Offering the CSMP - Certified Security Management Professional distance-learning award www.ismi.org.uk
Wednesday, December 5, 2007
David Cresswell and Phil Wood MBE Pass PSP Certification
Early indications of PSP and CPP results indicate that 2007 could be a record year for passes, with 11 out of the 12 candidates who have so far opened their envelopes being greeted with good news.
For information on how to take part in the 2008 CPP and PSP certification programmes, contact Janet.
Security Management Training Focus: Leading Asian Security Professionals Meet in Dhaka
The course, hosted by BAT Bangladesh, is the second held in the country after this year’s Security Management Stage 1 course, with many delegates returning for another taste of the action. Phil reports that debate and discussion is “lively and productive, with many innovatve thoughts and ideas being produced by this very talented and intelligent group of corporate asset protection specialists”. David will complete the round of ARC courses for Asia in February 2008 with Security Management Stage 2 in Kuala Lumpur.
If you would like more information on these or any other of ARC’s courses either overseas or in the UK, please contact Janet.
Wednesday, November 28, 2007
Slovak News Agency Reports That Smuggled Enriched Uranium Has Been Seized in Operation in East of Country
Slovak police spokesman Martin Korch said the material was being examined and did not confirm a report carried by the Slovak news agency SITA that it was enriched uranium. "This one kilogramme should have been sold for $1 million US dollars," spokesman Martin Korch said. The spokesman said the police raid took place along the eastern part of the two central European countries' common frontier, near their borders with Ukraine. "Three people have been taken into custody, two in Slovakia one in Hungary," he said. "Further information will be provided tomorrow."
Uranium enrichment can yield either fuel for nuclear power stations, or be used for nuclear warheads.
Handhelds, Laptops Increase IT Security Worries, Survey Finds
Organizations that do not train their mobile workers in security fundamentals are doing themselves a great disservice. Nearly 90 percent of organizations that have implemented awareness training for remote and mobile workers believe that the number of security breaches they’ve encountered has been reduced.
How to Terror-Proof Shopping Centres and Other Buildings (According to BBC News)
Cannons to stop potential vehicle bombs in London?
Technology that screens people walking into airports, to tell in a split second whether an individual carries explosives or traces of explosives?
Protective water walls that spring up from the pavement?
Click here for more.
Security Management Training
While week 1 focussed on the core issues of security risk management, security operational management and physical security design, week two has included a day-long workshop on Protection against Explosive Devices, Crisis Management, Special Event Security, Security Investigations, Drug and Alcohol Misuse, and Leadership.
The nest Security Management Stage 1 Course takes place 31 March – 11 April 2008. Contact Janet for details.
Insider Fraud - The Enemy Within
Of 127 organisations surveyed by CIFAS, the UK's fraud prevention service, only two had not experienced insider fraud.
Organised criminal gangs are increasingly involved in cases of insider fraud. Their activities include convincing or coercing existing employees to act on their behalf, or infiltrating the organisation with an inside person, often a temporary worker. They are particularly interested in compromising the organisation’s customers.
Criminals have been known to hang around pubs and cafes near target organisations seeking disgruntled employees, while ‘smoke free’ legislation has had the unfortunate effect of providing gangs with the opportunity to target staff taking cigarette breaks on the street.
The lack of employee recruitment checks and controls in some organisations lies at the heart of the employee fraud problem. The research showed the importance of companies ensuring that the checks they carry out on potential employees are more rigorous than those they undertake when opening new accounts for customers.
The full report can be downloaded here.
Tuesday, November 27, 2007
"MI5 - Not Nine to Five"
Monday, November 26, 2007
Laptop Theft - A Recovery Solution?
A multi-layered security strategy is required to protect computer hardware and the data on it. With a few proactive data security steps, organizations can avoid the potential lawsuits, fines, public scrutiny and loss of business that a lost or stolen computer can cause.
Over 97% of stolen laptops are never recovered, but Absolute Software have come up with what seems to be a reasonable solution, by configuring laptops so that, if stolen, they broadcast their location as soon as they are reconnected to the Internet, allowing law enforcement to take action to recover the equipment.
