while abroad, due to suspected fraud on his account. To add insult to injury, he was then the next day stranded overseas by the Iceland volcano! He avoided languishing in a Spanish jail because he had personal credit cards with him as a precaution. The best advice is to instruct all overseas travellers to take more than one card, keeping one for emergencies only.

The next Security Management Stage 2 Course takes place in the UK, 11-22 October 2010. Click here for details, or email Janet.

Thursday, July 8, 2010

Time to Get Your Masters Degree in Security Management

If you have completed Security Management Stages 1-3 now is the time to get your post-course tasks submitted to David if you wish to be eligible for the university September intake. David will be compiling the list of September distance learning entrants later in July. If you think you can be ready in time, please contact David immediately.

The next university intake will be in January.

Bringing University-Accredited Security Management Training to You

Postgraduate university-accredited courses such as Security Management Stage 1 have now been delivered in over 10 different countries, in Europe, The Middle East, The Indian Subcontinent, SE Asia, and Africa.

Sometimes the courses are conducted as “open” in conjunction with local partners, and other times they are arranged directly with a specific client. Either way, you can be assured that the courses are run to the same high standard by the same, fully-qualified security management trainers you will be familiar with from our UK courses.

To discuss how we can bring such training to your company, or country, contact David.

ASIS Physical Security Guideline

The ASIS Facilities Physical Security Measures Guideline identifies the main physical security measures that can be applied at facilities to safeguard or protect an organization’s assets—people, property, and information. It outlines eight main categories of physical security measures used to protect facilities: physical barriers; physical entry and access control; security lighting; intrusion detection systems; video surveillance; security personnel; security policies and procedures; and crime prevention through environmental design (CPTED). The emerging field of security convergence is also addressed.

All ASIS Standards and Guidelines can be downloaded from the ASIS Bookstore.

Physical Security is covered in detail on the core-skills, university accredited Security Management Stage 1 course. For details click here or email Janet.

The World Economic Forum Has Published Its Fifth Annual Global Risks Report

By consulting a group of experts and academics across the world throughout the year and relaying their findings in this annual report, Global Risks 2010 seeks to provide political and business leaders with a framework for further discussion of a risk landscape that is ever more complex and urges a consideration of the longer term, global implications of risks in areas beyond their immediate focus.

The report can be downloaded from http://www.weforum.org/en/initiatives/globalrisk/Reports/index.htm or by emailing David.

This report is one of a number of risk management publications that will be examined in the Corporate Risk Management session of the strategically-focussed Security Management Stage 3 Course, 10-21 May 2010. For course details go to http://www.arc-tc.com/pages/university_acredited_sm.asp#sm3 or email Janet.

Wednesday, July 7, 2010

A Timely Reminder about the Insider Threat

A British Airways worker was arrested in March on suspicion of raising funds for a terrorist attack. The alleged plot to raise funds for a terrorist attack – possibly on an airline – is thought to have been uncovered following a tip-off.

The employee was among 800 staff dealing with passenger bookings in one of BA’s two UK-based call centres. Staff can access to details of thousands of flights and are familiar with basic security procedures.

A useful guide on how to manage the risk of insider threats can be obtained from the website of the the UK's Centre for the Protection of National Infrastructure.

To access the document, click here.

Monday, July 5, 2010

Choosing the Right Lens for Your CCTV Camera


Courtesy of Boundary Surveillance Ltd

One of the difficult problems when setting up a CCTV system is choosing the right lens for your cameras as different lenses give different fields of view, and different levels of zoom. Some of the higher-end lenses also offer features such as Auto-Iris, and manual zoom/focus adjustment. Choosing the wrong lens can lead to a camera monitoring too small an area, or conversely not having enough zoom to capture events with clarity.

CCTV is covered in detail on the postgraduate-level university-accredited Security Management Stage 2 course. The next course takes place in the UK 11-22 October 2010. for details click here for the ARC website or contact Janet.

Friday, July 2, 2010

How to Earn the MSc Professional Practice in Corporate Security Management

Many of the delegates attending the Security Management Stage 2 course presently are actively working towards a Masters degree in Professional Practice in Corporate Security Management. The knowledge input for the degree is delivered on Security Management Stages 1-3, which constitute three accredited modules out of the total 6 that make up the degree.

On successful completion of Security Management Stages 1-3, delegates then enrol as distance learning students of Middlesex University with which they undertake a transitional module, then a research proposal, and finally a 12,000 word dissertation.

Roger Coutain, BP Trinidad and Tobago, is the first ARC delegate to be awarded his degree.

For more on the scheme, contact David.

Security Scanners at Airports - Use Set to Increase

Security Scanner is the generic term used for a technology that is capable of detecting objects carried under clothes. Several forms of radiation differing in wavelength and energy emitted are used in order to identify any object distinct from the human skin.

In aviation Security Scanners could replace walk-through metal detectors (capable of detecting most knives or arms) as means of screening passengers because they are able to identify metallic and non-metallic objects including plastic and liquid explosives.

When a Security Scanner clears a person, in principle no further searches or screens are necessary. Today walk-through metal detectors' weakness in identifying non-metallic items require screeners to undertake full body hand searches in order to achieve comparable results, as was demonstrated on 25 December 2009, when a passenger attempted to blow up Northwest Airlines flight 253 from Amsterdam to Detroit with explosives hidden on his body.

Security Scanners are controversial, in both their need to expose passengers to radiation, and their ability to see the body form under clothing, and the European Commission has reported on this issue to the European Parliament. To access the full report, go to:

http://ec.europa.eu/transport/air/security/doc/com2010_311_security_scanners_en.pdf

Thursday, July 1, 2010

New Maritime Security Magazine and Association


Letter from Peter Cook, former delegate on Security Management Stage 2......

David,

I was a student of yours when I did the Security Management Stage 2 Course and Fraud course with Chris Taxis in July 2007. I have moved on and I am now an Independent Maritime Security Consultant. I am in the process of setting up the Security Association for the Maritime Industry (SAMI) and as part of that we are publishing a magazine focused on maritime security (attached, with links below).

http://www.em-defence.com/PDFs/Maritime_Security_Special.pdf

http://content.yudu.com/Library/A1n71t/MaritimeSecuritySpec/resources/index.htm?referrerhttp://www.yudu.com/item/details/141342/Maritime-Security-Special-

Intruder Alert: 'Smart Dew' Will Find You!

