Friday, February 26, 2010

Alumni Feature: Setting Sights on the MSc Work-Based Learning (Corporate Security Management)

Roger Coutain of BP Trinidad and Tobago completed Security Management Stages 1-3 over the period 2007-2009. He is now one of a number of students who have moved onto the optional university distance learning element of the programme, and is firmly on course to achieve his MSc later this year.

Since first attending courses with ARC, Roger has been promoted to Head of Security, Crisis and Continuity Management and Emergency Response in his company, and attributes ARC as “playing a great role with this promotion”.

Staff Travelling Abroad? - Advice on How to Protect Themselves at ATMs

Business Travel Security constitutes one of several whole-day workshops on the very popular Security Management Stage 2 Course, 28 June - 9 July 2010.

Overseas travellers may fall victim to the growing risk of ATM robbery. Most bank ATM robberies occur at night between 7pm and midnight. Bank ATM robbers are usually males under 25 years of age and most work alone. ATM robbers usually position themselves nearby (50 feet) waiting for a victim to approach and withdraw cash. Half of the ATM robberies occur after the cash withdrawal.

Read on at: http://www.crimedoctor.com/atm.htm

Thursday, February 25, 2010

How Dependable is GPS in Security Monitoring

Increasingly, advanced asset surveillance systems use GPS to monitor the location and movement of assets. Not so well known, however, are its applications in other areas. GPS devices now form a key part of emergency vehicles' arsenals. They are also used for high-precision surveying, transportation monitoring, just-in-time stock management, farming, docking ships and they may soon be used to automatically land commercial aircraft. In the UK, more and more trains depend on a firm GPS location fix before their doors will open.

But the dependability of GPS is coming under threat from both natural and man-made sources. At risk are not only sat-nav users, but also critical national infrastructure. Earlier in February, the BBC reported an imminent change in solar activity that could corrupt GPS receivers. See http://news.bbc.co.uk/1/hi/sci/tech/8494225.stm . Now, the latest threat is from jammers http://news.bbc.co.uk/1/hi/sci/tech/8533157.stm, according to experts. Small GPS jamming devices are widely available on the internet.

Criminals Hide Payment-Card Skimmers Inside Gas Station Pumps

Criminals in the US are hiding bank card-skimming devices inside gas pumps -- in at least one case, even completely replacing the front panel of a pump -- in a recent wave of attacks that demonstrate a more sophisticated, insidious method of stealing money from unsuspecting victims filling up their gas tanks. For the full story, go to:

http://www.darkreading.com/database_security/security/attacks/showArticle.jhtml?articleID=223100233

BTEC Level 4 Security Coordination and Management Course

Security managers from a wide range of sectors are attending the Security Coordination and Management course at ARC’s UK training venue near Reading, and will receive a BTEC Level 4 award. Although most of them are experienced in the security field, they wished to enhance their security knowledge and to exchange best practices with their colleagues. With representatives from both business sectors and government, the lively discussions saw a wide range solutions being offered to various problems posed. On the last day the final syndicate exercise, culminating in a management level presentation, will allow them to practice the skills that they have learned.

Security Surveying Toolkit

Excellent awareness package from the UK Government, advising you how to carry out a domestic security survey. Go to:

http://www.crimereduction.homeoffice.gov.uk/burglary/burglary46.htm

But if your role involves you having to conduct surveys of commercial premises, you should consider underscoring your experience by gaining a BTEC Level 4 qualification in security surveying, by attending the Security Surveying and Design Course, 19-23 April.

Contact Janet for details.

360 Degree Thermal Imaging for Long-Range Perimeter Protection

On display at the ASIS Middle East Security Conference in Dubai, December 2009, was an interesting 360 degree thermal imaging camera:

http://www.hgh.fr/surveillance-panoramique-infrarouge-infrared-panoramic-vision-en.php

Maritime Security Focus - Using Technology

An interesting paper:

www.ni2cie.org/downloads/MaritimeSecurity-v0816.pdf

When Considering the Use of Security Barriers to Prevent Forced Perimeter Penetration by Vehicles...

When considering the use of security barriers to prevent forced perimeter penetration by vehicles, there are two standards that should be considered.

The US K-series of ratings provides for certification of barriers that meet specific resistance requirements. For example, K-12 means that the barrier should be able to stop a vehicle with a weight not exceeding 6,800 kg at speeds of up to 80 kph.