Absolute Software’s site provides some useful general tips for better laptop security. Click here.
Can You Trust Your Security Guards?
The pilots were flying two million dollars in cash from the capital Port Moresby to a bank in Western Province on Monday when the two security guards accompanying them pulled out their guns and demanded they land.
Don’t Give Away Your Most Secret Company Data
Luckily, there are also plenty of programs available on the internet which can cleanse drives of all data, in accordance with US department of Defense Standard 5220.22-M, which stipulates what is called a “low level format”.
Read how to destroy data beyond recovery at:
http://www.pcworld.com/article/id,110338/article.html
http://www.techsoup.org/learningcenter/software/page5726.cfm
Before Selecting Antiterrorism or Anti-Ramraiding Vehicle Blockers.....
In the US, anti-terrorism barriers should conform to the “K” rating appropriate to the design threat reference determined for a specific facility. “K” ratings are indicated in ARC Training slide, above.
In the UK, Publicly Available Specification (PAS) 68 has been prepared to address the needs of organizations who wish to have assurance that vehicle blockers will provide the level of impact resistance that they seek. The standard has been developed because of the need for a comparative means of assessing the performance of the many different types of vehicle barriers now available.
* The vehicle impact method
PAS 68 identifies impact test tolerances and vehicle performance criteria that need to be met in order to conform to it. Design guidance is provided in PAS 69:2006.
Two Former Heads of Security for Leading UK Retailers Launch Retail and Supply Chain Security Management Training Course
Get Your Business Contingency and Continuity Plans in Order Now – Nuclear Attack Inevitable, Warns Scottish Police CBRN Chief
A nuclear attack by terrorists causing widespread panic, chaos and death is inevitable and will happen soon, a senior Scottish police officer has warned in a report published by the Scottish Sunday Herald.
Ian Dickinson, who leads the police response to chemical, biological and nuclear threats in Scotland, has painted the bleakest picture yet of the dangers the world now faces. Efforts to prevent terrorist groups from obtaining materials that could be made into radioactive dirty bombs - or even crude nuclear explosives - are bound to fail, he said. And the result will be horror on an unprecedented scale.
Dickinson's nightmare analysis was backed up by Dr Frank Barnaby, a nuclear consultant who used to work at the Aldermaston Atomic Weapons Establishment in Berkshire. "The amazing thing is that this hasn't happened already," he told the Sunday Herald. "We should expect it any minute. It's an obvious thing for a terrorist to do. A primitive nuclear explosion would simply eliminate the centre of a city like Glasgow or Edinburgh."
Richard Hoskins, from the International Atomic Energy Agency's Office of Nuclear Security in Vienna, revealed that there had been 1266 confirmed incidents in which radioactive materials had been stolen or lost around the world since 1993.
"As the terrorists look for the next spectacular attack, we know that al-Qaeda in Iraq is calling on nuclear scientists to join in the jihad," said William Nye, director of counter-terrorism and intelligence at the Home Office in London.
For the text of the full Sunday herald report click here.
Sunday, November 25, 2007
Spring on the Island of Love?
If you can’t make this course, Peter will be conducting a further Security Surveying and Design Course in the UK, 21-25 April.
For further information and to reserve a place, please contact Janet.
Check Out the UK Security Standard for Your Specialism
To access the security-related standards produced to date click here.
Majority of Information Security Budgets Now Under the Control of the IT Department, New Study Reveals
Read on here.
Terrorism and Energy Security
http://www.mipt.org/terrorism/MIPT-Publications.asp
One, entitled Terrorism and Energy Security, makes a particularly interesting read. The report focuses not just on practical issues to secure the oil industry, but on the issue of energy security in general, which it defines as:
Energy security refers to the continued, reliable availability of such energy sources in sufficient quantities at reasonably stable and acceptable costs to importing countries and consumers. By implication, it also means the security of those infrastructures that lie between the point the energy is extracted and the consumer – pumps, pipelines, refineries, ships, trucks, storage tanks, gas stations, etc.