A remarkable invention from Tel Aviv University — a network of tiny sensors as small as dewdrops called "Smart Dew" — will foil even the most determined intruder. Scattered outdoors on rocks, fence posts and doorways, or indoors on the floor of a bank, the dewdrops are a completely new and cost-effective system for safeguarding and securing wide swathes of property.

For more information, go to: http://www.physorg.com/news157288786.html

Tuesday, June 29, 2010

ARC’s Biggest Course is Underway


Security managers from a wide range of industries have joined together to attend the Security Management Stage 2 course currently being held in Goring-on-Thames in the United Kingdom. These 30 security professionals make up the biggest course of any kind that ARC Training has run to date.

This number of delegates brings both advantages (a wide range of experience and knowledge) and challenges (how do you get 30 security managers in one room to watch Brazil vs. Chile World Cup football after work?).

With representatives from a wide range of industries, government bodies and NGO’s coming from countries as far apart as Brazil and Pakistan, this group presents superb opportunities for interchange of ideas and opinions and, ultimately, a great learning opportunity. Amongst the languages on the course are: Portuguese; German; Arabic; Ibo; Swahili; Russian; Kazakh; Polish; Hausa; English; Dutch; French; Urdu; Kalabari; Afrikaans and Shona. And yet, everyone shares the same goals – to improve their professional security skills. The course is being led by Barry Vincent MA, MSC and Peter Horsburgh CPP, PSP

UK Threat Assessment of Organised Crime

This very detailed report, covering how organised criminal networks are structured, drug smuggling, people smuggling, fraud, firearms, technology enabled crime, illegal migrant workers, organised vehicle crime and emerging threats, can be downloaded from http://www.soca.gov.uk/threats/organised-crime-groups.

The report is packed with valuable data that can help inform a corporate security risk assessment programme.

Workplace Crime Prevention is one of 15 subjects covered on the Security Management Stage 1 Course, a university-accredited programme conducted several times a year around the world by the ARC Training International Academy for Security Management.

The next Security Management Stage 1 Course takes place in the UK, 2-13 August 2010. Already attended by almost a thousand security professionals worldwide, details of this very popular course can be found at http://www.arc-tc.com/pages/university_acredited_sm.asp#sm1, or by emailing Janet.

Managing Security in Outsourced and Offshored Environments

If you need a working knowledge of the security management issues surrounding outsourcing and off-shoring of information processing and management systems,a guideline from BSI may be what you are looking for:

http://shop.bsigroup.com/en/ProductDetail/?pid=000000000030207795

Even if you have no prior knowledge of the subject, the focus of this British Standards book on the practical along with the specialist aspects of security management will give you a firm grounding in outsourcing solutions.

Information and IT Security Management is covered in a one-day workshop, 9 August and 22 November. Contact Janet for details. If you are a CPP seeking recertification credits, ask for discount.

Explosives Detection

When selecting a portable explosives detector, do ensure you choose a model capable of detecting the now widely-used home-made high explosive TATP, such as:

http://www.dpl-surveillance-equipment.com/19021792200.html

Anything less may leave you perilously exposed if you are at elevated risk of being the target of a terrorist bomb.

The company featured in this link is not specifically endorsed by ARC. The purpose is to bring your attention to the equipment only.

Which Country Has the Highest Murder Rate, Lebanon or Northern Ireland?

The answer can be found at http://www.guardian.co.uk/news/datablog/2009/oct/13/homicide-rates-country-murder-data

Monday, June 28, 2010

Security Experts Gather in Nairobi


Security experts from power distribution, telecommunications, government and banking have gathered in the Kenyan capital Nairobi to attend the core skills Security Management Stage 1 Course under the guidance of David Cresswell.

Although many of the participants are from policing and military backgrounds, most have not previously attended formal security management training, and expectations are high. During the first session - security risk management - participants engaged actively, enthusiastically applying the basic principles of risk analysis and management to their individual work situations.

Many of the delegates are keen to attend further courses in security management and to eventually work towards the ARC/Middlesex University MSc Professional Practice (Corporate Security Management).

The next Security Management Stage 1 Course takes place in the UK, 2-13 August. For details contact Janet or go to http://www.arc-tc.com/pages/university_acredited_sm.asp#sm1

Thursday, June 24, 2010

Enhance Your Prospects as a Security Professional

For the full-time security management professional ARC offers two options: university-accredited, interactive and highly-participatory security management courses - which can lead into an option to work towards an MSc Professional Practice (Corporate Security Management) - or preparation courses for the ASIS CPP and PSP certifications.

Forthcoming university-accredited (postgraduate NQF Level 7) courses include (clickable links):

Security Management Stage 1, 2-13 August
Security Management Stage 2, 11-22 October
Security Management Stage 3, 6-17 September

For those who are required to conduct investigations, ARC can offer the following:

Investigating Fraud in the Workplace, 20-22 July
Investigating and Interviewing Skills, 25-28 October


If your work requires you to survey, the very practical (site-based) Security Surveying and Design Course, 20-24 September, is recommended.

If you are specifically interested in security risk mitigation in the oil and gas sector, then you should consider the Managing Security Risks in the Oil and Gas Sector Course, 16-20 August.

Finally, if you have reached the pinnacle of security management, or have completed Security Management Stages 1-3, have a security management degree, or CPP, challenge yourself to participate in the very practical one-week BurrillGreen Masterclass in Strategic Security Management, 4-8 October, where you will be put through your paces across a range of “board engagement” scenarios under the guidance of two former multinational corporate heads of security. A unique opportunity – a unique challenge.

As always, Janet will be happy to provide all the details of any of the above programmes.

ARC Celebrates its First Middlesex University MSc Graduate

Congratulations to Roger Coutain, Manager - Security & Crisis Management for BP Trinidad and Tobago LLC, for being the first ever ARC student to graduate from Middlesex University with the award of the MSc Work-Based Learning Studies (Corporate Security Management). Roger has just been informed that he has been awarded a merit grade, which is a terrific achievement.

Security Management Stages 1-3 constitute a pathway towards this degree - now renamed MSc Professional Practice (Corporate Security Management). For more information contact Janet.

We are eagerly waiting to see who graduates next.....

Can You Guess How Many Security Professionals Are Attending the Forthcoming Security Management Stage 2?

So large is the forthcoming Security Management Stage 2 Course beginning next Monday that, for the first time ever, it will actually be two courses, conducted by Barry Vincent MA MSc, and Peter Horsburgh CPP PSP. No less than 30 delegates from all over the world are expected to arrive on Monday 28 June for this very popular two-week advanced training programme.

