Security by Industry

 

 

https://adminsm.asisonline.org/Pages/Book-Review-Maritime-and-Port-Security.aspxBook Review: A Practitioner’s Guide to Effective Maritime and Port SecurityGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a43444652019-02-15T05:00:00ZMichael Edgerton, CPP; reviewed by William Crews, CPP<p>​Wiley; <a href="https://www.wiley.com/en-us/A+Practitioner%27s+Guide+to+Effective+Maritime+and+Port+Security-p-9781118633151" target="_blank">wiley.com;</a> 296 pages; $75.95.</p><p>This book is directed at those practicing maritime security in the international environment and it fulfills that goal quite well. Readers will learn about the global supply chain and the important role maritime security plays in it. Author Michael Edgerton, CPP,​ has worked in the maritime industry for more than 25 years and bases his  recommendations on the premise that enhancing security promotes international trade.​</p><p>The text is broken down into four distinct sections that analyze the operating environment, threats, current approaches to security, and, finally, principles for effective risk-based maritime and port security. The chapters on conducting security risk assessments and threat assessments provide very good tools for those readers that may need to engage in these activities at their facilities.  </p><p>A detailed guide for students learning about the subject, it would also be a valuable reference for the port security specialist in any international port. </p><p>One current threat topic that was not discussed in any depth is the ever-growing cyber threat in the maritime community. Recent attacks have crippled international maritime logistics companies as well as seagoing vessels. Perhaps this topic could be considered for a second edition of the text. </p><p>Reviewer: <em>William (Bill) Crews, CPP, is president and owner of Security & Resilience Consulting LLC, in Houston, Texas. He has been a member of ASIS for 20 years and earned his CPP designation in 2003. He served as director of port security and emergency operations for the Port of Houston Authority from 2008 to 2011.</em><em>  </em><em>During his tenure, Houston was the third-largest port in the U.S. for total cargo and the second-largest petrochemical port in the world next to Rotterdam.</em></p>

 

 

https://adminsm.asisonline.org/Pages/An-Amenity-of-Necessity.aspx2019-02-01T05:00:00ZAn Amenity of Necessity
https://adminsm.asisonline.org/Pages/FLASHBACK-April-1965-Vol-9-No-2.aspx2019-01-01T05:00:00ZFlashback
https://adminsm.asisonline.org/Pages/Shooing-off-Copper-Crime-Waves.aspx2018-11-01T04:00:00ZShooing off Copper Crime Waves

 

 

https://adminsm.asisonline.org/Pages/The-Intoxication-Issue.aspx2019-02-01T05:00:00ZThe Intoxication Issue
https://adminsm.asisonline.org/Pages/Book-Review-Surgery-Center-Safety.aspx2018-12-01T05:00:00ZBook Review: Surgery Center Safety
https://adminsm.asisonline.org/Pages/Book-Review-Urban-Emergency-Management.aspx2018-12-01T05:00:00ZBook Review: Urban Emergency Management

 

 

https://adminsm.asisonline.org/Pages/Data-Driven-Traffic-Management-Solutions.aspx2018-12-01T05:00:00ZData-Driven Traffic Management Solutions
https://adminsm.asisonline.org/Pages/December-2018-Industry-News.aspx2018-12-01T05:00:00ZDecember 2018 Industry News
https://adminsm.asisonline.org/Pages/Maritime_Maladies.aspx2018-12-01T05:00:00ZMaritime Maladies

 

 

https://adminsm.asisonline.org/Pages/FLASHBACK-April-1965-Vol-9-No-2.aspx2019-01-01T05:00:00ZFlashback
https://adminsm.asisonline.org/Pages/Dancing-With-Yourself.aspx2018-12-01T05:00:00ZDancing With Yourself
https://adminsm.asisonline.org/Pages/Transport-to-Transhumanism.aspx2018-12-01T05:00:00ZTransport To Transhumanism

 

 

https://adminsm.asisonline.org/Pages/FLASHBACK-April-1965-Vol-9-No-2.aspx2019-01-01T05:00:00ZFlashback
https://adminsm.asisonline.org/Pages/Maritime_Maladies.aspx2018-12-01T05:00:00ZMaritime Maladies
https://adminsm.asisonline.org/Pages/January-2018-Industry-News.aspx2018-01-01T05:00:00ZJanuary 2018 Industry News