To download the Terrorism and Energy Security report click here.
Protecting Critical Infrastructure
Historically, critical infrastructure has had a very physical feel – it could be seen. And physical security was usually the remedy to security threats. But now the protection of critical infrastructure has moved from defending “things” to defending “processes”. And many of the most potent threats have migrated to domains outside the traditional security management arena.
The US Government Accountability Office concludes: Critical infrastructure control systems face increasing risks due to cyber threats, system vulnerabilities, and the serious potential impact of attacks as demonstrated by reported incidents. Threats can be intentional or unintentional, targeted or non-targeted, and can come from a variety of sources including foreign governments, criminal groups, terrorists, and disgruntled organization insiders. Control systems are more vulnerable to cyber attacks than in the past for several reasons, including their increased connectivity to other systems and the Internet.
Critical infrastructure owners face both technical and organizational challenges to securing control systems, and significant security vulnerability exposures exist largely due to lack of user awareness of how easy it is for those with malicious intent to break into and take control of such systems.
Click here for a copy of a recent US Government report on the subject.
Friday, November 23, 2007
Pandemics - Bugs and Business Continuity
Coincidentally, the UK health secretary has revealed plans to protect vulnerable people against an influenza outbreak this winter.
Wednesday, November 21, 2007
Work-Based Learning Corporate Security Management MSc in Asia
This will be the third of three security management courses held in Bangladesh, with many of the 14 participants working towards their MSc Work-Based Learning Studies (Corporate Security Management).
Upon completion of the SM3 course participants who have progressed through SM1 and SM2 will be half way to achieving their degree from Middlesex University, and will now progress to the final distance-learning stages.
Security Consultancy an Increasingly Important Business for ARC Training
Peter Horsburgh CPP PSP, who leads the Consultancy Division, is well qualified to deliver consultancy in a wide range of security management contexts. As a former twice head of corporate security, requiring the management of complex projects, Peter is ARC’s lead trainer on the very popular 5-day Security Surveying and Course and also the Physical Security Professional Certification (ASIS) course, designed to enhance managers’ abilities to specify security systems and manage the associated projects.
ARC can deploy an extensive range of consultants in a wide variety of security management specialisms. Contact David for more information.
Security Management Training Focus
Tuesday, November 20, 2007
University-Accredited Security Management Training in the UK
One of the challenges presented during the Security Operations Management session was how to better integrate security into the business and get better business “buy-in”. Participants offered the following suggestions:
• Security needs to have strong representation and local, business-embedded points of accountability across the business. Security should not be seen as the sole remit of the security manager.
• The security management recruitment strategy should place high priority on recruiting those who have strong interpersonal and influencing skills.
• Education and awareness programmes and campaigns using a range of available means.
• Development of on-line security tools for specific use at business line level.
• Involving the business in security surveys, especially through interviewing.
• Speaking the language of business – "money" and "business growth".
• Offering personal security advice to employees, whether in an “on-duty” or “off-duty” context.
• Involving line managers in the risk assessment team – or having a cross-functional security risk management committee
• Identifying a lead role for security managers in crisis management and contingency planning
• Awareness of the need to “go the extra mile” to dispelling stereotypical perceptions of the authoritarian “company cop”.
The course includes delegates from UK, Kuwait, Nigeria, Trinidad and Tobago, United Arab Emirates, Sudan, Qatar, Greece, Saudi Arabia and Oman, representing sectors as diverse as oil and gas, manufacturing, logistics, security printing, water utilities and shipping.
The next Security Management Stage 1 Course takes place 31 March – 11 April. Contact Janet for information and to reserve a place.
More than 50% of Computer Users Have Illegally Piggy-Backed onto Somebody Else’s Wi-Fi - Risking a 5 Year Prison Sentence!
Police regard wi-fi freeloading as a serious offence because IT intruders can download illegal pornography or hide their tracks when accessing sites that promote terrorism, without fear of being caught. The investigation trail invariably leads to the owner of the wi-fi connection, not the piggy-backing surfer.