ARC's First Security Management Stage 1 Course in Kenya

David Cresswell will be travelling to Africa this weekend where he will, for the next two weeks, be conducting ARC’s first ever Security Management Stage 1 Course in Kenya, in conjunction with ARC’s Southern Africa partner AMC International. The course, attended by 13 delegates, will include nationals from Kenya, Zimbabwe and Rwanda.

How to Dramatically Increase Your Chances of Passing the ASIS CPP and PSP Certifications

Almost all candidates who follow the ARC preparation courses for the ASIS CPP and PSP certifications pass the examination first time. A recent candidate comment reflects the type of support that we can provide in helping you pass these difficult examinations:

I would like to thank you for a great course and am sure I would not have passed if it wasn't for your patience and teaching.”

For more information on how to become an ASIS-board certified security professional, contact David.

Convert Your CPP or PSP into a University Postgraduate Certificate

ARC hopes to be able to announce in the near future a partnership whereby those security professionals who are ASIS-board certified (CPP or PSP) will be able to “convert” their award into a university postgraduate certificate in security management or security design. More details to follow as they are worked out. Contact David.

Tuesday, June 1, 2010

Congratulations


Congratulations to Richard Bird PSP, who successfully passed the ASIS Physical Security Professional Certification this week. Richard joins an elite group of less than 1,000 security professionals worldwide who are “board certified” in the specification of physical security systems. For more information on how to become Board Certified in Security Management or Board Certified in Security Systems Specification, contact David.

Friday, May 28, 2010

We Aim to Please

Recent email....











(Yes, she is!!)

Tuesday, May 18, 2010

RIBA Guidance on Designing for Counter Terrorism

The Royal Institute for British Architects has produced guidance on designing in counter-terrorism security measures. This is an important document for security managers involved in the project management of new builds in an environment where terrorism is a risk.

The document can be downloaded from:

http://www.architecture.com/Files/RIBAHoldings/Communications/Press/General/RIBAguidanceoncounterterrorism.pdf

Case Study - Security Awareness Training

Company x is a world-leading global technology and controls group operating in the areas of industrial automation, rail transportation and appliance controls.

Recently, a new corporate security director was hired, and his first task was to create a global security management system. Effective security management systems depend more on people and less on physical controls, and so the need for awareness training and staff engagement was quickly identified. Taking the core security principles developed by the corporate security director as a basis, David Cresswell has written a two-day training programme.

After a successful roll-out in Spain in April, David is now in Missouri, USA, to conduct a second programme for company EHS&S leaders from the USA and Mexico.

Call for Presentations for ASIS ME Conference 2011 (20-22 February 2011, Bahrain) and ASIS Europe Conference 2011 (3-6 April, 2011, Vienna) Now Open

If you would like to participate as a speaker, click on the link below:

http://www.asisonline.org/education/programs/callForPresentations.xml

Taking One Step Ahead

During the recent earthquake in Haiti, a little called Ornichléel, daughter of a colleague of former-ARC student Bob Craft, lost her leg. Now Bob is helping her and her family on the road to recovery.

As recent delegates to ARC courses will know, we now have a charity box and are raising funds to help Ornichléel re-establish some form of normal childhood.

Left is the latest picture of Ornichléel, who this week is in New York with organisation “A Step Ahead” having her artificial leg fitted. The trip, and the new leg, is paid for by people such as you, who donate generously to the charity box during courses.

As she grows into an adult, Ornichléel will need artificial leg replacements, and with your help we plan to continue supporting her throughout her transition into adulthood.

For more on "A Step Ahead" and Ornichléel, go to http://www.astepaheadonline.com/

Monday, May 17, 2010

The Bribery Act 2010 - Time to Revise Your Procedures?

The Bribery Act 2010 has been introduced in the UK to provide a new, modern and comprehensive scheme of bribery offences that will enable courts and prosecutors to respond more effectively to bribery at home or abroad.


The Act:

- Creates two general offences covering the offering, promising or giving of an advantage, and requesting, agreeing to receive or accepting of an advantage

- Creates a discrete offence of bribery of a foreign public official

- Creates a new offence of failure by a commercial organisation to prevent a bribe being paid for or on its behalf (it will be a defence if the organisation has adequate procedures in place to prevent bribery)

- Requires the Secretary of State to publish guidance about procedures that relevant commercial organisations can put in place to prevent bribery on their behalf

Security managers working for UK companies should ensure that relevant procedures and guidance are in place for all employees. For more information, go to: http://www.justice.gov.uk/publications/bribery-bill.htm

The Role of Resilience in an Increasingly Uncertain World

Looking at enterprise risk in an holistic way is a key theme of the Security Management Stage 3 Course, currently underway at the ARC Training International Academy for Security Management.

Enterprise risk management offers a framework for considering sources of uncertainty that could impact on an organisation’s strategic objectives regardless of source. An ERM process will therefore identify uncertainty which may derive from broad trends, as well as distinct unexpected trends which are addressed in parallel by business continuity management.

By combining both ERM and BCM, the organisation may be able to create a more holistic approach to building resilience. After all, resilience is defined as the ability of a body to return to its original form following deformation – in effect, bouncing back following adversity. Proactively, a combined ERM/BCM approach creates a readiness to respond and adapt to changing circumstances.

For more on this approach, email David for a pdf article entitled “The Role of Resilience in an Increasingly Uncertain World”.

ASIS Announces Middle East Security Conference 2011

ASIS International has announced that the 2nd Middle East Security Management Conference will take place in Bahrain, 20-22 February 2011.

This is a perfect opportunity for Middle East “graduates” of ARC Training courses to take centre stage and present best practice to their peers. Details on how to submit an abstract for presentation can be found at http://www.asisonline.org/education/programs/bahrain/default.htm

Learning How to Develop Security Strategy

Week 2 begins for the 11 delegates studying strategic security management concepts on the Security Management Stage 3 Course. This course not only prepares delegates for a more strategic security management role, but is also the final classroom stage for a several members of the group working towards their security management Masters degree with Middlesex University.

As expected, a course of this nature is designed to stretch participants’ knowledge and to develop abilities in areas such as enterprise risk management, external liaison, stakeholder engagement, the security considerations of business expansion into new regions, security and corporate social responsibility, as well as to be able to manage complex risks such as kidnapping, industrial espionage, malicious product contamination and counterfeiting. Much emphasis throughout the course is place on how to add value to the security management role.