A much more accurate assessment of your needs, however, can be made using the British Standard PAS 69:2006, which provides very useful guidance on the threat and site assessment process, identification of critical assets, choice of barrier (perimeter or access control-specific), environmental considerations, and other considerations for barrier selection. There are also annexes on specific kinds of barriers. If you are considering installing a vehicle blocking system, the document will undoubtedly help you avoid common errors and remind you of the many factors that have to be taken into consideration.

The document can be downloaded for a small charge from http://shop.bsigroup.com/ProductDetail/?pid=000000000030135104

Protection against hostile vehicles is covered in the terrorism sessions of both Security Management Stage 1, 2-13 August 2010, and Security Management Stage 2, 28 June – 9 July.

For information on these courses click on the course titles or contact Janet.

This Article is Written for Workplace Miscreants....

What exactly constitutes a theft "crime" in the workplace, and what is just an "accepted practice" that you can ignore?

Certainly food for thought in this article:

http://www.tcbreview.com/workers-behaving-badly.php

Workplace crime prevention is covered in Security Management Stage 1, 15-26 March, and 2-13 August.

Fraud, specifically, is covered in Security Management Stage 2, 28 June - 9 July.

Contact Janet for details.

Wednesday, February 17, 2010

Developing Competence in Security Management

For the full-time security manager ARC offers two options: university-accredited, interactive and highly-participatory security management courses (which can lead into an optional MSc programme), or ASIS CPP certification.

Forthcoming university-accredited (postgraduate NQF Level 7) courses include (clickable links):

Security Management Stage 1, 15-26 March, 2-13 August
Security Management Stage 2, 28 June – 9 July
Security Management Stage 3, 10-21 May

CPP certification can be achieved by following the ARC/Chapter 208 combined distance-learning/residential programme, or by attending the two-week intensive CPP crammer programme, 12 -23 July.

If you have a particular interest in terrorism, the Countering Hostile Reconnaissance and Counter Terrorism Course, 24-28 May, led by two UK police-trained counter terrorism security advisors, is highly recommended.

For those who are required to conduct investigations, ARC has three options:

Investigating and Interviewing Skills, 1-4 March
Advanced Investigations Techniques, 7-11 June
ASIS Professional Certified Investigator, 23-27 August (distance learning beginning May)

If your work requires you to survey, the very practical (site-based) Security Surveying and Design Course, 19-23 April, is recommended, and you will receive a BTEC level 4 award upon successful completion.

If you have to specify and procure technical security systems, then you should consider the ASIS PSP certification, for which distance learning begins in July.

If you are specifically interested in security risk mitigation in the oil and gas sector, then you should consider the Managing Security Risks in the Oil and Gas Sector Course, 16-20 August.

Those with a crisis management and business continuity remit should consider the Crisis and Business Continuity Management Course, 22-24 June, delivered by Barry Vincent, who was the lead in this area for one of the UK’s biggest and most successful companies.

Finally, if you have reached the pinnacle of security management, or have completed Security Management Stages 1-3, have a security management degree, or CPP, challenge yourself to participate in the very practical one-week BurrillGreen Masterclass in Strategic Security Management, 4-8 October, where you will be put through your paces across a range of “board engagement” scenarios under the guidance of two former multinational corporate heads of security. A unique opportunity – a unique challenge.

As always, Janet will be happy to provide all the details of any of ther above pogrammes.

Explosives Detection

Lots of resources on the Internet to help you better understand explosives detection, for example:

www2.foi.se/rapp/foir2030.pdf
www.ncjrs.gov/pdffiles1/nij/grants/208861.pdf


But the explosive peroxide compounds triacetone triperoxide (TATP) and hexamethylenetriperoxide diamine (HMTD) are difficult to detect by conventional mass spectrometry methods.

Whatever equipment you select, do first produce a written performance specification that states that the equipment is to be capable of detecting all regular high explosives and also at least TATP. Some systems can’t identify this home-made high explosive, which is proving very popular with extremists.

Examples of good equipment that can identify TATP include the Scintrex EVD 3100 and 3500, but the EVD 3000, which is still widely sold, cannot detect TATP, and will leave you exposed if you are using it.