Unprecedented Data Loss Prompts Resignations - Don't Let This Happen to Your Organisation!
This is the third high-profile data loss case concerning Revenue and Customs in recent weeks. In October another CD went missing, exposing customer details to identify theft. Revenue and Customs refused at that time to comment on whether the data was encrypted. Also in October, a laptop containing confidential customer data was stolen from an employee’s car, a type of incident which has recently be described by the UK Information Commissioner as “gross negligence” on the part of the laptop owner.
Do not jeopardise the job of your own CEO (and your own job!) by allowing this to happen in your organisation. Security safeguards are relatively straightforward to implement. For example, ensure that there are security protocols in place for identifying and labelling sensitive computer data, downloading such data to portable media and for sharing and mailing with outside agencies. At very least, this should include 256-bit encryption of anything which could be deemed as personal identify information.
Ensure, also, that all such information on laptops or employees’ home computers is protected with at least 256-bit encryption, which is relatively inexpensive.
Security managers seeking to gain a greater understanding of information protection, laptop security and encryption may wish attend the regular Information and IT Security Workshops, which are part of ARC Training’s Security Management Stage 1 Course. Forthcoming dates for the Information and IT Security Workshops are:
7 April 2008
11 August 2008
24 November 2008
Monday, November 19, 2007
Surveillance Tagging for Children – Possible Business Applications
- Radio frequency identification, whereby an alarm will be activated if a tagged child wanders beyond a reader. Tags cost around £40 and a reader up to £300.
- For ultra-surveillance, there is the "personal companion" - a gadget which enables parents to tail their offspring when they leave the house. It uses satellites and mobile phone technology, and parents can be updated via their computer or mobile phone.
Devices such as the latter are also being used to tag courier items and mail bags. Can you think of additional business uses for either of the above technologies?
Cyberloafers - Stealing Your Time and Profits!
Online purchasing and Instant Messaging were identified as two of the biggest distractions for workers, although the research found that 80% believe that communicating with family and friends through Instant Messaging actually improves their productivity. A further 87% of respondents admitted to making private purchases during working hours.
22 November 2007
7 April 2008
11 August 2008
24 November 2008
Contact Janet for details.
Security Guard Caught Staging Raid on His Own Van!
Sunday, November 18, 2007
Forensic Analysis of a Suspect Employee's Computer Has Proven to Be a “Quick Kill” on Many Investigations
"IT vulnerability is the corporate jugular vein."
"Many organisations are hopelessly unprepared to tackle internal IT crimes such as fraud and information theft."
"Information theft is predominantly an insider risk, with vastly more confidential information removed from the workplace by employees than by hackers."
"No hacker, virus writer or other cyber deviant have ever come close to causing the collapse of any major institution. By contrast ther disasters which befell Bairings, Daiwa, BCCI, Worldcom, Enron, Tyco, Xerox, Orange County and Allied Irish Bank were all the result of internal fraud, corruption or unsupervised speculation, committed by trusted employees."
"Profound and irreversible mistakes have been made by organisations investigating IT-based fraud because initial actions taken at the scene were fundamentally wrong and ill-advised."
"Business is increasingly litigious. Electronic disclosure, where computer evidence is routinely introduced in litigation, is gaining a foothold in many national jurisdictions."
"Forensic analysis of a suspect’s computer has proven to be a “quick kill” on many investigations."
The course is intended for those whose role may in some way involve the detection and investigation of internal crimes committed against or using company IT resources. No prior IT knowledge is required and the course is ideally suited to Security Managers and investigators. Contact Janet for details.
Italy and USA Make the “Top 10” Kidnap League Table for October
The monthly Clayton K&R Extortion Monitor publishes details of known incidents of kidnap, but cannot be taken as a true indicator of employee or business travel kidnap risk since the nature and targets of kidnap vary from country to country.
The reports do not include data from Iraq.
Monitors can be downloaded from:
http://www.claytonconsultants.com/
Unlimited Fines for Individuals Who Lose Laptops Containing Sensitive Personal Data?