The course project reflects the strategic focus, and requires delegates working in syndicates to analyse risks and devise a long-term security strategy for a global food and drinks manufacturer, which is in the process of expanding into cheaper but higher security risk labour markets while downsizing in traditional more expensive labour markets, with all of the attendant risk issues.

Wednesday, April 14, 2010

Key Nigerian Security Professionals Gather in Lagos

A dozen security professionals from some of Nigeria’s key industries gather in Lagos this week and next to further their professional development by attending the ARC Training International Security Management Stage 1 course. The course provides Security Managers with the knowledge and skills to provide protection of their employers’ premises and operations using internationally recognised best practice.

The mixing of professionals from different business sectors and companies provides added value by providing a forum for the exchange of views and practices. At the end of this course, each delegate will return to their workplace with the additional skills and knowledge to allow them to increase the contribution that they make to their company’s success.

Saturday, April 10, 2010

Alumni Focus: Abrar Ashraf

The ASIS Physical Security Professional (PSP) certification is the de-facto internationally-recognised certification designed to enable security professionals to select, recommend, and project manage the implementation of integrated physical and electronic security systems. Achievement of PSP certification through examination.

Abrar Ashraf (pictured) of VSG Security Group is the latest UK ASIS Chapter member to achieve this award.

Congratulations Abrar!

Threat to Critical Infrastructure Reiterated

Security managers charged with protecting the physical security of critical national infrastructure, such as oil and gas facilities, energy generation, utilities, communications etc, should remain alert to the possibility that their operations may be vulnerable to threats of a silent, but deadly nature.

A recent survey of US IT professionals found that 61% believe that there is a high probability that a foreign nation will launch a cyberattack against critical US infrastructure sometime within the next year.

IT experts have long been warning that the security of IT-based SCADA systems – the critical programmes and hardware that control operations – is inadequate, and that hackers could cause devastating events, such as a miss-operation, an explosion, fire, malicious contamination, or a loss of containment of a polluting or poisonous substance.

Security managers should remain in continuous liaison with IT professionals in this regard.

For background documents relating to the security of SCADA, please contact David.

Friday, April 9, 2010

BBC Interviews ARC Course Presenter about IT Secuity

Source: BBC News

US prosecutors charged a man with stealing data relating to 130 million credit and debit cards. Officials say it is the biggest case of identity theft in American history.

They say Albert Gonzalez, 28, and two un-named Russian co-conspirators hacked into the payment systems of retailers, including the 7-Eleven chain.

Edward Wilding, a fraud investigator and presenter of the ARC Training Investigating IT Misuse Course, told the BBC that this method was "a pretty standard way" for fraudsters to try to access personal data. Mr Wilding said there was little consumers could do to protect themselves against this kind of fraud.

For more information on the Investigating IT Misuse Course, 9-10 November, contact Janet or click here.

Advancing Security Management Professionalism in Nigeria

Nigeria is a country where levels of security management professionalism in oil companies are necessarily amongst the highest in the world.

Over the next two weeks Peter Horsburgh CPP PSP will be in Nigeria to lead a group of security managers from one of the world’s best-known oil companies through the postgraduate-level Security Management Stage 1 Course.

The “SM1” course has been attended by hundreds of security managers from all over the world, and for many of the world’s leading companies it is the de facto core skills course in how to manage security in a corporate setting.

African Security Experts Gather in Johannesburg

ARC, through its southern Africa regional partner AMC-INTSA, will be conducting its first Johannesburg Security Management and Coordination Course next week.

The course will be led by Barry Vincent MA MSc, who is well-known to delegates who have attended security management courses in the UK recently. A former police divisional commander in London, more recently Barry was Head of Security for the UK’s biggest retailer. Nowadays he shares his wisdom and expertise with delegates attending ARC security management courses.

The course includes delegates from a wide range of sectors, embracing Zimbabwe, South Africa, Botswana, Namibia and Mozambique.

Beware the Pirates Within

Source: Workplace Law

A report published today by Microsoft suggests a third of people in Britain believe it is acceptable to use pirated software, while one in six admitted using illegal computer programs at home or at work.

Only a third felt they had a good understanding of the major risks involved, such as computer viruses, losing personal information and identity theft.

Microsoft’s 'Attitudes to Piracy' report found that, of those surveyed, one in eight employed adults admitted using pirated software at work!

Security Awareness Training

As well as providing professional development programmes for security managers, a very important area of ARC’s work involves delivering security awareness workshops for companies with staff who are locally responsible for security, alongside their regular full-time professional roles.

Next week David will be in Madrid to conduct the first of a series of global workshops for one such client, a global technology group. In the classroom, alongside professional security and safety professionals will be IT managers, lawyers, operations and export managers, and the facilities manager.

The programme will blend the client’s own security philosophy with the best practice taught on ARC’s security manager courses, and the impressive attendee list is bound to lead to healthy exchanges of views.

To facilitate better local understanding, all of the course materials will be in Spanish.

Monday, March 29, 2010

You Are a Security Management Professional – Now Underscore It with an Accredited Certificate



For the full-time security manager ARC offers two options: university-accredited, interactive and highly-participatory security management courses (which can lead into an optional MSc programme), or prepartion courses for the ASIS CPP certification.

Forthcoming university-accredited (postgraduate NQF Level 7) courses include (clickable links):

Security Management Stage 1, 2-13 August
Security Management Stage 2, 28 June – 9 July
Security Management Stage 3, 10-21 May

CPP certification can be achieved by following the ARC/Chapter 208 combined distance-learning/residential programme, or by attending the two-week intensive CPP crammer programme, 12 -23 July.

If you have a particular interest in terrorism, the Countering Hostile Reconnaissance and Counter Terrorism Course, 24-28 May, led by two UK police-trained counter terrorism security specialists, is highly recommended.

For those who are required to conduct investigations, ARC has three options:

Investigating and Interviewing Skills, 25-28 October
Advanced Investigations Techniques, 7-11 June
ASIS Professional Certified Investigator (PCI), 23-27 August (distance learning beginning May)

If your work requires you to survey, the very practical (site-based) Security Surveying and Design Course, 20-24 September, is recommended, and you will receive a BTEC level 4 award upon successful completion.

If you have to specify and procure technical security systems, then you should consider the ASIS PSP certification, for which distance learning begins in July.

If you are specifically interested in security risk mitigation in the oil and gas sector, then you should consider the Managing Security Risks in the Oil and Gas Sector Course, 16-20 August.

Those with a crisis management and business continuity remit should consider the Crisis and Business Continuity Management Course, 22-24 June, delivered by Barry Vincent, who was the lead in this area for one of the UK’s biggest and most successful companies.