And don’t rule out extremist use of chlorate/sugar mix low explosives (usually beyond the detection capabilities of many equipments), which, as demonstrated by the IRA in Belfast in the 1970s, have the ability to demolish an entire building under certain conditions.
>

Door Lock Glossary

http://www.securefastplc.net/Terminology

(If you should ever want to engage in coversation with a door lock specialist)

Creating Dynamic Return on Security Investment

In the Specifying Technology session on the Security Management Stage 2 Course, 28 June – 9 July 2010, (for details click here or contact Janet), much emphasis is placed on how to create dynamic return on security investment by selecting technical security solutions that have payback into other areas of the business. For example IP CCTV which can serve as the backbone for corporate-wide voice over Internet telephony services, the single card initiative which, by allowing staff to securely access their own personal records via the network, can dramatically reduce internal telephone enquiry calls and associated manpower etc.

RFID is one such technology which, while making rapid inroads into security, also has many other non-security applications. Read the following article for an example:

http://www.rfidjournal.com/article/articleview/3022/1/1/

The Pigeon That's Quicker than Broadband - And More Secure?

In a race to transfer four gigabytes of data securely between two company offices 80km (50 miles) apart, pigeon Winston arrived with his encrypted memory stick in 2hr 6min 57sec - when the rival download was only four per cent complete. A pigeon: better than a dodgy internet connection? With practice, Winston's trainers think he can get the flight down to 45 minutes, against six hours by internet.

Full story: http://www.metro.co.uk/news/734273-the-pigeon-thats-quicker-than-broadband

New Line-Up at ARC

If you have attended an ARC course in the past 6 months, you may have noticed a change to the training team line-up. In mid-2009 Barry Vincent BSc (Econ), MA, MSc joined the team, and is now one of the principal presenters on the university-accredited Security Management Stages 1-3 courses.

Barry is a highly experienced security professional, who has impressive academic credentials, including an MSc in Security and Risk Management. A former police divisional commander in London, he has previously held the position of Head of Security of the distribution and supply chain for the UK’s leading retail company. More recently, he had responsibility for that company’s business continuity and crisis management arrangements, developing scenario planning and training for operational directors.

Barry is passionately committed to helping security managers develop professionally through education, and course delegates are discovering that he is an excellent mentor, who takes a very keen interest in each and every course member.

Barry will be the course leader for the forthcoming Security Management Stage 1 Course, 15-26 March 2010. The course is filling rapidly, with just 4 places left, so please contact Janet if you are considering attending.

Detecting Liquid Explosives - Is a Solution Imminent?

Scientists say they have developed a quick technique for detecting liquids that could be used as explosives, according to the BBC. If commercialised, the new method could potentially end restrictions on liquids carried onto commercial airlines. The light-based approach uses cheap components and can reliably identify a range of liquids in just one-fifth of a second, the German scientists say.

With terrorism risk high on the agenda of many companies, ARC will be conducting its first Countering Hostile Reconnaissance and Countering Terrorism Course, 24-28 May 2010. The course is led by two UK police-trained counter-terrorism security advisors, who have operational experience in this field both in the UK and overseas. This is a rare, not-to-be-missed opportunity to study with experienced practitioners who have first-hand experience of terrorism reconnaissance and attack tactics.
For more information contact Janet or go to http://www.arc-tc.com/pages/SpecialisedSecurityCourses.asp#chr

Inadvertent Data Losses Unacceptable, Warns Commissioner

Information security, ostensibly the realm of IT professionals, is not being adequately addressed in many organisations, according to the UK Data Commissioner. So worried is he about the handling of personal private data in particular, that he intends to impose fines on the worst offenders, beginning this year.

Personal private data stored on unencrypted laptops, absence of controls to stem the proliferation of personal flash drives, careless disposal of old hard drives, printouts dumped in waste bins are all to blame. And some of the worst offenders find themselves permanently named and shamed on websites that campaign to promote the “public interest”, sometimes as a result of insider leaks.

The complexities around protecting information in all of its forms are covered on all three of ARC’s flagship security management courses, Stages 1-3, which run regularly throughout the year in the UK and overseas. For details contact Janet or go to http://www.arc-tc.com/pages/university_acredited_sm.asp#sm1

Alternatively, if you would like to arrange a consultancy meeting with an ARC specialist to help identify exposures and remedies, contact David.