The legislation would be aimed initially at healthcare workers who might, for example, leave a laptop in a car from where it is stolen. This, according to Thomas, constitutes “gross negligence”. Thomas added that anyone holding sensitive personal data on a laptop should know the basics of encryption.
A second proposed law would empower officers of the Commissioner’s office to inspect companies without consent to monitor their compliance with data protection laws.
Security managers seeking to gain a greater understanding of information protection, laptop security and encryption may wish attend the regular Information and IT Security Workshops, which are part of ARC Training’s Security Management Stage 1 Course. Forthcoming dates for the Information and IT Security Workshops are:
22 November 2007
7 April 2008
11 August 2008
24 November 2008
Determining Which Perimeter Intrusion Detection System to Specify
The core challenge is specifying the correct sensor for a specific environment. Asking a supplier for advice is one option, but if the the supplier is tied into a particular product they will sometimes try to convince you that they have exactly the right product for you. In the experience of ARC consultants, many hundreds of PID systems worldwide are working less than satisfactorily because the wrong system has been specified for a given location.
- Security Management Stage 1, 31 March – 11 April , 4-15 August 2, 17-28 November
- ASIS PSP Review Course, 27-31 October
- ASIS CPP Review Course, 28 April – 2 May 2008, 27-31 October
2008 Training at the Landmark Burj Al-Arab Hotel, Dubai
The course is being arranged by ARC’s Arabian Gulf representative, Precept Management Consultancy. For more information please contact Precept.
Wednesday, November 14, 2007
Business Continuity – Some Continuity Errors
Whilst 56 percent of respondents believe that their business continuity management policy is generally ‘good’, 44 percent recognised that they were failing to entrench it into the fabric of their organisation. 86 organisations responded, but none was currently fully compliant with BS 25999, the new British Standard for business continuity management. To make matters worse, 41 percent of respondents felt that their business continuity plans were compromised by inadequate testing and review processes.
Perhaps the most important observations were made by Ron Miller, managing consultant at SunGard Availability Services, who said: “…business continuity management cannot and must not be the sole preserve of the IT department. Instead it needs to permeate through the whole business and be woven into the fabric of the organisation, with input and leadership from the highest level."
If your plans are lacking continuity elements, ARC can help you to improve them, with one-day BCM workshops available either as part of our Security Management Stage 2 Course or in-house at your location. For further details contact Janet.
Also, you can follow this link to Sungard’s excellent BCM site where you can undertake a self assessment of your BCM preparedness against the the current British Standard, BS 25999.
Be Careful What Your Employees are Looking at on the Web - Inciting Terrorism by Using the Internet to Become a Criminal Offence in the EU – Reuters
The European Commission will propose expanded EU legislation to fight what it says is growing use of the internet as a "virtual training camp" for terrorists as part of a package of measures. It is likely that the measures could be approved within days.
Justice and Security Commissioner Franco Frattini proposes creating an EU offence of "public provocation to commit a terrorist offence", that would apply to incitement even if it did not lead to an actual attack.
The report comes at a time when British intelligence services are warning that there are at least 2,000 people in the UK who pose a threat to national security because of their support for terrorism, the head of MI5 has said. This represents a 20% rise since 2006.
London Tops the UK League for ID Fraud, Reports Sky News
Figures showed 19 of the 20 postcode areas in Britain worst affected by the crime are inside the M25 - and the other one is just outside, in Maidenhead. CIFAS, an industry body that helps companies share information to fight fraud, compiled the list.
One of the fastest-growing areas of identity theft is called "current address fraud", which sees the victim scammed by someone living at the same address as them. The crook applies for and uses products in the name of the victim - who could be a next-door neighbour in their block of flats - and then intercepts their post.
Internet Drives Companies’ Critical Information beyond the Security of Corporate Data Management Systems
In the current environment a security breach has the potential to impact a business’s bottom line damaging its reputation, customer loyalty and profitability, and personal identity information is at the top of the IT attack shopping list for organised criminals.