Finally, if you have reached the pinnacle of security management, or have completed Security Management Stages 1-3, have a security management degree, or CPP, challenge yourself to participate in the very practical one-week BurrillGreen Masterclass in Strategic Security Management, 4-8 October, where you will be put through your paces across a range of “board engagement” scenarios under the guidance of two former multinational corporate heads of security. A unique opportunity – a unique challenge.

As always, Janet will be happy to provide all the details of any of ther above pogrammes.

Airport Security Guard Quizzed Over Scanner Abuse Claims

Source: Sun Online

A Heathrow security man was quizzed by police after ogling a girl colleague "naked" in a new anti-terror body scanner.

Jo Margetson, 29, reported John Laker, 25, after he took her picture with the X-ray gadget and made a lewd comment.

She had entered the X-ray machine by mistake - and was horrified when Laker pressed a button to take a revealing photo.

Laker, who faces the sack, was the first airport worker to be caught abusing the controversial new devices, which have been branded illegal by civil rights groups who fear abuse by security guards.

Sunday, March 28, 2010

UK Employers Urged to Review Whistleblowing Policies

Source: Workplace Law Network

Employers are being urged to review their approach to whistleblowing allegations in light of the UK Government's planned changes to the law next month, according to Workplace Law Network.

From 6 April, the current bar on Employment Tribunals revealing any details of whistleblowing allegations outside of the tribunal process is to be lifted. As a result, tribunals will be able to refer such claims to the relevant regulatory authority, such as the Serious Fraud Office or Health and Safety Executive, for investigation.

ARC offers a number of investigations courses, including:

Preparation Programme for the ASIS PCI (Professional Certified Investigator) Certification, beginning May 2010 with distance learning. For details, click here.

Investigating and Interviewing Skills (Based on UK Law), 25-28 October. For details click here.

Advanced Investigations Techniques, 7-11 June. For details click here.

CCTV Feature: New Instructional CCTV Video - Download Link

A basic, but very good, new educational video on CCTV has been produced by the FBI. View or download from:

http://www.youtube.com/watch?v=u5Oj2FDwLXs

Tuesday, March 23, 2010

Migrating to New Access Card Technology

Migrating to new access control card technology? Have you considered multiple technology cards to bridge the gap between different types of card reader systems? For details go to:

http://www.hidglobal.com/page.php?page_id=162

Card technology is one of many technical security subjects covered ARC’s Preparation Programme for the ASIS PSP (Physical Security Professional) certification. The next programme begins in July with distance learning, leading up to a residential programme. For more information or to enrol, contact David.

ASIS Security Toolkit

Great resources at:

http://www.asisonline.org/toolkit/toolkit.xml

Test Your Knowledge

1.Hydraulic defences used to protect facility entrances against hostile moving vehicles should be designed to stop a vehicle up to what weight and moving at what speed?

2.Protected areas within a perimeter should be illuminated to what minimum level?

3.When specifying lighting for a fog-prone area, which is the better option: Sodium Vapour or Mercury Vapour?

4.The rule that determines the importance of evidence and its ability to prove a point is called?

5.There are three broad threats to sensitive information: inadvertent disclosure, deliberate theft by an outsider, and deliberate theft by an insider. Of these, which is the major reason for the loss of sensitive information?

6.What is meant by the term “dumpster diving”?

7.At what intervals should emergency plans be audited?

8.Emergency succession plans need to reflect the anticipated normal management succession; true or false?

9.There are two types of safes, burglary resistant and what else?

10.In mitigating explosive blasts, what is the name given to the distance between an asset and the threat?

For the answers to these, and many more, questions about security, sign up to the CPP Intensive Development Programme, UK, 12-23 July 2010. For details go to: http://www.arc-tc.com/pages/asis_cpp_psp.asp#cpp

Monday, March 22, 2010

How to Detect Bugs!

17 delegates representing commercial organisations, armed forces, police and non-governmental aid organisations from 11 different countries are currently studying under the guidance of David Cresswell and Barry Vincent on the university-accredited Security Management Stage 1 Course.

On Monday 22 March the subject under study was Information Security. Delegates studied not only how to protect information in IT systems but also the core principles of protecting information in all of its forms, how information is exploited, and by whom.

A particular session of interest was that delivered by Iain McGhee of Audiotel Ltd, the leading provider of technical surveillance countermeasures equipment. With complete radio transmitter/receiver kits costing from as little as $60 online, the need for reliable technical surveillance countermeasures has never been greater.

Iain can be seen in the image demonstrating the DetectIV.

Th next Security Managment Stage 1 Course is 2-13 August 2010. Details at http://www.arc-tc.com/pages/university_acredited_sm.asp#sm1

Wednesday, March 17, 2010

Social Engineering Using Email and IM – How (Not) to Get Scammed

Recommended reading for your employees.......

http://www.csoonline.com/article/480589/9_Dirty_Tricks_Social_Engineers_Favorite_Pick_Up_Lines

Should You Expect Protest Action on April 1st

Fossil Fools Day is an environmental demonstration day. It occurs on April 1st. The name is a play on the term fossil fuels and April Fools' Day.

To see what the environmental activists may have in store for you on April 1st, go to:

http://www.fossilfoolsdayofaction.org/2010/

http://risingtide.org.uk/node/336

Managing protest activity is one of many topics covered on Security Management Stage 3. For details go to http://www.arc-tc.com/pages/university_acredited_sm.asp#sm3

Offensive Content on Foreign Server is within UK Jurisdiction, Says Court of Appeal

The law of England and Wales applies to material published online, even if it is hosted on a server in another country, the UK Court of Appeal has ruled. As long as a substantial measure of the activities takes place in England, its law will apply, it said.

This presents interesting issues for those protest groups which publish untue defamatory statements online about companies and their directors, on the assumption that if the server is overseas, they are beyond UK jusrisdiction.

Managing protest activity is one of many topics covered on Security Management Stage 3. For details contact Janet or go to http://www.arc-tc.com/pages/university_acredited_sm.asp#sm3

For more on the main story,go to:
http://www.out-law.com/page-10743

Boeing 747 Survives Simulated 'Flight 253' Bomb Blast

Source and Copyright: BBC

A test explosion on a Boeing 747 has shown that a US Christmas Day flight would have landed safely even if a bomb on board was detonated successfully.