What to Do if You are Kidnapped

If you are kidnapped and there's a rescue attempt, do not help the rescue force or attack the captors. When a force comes into a situation, they're looking for violent or nonviolent behavior. They're looking at hands, because hands carry weapons. If you make an aggressive movement, depending on the lighting, you could be seen as being violent toward them. Stop moving and hit the ground. Do exactly as you are told.
These and other words of wisdom are presented in an article entitled “What to Do if You are Kidnapped”, which can be accessed at http://www.csoonline.com/article/220722/How_to_Act_If_You_re_Kidnapped. Kidnap Risk Reduction and Response is one of 15 different subjects covered on the postgraduate university-accredited Security Management Stage 3, a strategically-focussed course which takes place in the UK, 10-21 May 2010. Click here for details. For more information, contact Janet.

Personal Security Abroad

Excellent personal security advice for expatriates living abroad can be found in the Q4 newsletter of the American Chamber of Commerce in Indonesia. The advice focuses on Indonesia, but much of the best practice can be applied to many different countries. Go to the following link to download:
http://www.amcham.or.id/publications/ee

Personal security abroad and business travel security are among the subjects covered in detail in the postgraduate-accredited (NQF Level 7) advanced-level Security Management Stage 2 Course, which takes place 28 June – 9 July in the UK, and at different times at regional training centres around the world. Contact Janet for details.

For Business Travel Security resources, including specific country risks advice, go to: http://www.arc-tc.com/pages/resources_publications.asp#B

Cyber Warfare Warning to Critical National Infrastructure

President Obama has warned that al-Qaeda and other groups have threatened computer warfare, with critical national infrastructure at high risk. The US also accuses at least two foreign powers of planting software in the US electric grid that could shut it down in times of increased tension.

Acts of terror today, he said, could come "not only from a few extremists in suicide vests, but from a few key strokes of a computer - a weapon of mass disruption."

For the full story, click on the following link:
http://news.bbc.co.uk/2/hi/americas/8073654.stm

Could DVDs Return as a Standard Means of Digital CCTV Recording?

Despite its significant drawbacks, one of the security comforts of analogue CCTV was that we could secure tapes with a reasonable degree of confidence that nobody was copying or otherwise tampering with the recordings. No so digital recording! Will the following story facilitate a return to physically secured digital media?
http://news.bbc.co.uk/2/hi/science/nature/8060082.stm

How Much Can You Earn in Security Management?

Want to know if you are earning are on a par with other security managers? Contact David for the latest edition of the SSR Security Manager Salary Survey.

Looking for a security job in the UK? Find out what recruitment experts SSR have to say at:

http://www.ssrpersonnel.com/getting-a-job-in-the-uk-security-industry.html

Corporate Security Experts Gather

19 security managers from sub-Saharan Africa gathered in the beautiful Jonkershoek Valley in Stellenbosh, South Africa, during the period 5-16 October 2009, to participate in the advanced-level Security Management Stage 2.

The course was a huge success, with one of the participants commenting that the course “should be compulsory for all security managers”!

To find out how you can have the very best of ARC’s security management courses on-site, contact Janet.

How to Catch a CV Cheat

A survey by Powerchex in 2008 found that one in every six CVs contains some form of discrepancy, usually related to dates of past employment, academic and professional qualifications and/or undisclosed appointments.

The Fraud Advisory Panel, a leading ‘Think Tank’ on issues relating to fraud, has come up with a plan to help businesses ensure they take proper precautions when negotiating the difficult process of recruitment, and at least make sure the applicant is not giving you a false impression of his or her identity and background. This plan takes the form of a check list of things that prospective employers should be thinking about.

Go to http://www.info4security.com/story.asp?sectioncode=10&storycode=4123194 for an informative article on this problem.

CPP Successes Around the World

In October 2009, 11 security management professionals from Shell Nigeria spent two weeks in Abuja studying for the ASIS CPP and PSP certifications under the guidance of David Cresswell. The programme, the culmination of many months of a guided distance learning programme, was very intensive and the thousands of pages of text to study meant that sleep was in short supply.

But the end justified the means: not only did the security management knowledge of the participants increase immensely, but nine of the eleven candidates passed their respective exams first time - this is sigifcantly higher than the average first time pass rate for this difficult, but prestigious international security management certification examination.

This year, a further 50 candidates are currently studying under David's guidance, or are preparing to do so. For more information on ARC's range of CPP and PSP study options contact Janet.