A paper, produced by Oracle, presents an overview of the security considerations that need to be taken into account in order to secure data. It is an excellent guide for “generalist” security managers seeking to gain a better understanding of IT and data security issues. Obviously, it concludes with an Oracle solution, but since readers of this blog are generally not IT security budget holders, this techie bit can be ignored.
Contact David to get hold of a copy.
Cut Through the Jargon and Specify CCTV with Confidence
The high resolution imagery allows the network camera to substitute up to twenty four analogue cameras, thereby reducing the total cost of installation. Power is drawn from a low cost Power-over-Ethernet switch removing the need to supply a separate power supply. The camera delivers full motion progressive scan 1600 x 1200 video at 22 fps with all four channels in parallel. It can also offer 88fps with 800 x 600 resolution. Onboard real-time motion detection with size and sensitivity controls for up to 64 separate motion detection zones per channel is supplied as standard. Advanced features include concurrent transmission of different frame formats and simultaneous delivery of multiple zoomed and full field of view video streams at full frame rates. The software also allows for post-event zoom-in capability from archived footage, concurrent full field of view and high-quality zoom.
Sounds fantastic but can it do what you want it to do – augment manpower, reduce crime and detect adversaries?
Join security management colleagues from around the world in learning how to interpret technical specifications and to specifying security systems that match the performance requirements of your specific risk circumstances on ARC’s new Specifying Security Technology Course, 21-25 July 2008. Contact David for details.
(Alternatively, spend thousands of dollars on cameras that you don’t need!)
Tuesday, November 13, 2007
Professionals Gather in Lagos, Nigeria, for Security Management Training
Peter Horsburgh CPP, PSP, the course leader, said ‘We were delighted to be able to take this opportunity to contribute to the growth of our fellow security professionals in Nigeria. The widespread support for this course demonstrates that companies in this region have a real commitment to excellence and to the development of their people.’
Time to Equip Security Guards with Armoured Vehicles and Large Calibre Weapons
The latest design basis threat for US nuclear facilities envisages an attack on a facility by a “large and more capable group of attackers”. Utilising large groups of attackers poses significant problems for a terrorist group, not least because the chances of the mission being compromised by intelligence services are that much greater, but 9/11 is testament to Al-Qaeda’s determination to attempt this if it can be justified by the desired end result. And a nuclear release in a Western country would certainly fit Al-Qaeda’s strategy.
But it may not be necessary to attack such a facility if Al-Qaeda can get hold of the some of the allegedly 40kg of weapons-useable uranium which has been stolen from facilities worldwide over the past decade or so.
A report by the US-based Stanford Database on Nuclear Smuggling, Theft and Orphan Radiation Sources identified 700 illicit radioactive material trafficking incidents during the period 1991-2002. The report cites insiders as posing the greatest threat. Insiders, according to the report, “include civilian employees at facilities that house nuclear material or radiation sources, military personnel, and security guards.
Contact David if you would like a copy of the SDNS report Nuclear Smuggling Chains: Suppliers, Intermediaries, and End-Users.
UK Police Classifications of Kidnap
http://news.bbc.co.uk/1/hi/northern_ireland/6920668.stm
http://news.bbc.co.uk/1/hi/northern_ireland/6124272.stm
http://news.bbc.co.uk/1/hi/uk/4743532.stm
Criminal Vendetta – At present, these are the most common types of kidnappings in the UK and can be associated with the use of extreme violence and torture. It is likely that the offender is known to the victim / hostage as well as the motive behind the offence, although the motive may not always be shared with the Police. In some cases, the victim will have tried to resolve the situation themselves and informing the police will be the last resort. The demand may be economic or could be commodity based (i.e. drugs) and may be more concerned with the principle rather than the monetary value.
People Trafficking – These incidents are often unreported due to the immigration status of the victim / hostage and furthermore, the hostage may not necessarily want the Police involved due to the fear of repatriation. Similarly these offences are often characterised by the use of extreme violence / torture or rape and hostages may be forced to work in the sex industry.
International – With these types of kidnap the hostage is taken abroad and consequently there is a lack of control over all aspects of the investigation for UK Police. Due to this, there is a need for international co-operation from foreign law enforcement.