For more, go to: http://news.bbc.co.uk/1/hi/world/8547329.stm

Setting Sights on the CPP Designation

A group of UK ASIS Chapter members are firmly on track to achieving the coveted CPP certification in May.

Their programme began in January, with a series of challenging distance-learning assignments. In the most recent assignment, topics under detailed study included information security, investigations, interviewing, access control, and emergency management.

The programme culminates at the end of April with a one-week intensive residential course, following which the candidates will undertake the gruelling 200-question examination. This is now computer-based, so results will be available immediately.

According to the course director, David Cresswell, all of the candidates are on course for a first-time pass.

The next combined distance learning/residential programme begins in July, aiming for a November exam. For details contact Janet or go to http://www.arc-tc.com/pages/asis_cpp_psp.asp#asis1.

Alternatively, ARC has introduced a new two-week crammer course, which aims to take candidates from a standing start to being ready to sit the exam in 14 days of continuous study. For details of the latter, go to http://www.arc-tc.com/pages/asis_cpp_psp.asp#cpp.

Monday, March 15, 2010

Learn about IP CCTV Online

Go to http://www2.boschsecurity.us/ip/learning_center_intro.aspx?sb=lc for a very detailed explanation from Bosch. CCTV is covered in detail during Security Management Stage 2, 28 June – 9 July 2010. Click here or contact Janet for details.

Terrorism and the Rail Network

Terrorists seeking to attack the rail network have various options:

1. Bomb at the station.
2. Bomb on a passenger train.
3. Blowing up hazardous rail cargos in built-up areas.
4. Bomb on rail line, or other sabotage aimed at derailing a fast-moving train.

Go to the following link for an example of #4.

http://news.bbc.co.uk/1/hi/world/europe/8384404.stm

Linking Transnational Crime and Terrorism

A report illustrating how the US Govt views links between terrorism and transnational crime. Useful if you are writing a disseration:

http://www.fas.org/sgp/crs/terror/R41004.pdf

Wednesday, March 10, 2010

Information Theft: Computer Programmer Faces 25 Years in Prison for Stealng Trade Secrets

Source and Copyright: NASDAQ

A former Goldman Sachs Group (GS) computer programmer has been indicted on charges he stole computer codes used for proprietary high-frequency trading program.

Sergey Aleynikov, 40 years old, was charged in a three-count indictment with theft of trade secrets, transportation of stolen property in interstate and foreign commerce and unauthorized computer access.

Prosecutors from the U.S. Attorney's office in Manhattan alleged that Aleynikov, on his last day at Goldman Sachs in June 2009, transferred substantial portions of Goldman's proprietary computer code for its high- frequency trading platform to an outside computer server in Germany. He also allegedly transferred thousands of computer code files related to the proprietary trading platform to his home computers during his time at Goldman without the firm's knowledge, prosecutors said.

Aleynikov faces up to 25 years in prison on the charges.

Rogue employees and information theft are comprehensively addressed in the Business Espionage and Investigating Information Leaks workshop during the strategic-level Security Management Stage 3 course, 10-21 May 2010. For more details go to http://www.arc-tc.com/pages/university_acredited_sm.asp#sm3 or contact Janet.

Alumni Feature: Gavin Wilson

Gavin Wilson was one of ARC’s highest scoring candidates in the PSP (Physical Security Professional) certification examination in 2009. Having established himself as something of an expert in physical security, he is now working with a team to produce what it is hoped will become the first British Standard in Physical Security.

Preventing Burglary in Commercial and Institutional Settings

In this ASIS report Tim Prenzler, PhD, looks at how to assess, manage, and respond to burglaries that occur at commercial and industrial sites. While there is a considerable amount written about domestic burglary, research is less in evidence when the locale is non-residential. His report looks at the context in which burglaries occur, and includes a consideration of the burglar's approach. He examines a range of solutions, which aim to make it more difficult for would be offenders particularly in the workplace, and he shows where security managers can have an impact.To download the report, go to:

http://www.asisonline.org/foundation/noframe/research/crisp.html

Monday, March 8, 2010

Develop Your Expertise in Security Management

For the full-time security manager ARC offers two options: university-accredited, interactive and highly-participatory security management courses (which can lead into an optional MSc programme), or ASIS CPP certification.

Forthcoming university-accredited (postgraduate NQF Level 7) courses include (clickable links):

Security Management Stage 1, 2-13 August
Security Management Stage 2, 28 June – 9 July
Security Management Stage 3, 10-21 May

CPP certification can be achieved by following the ARC/Chapter 208 combined distance-learning/residential programme, or by attending the two-week intensive CPP crammer programme, 12 -23 July.

If you have a particular interest in terrorism, the Countering Hostile Reconnaissance and Counter Terrorism Course, 24-28 May, led by two UK police-trained counter terrorism security specialists, is highly recommended.

For those who are required to conduct investigations, ARC has three options:

Investigating and Interviewing Skills, 25-28 October
Advanced Investigations Techniques, 7-11 June
ASIS Professional Certified Investigator (PCI), 23-27 August (distance learning beginning May)

If your work requires you to survey, the very practical (site-based) Security Surveying and Design Course, 19-23 April, is recommended, and you will receive a BTEC level 4 award upon successful completion.

If you have to specify and procure technical security systems, then you should consider the ASIS PSP certification, for which distance learning begins in July.

If you are specifically interested in security risk mitigation in the oil and gas sector, then you should consider the Managing Security Risks in the Oil and Gas Sector Course, 16-20 August.

Those with a crisis management and business continuity remit should consider the Crisis and Business Continuity Management Course, 22-24 June, delivered by Barry Vincent, who was the lead in this area for one of the UK’s biggest and most successful companies.

Finally, if you have reached the pinnacle of security management, or have completed Security Management Stages 1-3, have a security management degree, or CPP, challenge yourself to participate in the very practical one-week BurrillGreen Masterclass in Strategic Security Management, 4-8 October, where you will be put through your paces across a range of “board engagement” scenarios under the guidance of two former multinational corporate heads of security. A unique opportunity – a unique challenge.

As always, Janet will be happy to provide all the details of any of ther above pogrammes.

The World’s Most Popular Security Management Experience


A truly international experience is promised on the forthcoming Security Management Stage 1 course, 15-26 March, with participants from Afghanistan, Angola, Germany, Hong Kong, Oman, Pakistan, Qatar, Romania, Sudan, Uganda, United Arab Emirates, United Kingdom, and Yemen.

With 20 participants, this event is now sold out, but registrations are already being accepted for the following two Security Management Stage 1 courses:

2-13 August 2010
15-26 November 2010

This is ARC’s flagship course, covering the core skills areas of security management, and has been attended by hundreds of delegates from literally hundreds of companies, worldwide.

For details go to http://www.arc-tc.com/pages/university_acredited_sm.asp#sm1

Or contact Janet.

CCTV Glossary

A useful CCTV glossary can be found at

http://www.iviewcameras.co.uk/content/glossary.asp#h

CCTV is one of the topics of the advanced-level Security Management Stage 2 Course, 28 June-9 July 2010, details at

http://www.arc-tc.com/pages/university_acredited_sm.asp#sm2 or contact Janet.

Scam Update

Telemarketing scams, Advance Fee Frauds, Phishing, Lottery Scams, False Billing........they’re all explained on the following pages, with useful advice:

Australian Government Site

http://www.fido.asic.gov.au/fido/fido.nsf/byHeadline/Scams%20-%20types%20of%20scams

UK Government Site

http://www.consumerdirect.gov.uk/watch_out/Commonscams/

Can a PDA Cause a Malfunction of Critical National Infrastructure?

Traditionally, critical process management in national infrastructure, such as oil and gas facilities, chemical plants, utilities, power generation etc, was carried out manually. Now, in many cases, such processes are managed automatically by SCADA – IT-based supervisory control and data acquisition systems.

At a recent summit on the vulnerability of IT systems to cyberattack, Mary Ann Davidson, chief security officer at Oracle, warned of the dangers of linking SCADA systems for monitoring and controlling critical infrastructure with the Internet.

"We know the SCADA protocols used in control systems were not designed to be attack resistant. They were originally used in electro-mechanical systems where you had to physically access the system, turn the knob, and so on," she said. "Now we are increasingly moving to the IP-based control systems and connecting them to corporate networks that are in turn connected to the Internet.

"We know some smart grid devices are hackable," she said. "We know there are PDAs, digital assistants, that talk SCADA because it's just so expensive to send a technician to the plant. Dare I say move the control rods in and out of the reactor? There's an app for that."

For background documents on SCADA security, contact David.

For more on this story, click on:

http://news.cnet.com/8301-27080_3-10458759-245.html

Handling Telephone Bomb Threats

Most bomb threats are made over the phone. The overwhelming majority are hoaxes, often the work of malicious pranksters, although in the UK Irish republican terrorists have also made genuine calls. To date those involved in so-called "international terrorism" have not issued bomb threats. Any bomb threat is a crime and, no matter how ridiculous or unconvincing, should be reported to the police.

Telephoned bomb threats are frequently inaccurate with regard to where and when a bomb might explode, and staff receiving a bomb threat may not always be those trained and prepared for it. But although they may be unable to assess a threat's accuracy or origin, their impressions of the caller could be important.

More at: http://www.cpni.gov.uk/SecurityPlanning/bombThreats.aspx

How to deal with bomb threat calls is dealt with in the Protection against Explosive Devices one-day workshop of Security Management Stage 1, 2-13 August 2010. For details click here.

Friday, February 26, 2010

Alumni Feature: Setting Sights on the MSc Work-Based Learning (Corporate Security Management)

Roger Coutain of BP Trinidad and Tobago completed Security Management Stages 1-3 over the period 2007-2009. He is now one of a number of students who have moved onto the optional university distance learning element of the programme, and is firmly on course to achieve his MSc later this year.

Since first attending courses with ARC, Roger has been promoted to Head of Security, Crisis and Continuity Management and Emergency Response in his company, and attributes ARC as “playing a great role with this promotion”.

Staff Travelling Abroad? - Advice on How to Protect Themselves at ATMs

Business Travel Security constitutes one of several whole-day workshops on the very popular Security Management Stage 2 Course, 28 June - 9 July 2010.

Overseas travellers may fall victim to the growing risk of ATM robbery. Most bank ATM robberies occur at night between 7pm and midnight. Bank ATM robbers are usually males under 25 years of age and most work alone. ATM robbers usually position themselves nearby (50 feet) waiting for a victim to approach and withdraw cash. Half of the ATM robberies occur after the cash withdrawal.

Read on at: http://www.crimedoctor.com/atm.htm

Thursday, February 25, 2010

How Dependable is GPS in Security Monitoring

Increasingly, advanced asset surveillance systems use GPS to monitor the location and movement of assets. Not so well known, however, are its applications in other areas. GPS devices now form a key part of emergency vehicles' arsenals. They are also used for high-precision surveying, transportation monitoring, just-in-time stock management, farming, docking ships and they may soon be used to automatically land commercial aircraft. In the UK, more and more trains depend on a firm GPS location fix before their doors will open.

But the dependability of GPS is coming under threat from both natural and man-made sources. At risk are not only sat-nav users, but also critical national infrastructure. Earlier in February, the BBC reported an imminent change in solar activity that could corrupt GPS receivers. See http://news.bbc.co.uk/1/hi/sci/tech/8494225.stm . Now, the latest threat is from jammers http://news.bbc.co.uk/1/hi/sci/tech/8533157.stm, according to experts. Small GPS jamming devices are widely available on the internet.

Criminals Hide Payment-Card Skimmers Inside Gas Station Pumps

Criminals in the US are hiding bank card-skimming devices inside gas pumps -- in at least one case, even completely replacing the front panel of a pump -- in a recent wave of attacks that demonstrate a more sophisticated, insidious method of stealing money from unsuspecting victims filling up their gas tanks. For the full story, go to:

http://www.darkreading.com/database_security/security/attacks/showArticle.jhtml?articleID=223100233

BTEC Level 4 Security Coordination and Management Course

Security managers from a wide range of sectors are attending the Security Coordination and Management course at ARC’s UK training venue near Reading, and will receive a BTEC Level 4 award. Although most of them are experienced in the security field, they wished to enhance their security knowledge and to exchange best practices with their colleagues. With representatives from both business sectors and government, the lively discussions saw a wide range solutions being offered to various problems posed. On the last day the final syndicate exercise, culminating in a management level presentation, will allow them to practice the skills that they have learned.

Security Surveying Toolkit

Excellent awareness package from the UK Government, advising you how to carry out a domestic security survey. Go to:

http://www.crimereduction.homeoffice.gov.uk/burglary/burglary46.htm

But if your role involves you having to conduct surveys of commercial premises, you should consider underscoring your experience by gaining a BTEC Level 4 qualification in security surveying, by attending the Security Surveying and Design Course, 19-23 April.

Contact Janet for details.