Another Warning about the “Insider Threat” - This Time from the FBI
"If we lose the Internet, we do not simply lose the ability to e-mail or to surf the Web. We lose access to our data. We lose our connectivity. We lose our intellectual property. We lose our security. What happens when the so-called 'Invisible Man' locks us out of our own homes, our offices, and our information?"
"The threat is not limited to hackers on the outside. Insiders present a significant problem. Contractors may take the appropriate security measures, but what about those with whom they subcontract and their subs?”
Mueller drew particular attention to the threat from terrorists, cyber blockades, botnets and hackers.
The insider threat, particularly in regard to IT sabotage, is a recurring concern of those organisations which make up critical national infrastructure.
For the full news article, click here.
Terror Threat to Shopping Malls, Warns FBI
Al-Qaeda-Linked Arrests in Nigeria
The official said the suspects had been on the verge of carrying out attacks when they were detained, and demonstrated a photograph of materials allegedly seized from the suspects showing four bags of fertilizer, seven sticks of dynamite, a combat rifle and detonators.
Osama bin Laden is reported in one of his messages to have named oil-rich Nigeria as a country ripe for liberation from Western influence, and periodically the U.S. Embassy in Nigeria issues terror attack warnings.
According to the BBC, Nigeria has not suffered a terrorist attack and despite occasional arrests of suspected Islamic militants there is no evidence of al-Qaeda in Nigeria.
Monday, November 12, 2007
“An Extremely Worthwhile Investment of My Time”
“The investigation role-play was extremely valuable”
“A great learning curve”
The course, which was delivered by Angus Darroch-Warren and David Gill, covered the essentials of security investigations, including how to manage an investigation, investigation methodology, how to prepare a case, how to interview, evidence handling, civil and criminal law, the law of England and Wales, disciplinary practice and procedure, and how to present a case.
In developing the programme, Angus and David paid close attention to the National Occupational Standards for investigators, which can be accessed by clicking here.
The next Investigation and Interviewing Skills Course will take place 10-13 March 2008, followed by a further course 3-6 November. Contact Janet for more information or to reserve a place.
Wi-Fi Security System Is 'Broken' - BBC
Are your executives processing business information at home using wi-fi?
Are your laptop holders accessing wi-fi hotspots in hotels, airports and railway stations?
Are you transmitting CCTV images over wi-fi?
"WEP (wired equivalent privacy), the basic security encryption for wi-fi networks is so broken that your (and everyone else's) kid sister can easily circumvent it," according to computer security researcher Ralf-Philipp Weinmann, co-author of the aircrack-ptw tool that can crack WEP in minutes.
Read on at:
RFID: The Way Forward or an Exposure Which Could Cripple a Business Logistics Operation?
Read about the alleged susceptibility of RFID tags to virus transmission at:
http://www.rfidvirus.org/
A Lifetime of Beer if You Can Find the Stolen Laptop
Owners were desperate to retrieve the computer containing designs, contact details and financial information. The company has back-up copies of the material stored on the laptop but these are not up to date, the Rotorua Daily Post said.
They have offered a lifetime’s free beer to anyone giving clues leading to its recovery.
Check Your Credit Card Statements Carefully – It May Be Too Late Once You Are Arrested for Promoting Terrorism!
http://www.identity-theft.org.uk/protect-yourself.htm
http://www.vnunet.com/computeractive/features/2138242/identity-theft-facts
But the consequences of falling victim to ID theft may be worse than financial. What if someone steals your identify to access illegal paedophile services on the web? Moreover, ID theft is increasingly being used to finance terrorism. During a raid on the house of an Al-Qaeda associate in London in 2005, police discovered that stolen credit card details had been used to pay for internet sites to which had been posted jihadist training manuals, beheading videos and other inflammatory materials, including advice on how to hack sites.
Under new EU proposals setting up websites that encourage violence or explain how to make bombs will become a criminal offence, and the first port of call for the police is obviously going to be the owner of the credit card that paid for the site!