360 Degree Thermal Imaging for Long-Range Perimeter Protection

On display at the ASIS Middle East Security Conference in Dubai, December 2009, was an interesting 360 degree thermal imaging camera:

http://www.hgh.fr/surveillance-panoramique-infrarouge-infrared-panoramic-vision-en.php

Maritime Security Focus - Using Technology

An interesting paper:

www.ni2cie.org/downloads/MaritimeSecurity-v0816.pdf

When Considering the Use of Security Barriers to Prevent Forced Perimeter Penetration by Vehicles...

When considering the use of security barriers to prevent forced perimeter penetration by vehicles, there are two standards that should be considered.

The US K-series of ratings provides for certification of barriers that meet specific resistance requirements. For example, K-12 means that the barrier should be able to stop a vehicle with a weight not exceeding 6,800 kg at speeds of up to 80 kph.

A much more accurate assessment of your needs, however, can be made using the British Standard PAS 69:2006, which provides very useful guidance on the threat and site assessment process, identification of critical assets, choice of barrier (perimeter or access control-specific), environmental considerations, and other considerations for barrier selection. There are also annexes on specific kinds of barriers. If you are considering installing a vehicle blocking system, the document will undoubtedly help you avoid common errors and remind you of the many factors that have to be taken into consideration.

The document can be downloaded for a small charge from http://shop.bsigroup.com/ProductDetail/?pid=000000000030135104

Protection against hostile vehicles is covered in the terrorism sessions of both Security Management Stage 1, 2-13 August 2010, and Security Management Stage 2, 28 June – 9 July.

For information on these courses click on the course titles or contact Janet.

This Article is Written for Workplace Miscreants....

What exactly constitutes a theft "crime" in the workplace, and what is just an "accepted practice" that you can ignore?

Certainly food for thought in this article:

http://www.tcbreview.com/workers-behaving-badly.php

Workplace crime prevention is covered in Security Management Stage 1, 15-26 March, and 2-13 August.

Fraud, specifically, is covered in Security Management Stage 2, 28 June - 9 July.

Contact Janet for details.

Wednesday, February 17, 2010

Developing Competence in Security Management

For the full-time security manager ARC offers two options: university-accredited, interactive and highly-participatory security management courses (which can lead into an optional MSc programme), or ASIS CPP certification.

Forthcoming university-accredited (postgraduate NQF Level 7) courses include (clickable links):

Security Management Stage 1, 15-26 March, 2-13 August
Security Management Stage 2, 28 June – 9 July
Security Management Stage 3, 10-21 May

CPP certification can be achieved by following the ARC/Chapter 208 combined distance-learning/residential programme, or by attending the two-week intensive CPP crammer programme, 12 -23 July.

If you have a particular interest in terrorism, the Countering Hostile Reconnaissance and Counter Terrorism Course, 24-28 May, led by two UK police-trained counter terrorism security advisors, is highly recommended.

For those who are required to conduct investigations, ARC has three options:

Investigating and Interviewing Skills, 1-4 March
Advanced Investigations Techniques, 7-11 June
ASIS Professional Certified Investigator, 23-27 August (distance learning beginning May)

If your work requires you to survey, the very practical (site-based) Security Surveying and Design Course, 19-23 April, is recommended, and you will receive a BTEC level 4 award upon successful completion.

If you have to specify and procure technical security systems, then you should consider the ASIS PSP certification, for which distance learning begins in July.

If you are specifically interested in security risk mitigation in the oil and gas sector, then you should consider the Managing Security Risks in the Oil and Gas Sector Course, 16-20 August.

Those with a crisis management and business continuity remit should consider the Crisis and Business Continuity Management Course, 22-24 June, delivered by Barry Vincent, who was the lead in this area for one of the UK’s biggest and most successful companies.

Finally, if you have reached the pinnacle of security management, or have completed Security Management Stages 1-3, have a security management degree, or CPP, challenge yourself to participate in the very practical one-week BurrillGreen Masterclass in Strategic Security Management, 4-8 October, where you will be put through your paces across a range of “board engagement” scenarios under the guidance of two former multinational corporate heads of security. A unique opportunity – a unique challenge.

As always, Janet will be happy to provide all the details of any of ther above pogrammes.

Explosives Detection

Lots of resources on the Internet to help you better understand explosives detection, for example:

www2.foi.se/rapp/foir2030.pdf
www.ncjrs.gov/pdffiles1/nij/grants/208861.pdf


But the explosive peroxide compounds triacetone triperoxide (TATP) and hexamethylenetriperoxide diamine (HMTD) are difficult to detect by conventional mass spectrometry methods.

Whatever equipment you select, do first produce a written performance specification that states that the equipment is to be capable of detecting all regular high explosives and also at least TATP. Some systems can’t identify this home-made high explosive, which is proving very popular with extremists.

Examples of good equipment that can identify TATP include the Scintrex EVD 3100 and 3500, but the EVD 3000, which is still widely sold, cannot detect TATP, and will leave you exposed if you are using it.

And don’t rule out extremist use of chlorate/sugar mix low explosives (usually beyond the detection capabilities of many equipments), which, as demonstrated by the IRA in Belfast in the 1970s, have the ability to demolish an entire building under certain conditions.
>

Door Lock Glossary

http://www.securefastplc.net/Terminology

(If you should ever want to engage in coversation with a door lock specialist)

Creating Dynamic Return on Security Investment

In the Specifying Technology session on the Security Management Stage 2 Course, 28 June – 9 July 2010, (for details click here or contact Janet), much emphasis is placed on how to create dynamic return on security investment by selecting technical security solutions that have payback into other areas of the business. For example IP CCTV which can serve as the backbone for corporate-wide voice over Internet telephony services, the single card initiative which, by allowing staff to securely access their own personal records via the network, can dramatically reduce internal telephone enquiry calls and associated manpower etc.

RFID is one such technology which, while making rapid inroads into security, also has many other non-security applications. Read the following article for an example:

http://www.rfidjournal.com/article/articleview/3022/1/1/

The Pigeon That's Quicker than Broadband - And More Secure?

In a race to transfer four gigabytes of data securely between two company offices 80km (50 miles) apart, pigeon Winston arrived with his encrypted memory stick in 2hr 6min 57sec - when the rival download was only four per cent complete. A pigeon: better than a dodgy internet connection? With practice, Winston's trainers think he can get the flight down to 45 minutes, against six hours by internet.

Full story: http://www.metro.co.uk/news/734273-the-pigeon-thats-quicker-than-broadband