 

 

https://adminsm.asisonline.org/Pages/Resilience-Trends.aspx2016-09-01T04:00:00ZResilience Trends
https://adminsm.asisonline.org/Pages/Required-License-to-Operate.aspx2015-02-01T05:00:00ZRequired: License to Operate
https://adminsm.asisonline.org/Pages/chemical-facilities-tackle-explosive-problem-0013191.aspx2014-03-01T05:00:00ZChemical Facilities Tackle an Explosive Problem

 

 

https://adminsm.asisonline.org/Pages/February-2019-Industry-News.aspx2019-02-01T05:00:00ZFebruary 2019 Industry News
https://adminsm.asisonline.org/Pages/A-Global-Safety-Plan-Protects-Corporate-Travelers.aspx2019-01-01T05:00:00ZA Global Safety Plan Protects Corporate Travelers
https://adminsm.asisonline.org/Pages/January-2019-Industry-News.aspx2019-01-01T05:00:00ZJanuary 2019 Industry News

 

 

https://adminsm.asisonline.org/Pages/A-Global-Safety-Plan-Protects-Corporate-Travelers.aspx2019-01-01T05:00:00ZA Global Safety Plan Protects Corporate Travelers
https://adminsm.asisonline.org/Pages/Wellspring Of Safety.aspx2019-01-01T05:00:00ZWellspring Of Safety
https://adminsm.asisonline.org/Pages/Something-in-the-Water.aspx2018-11-01T04:00:00ZSomething in the Water

 

 

https://adminsm.asisonline.org/Pages/Guidance-on-Threat-Assessment-Teams.aspx2019-01-01T05:00:00ZGuidance on Threat Assessment Teams
https://adminsm.asisonline.org/Pages/Resourceful-Relationships-.aspx2019-01-01T05:00:00ZResourceful Relationships
https://adminsm.asisonline.org/Pages/Access-With-A-Twist.aspx2018-12-01T05:00:00ZAccess With A Twist

 

 

https://adminsm.asisonline.org/Pages/Book-Review---Financial-Investigations.aspx2018-08-01T04:00:00ZBook Review: Financial Investigations
https://adminsm.asisonline.org/Pages/Giving-Security-Credit.aspx2018-05-01T04:00:00ZGiving Security Credit
https://adminsm.asisonline.org/Pages/The-Fraudians-Slip-In.aspx2018-03-01T05:00:00ZThe Fraudians Slip In

 

 

https://adminsm.asisonline.org/Pages/The-Intoxication-Issue.aspx2019-02-01T05:00:00ZThe Intoxication Issue
https://adminsm.asisonline.org/Pages/Haunting-After-Heroism.aspx2019-01-01T05:00:00ZHaunting After Heroism
https://adminsm.asisonline.org/Pages/How-To-Investigate-MeToo.aspx2019-01-01T05:00:00ZHow to Investigate #MeToo

 

 

https://adminsm.asisonline.org/Pages/A-Global-Safety-Plan-Protects-Corporate-Travelers.aspx2019-01-01T05:00:00ZA Global Safety Plan Protects Corporate Travelers
https://adminsm.asisonline.org/Pages/Gaming-Security-Patrons-Players-And-Cheats.aspx2018-12-01T05:00:00ZGaming Security: Patrons, Players, And Cheats
https://adminsm.asisonline.org/Pages/SHOOTING-AT-BORDERLINE-BAR-IN-THOUSAND-OAKS,-CALIFORNIA.aspx2018-11-08T05:00:00ZBreaking News: Shooting at Borderline Bar in Thousand Oaks, California

 

 

https://adminsm.asisonline.org/Pages/Five-Ways-to-Protect-Open-Air-Art.aspx2018-12-01T05:00:00ZFive Ways to Protect Open-Air Art
https://adminsm.asisonline.org/Pages/November-2018-Industry-News.aspx2018-11-01T04:00:00ZNovember 2018 Industry News
https://adminsm.asisonline.org/Pages/October-2018-Industry-News.aspx2018-10-01T04:00:00ZOctober 2018 Industry News

 

 

https://adminsm.asisonline.org/Pages/The-Fight-Against-Fake-Pharmaceuticals.aspx2015-02-01T05:00:00ZThe Fight Against Fake Pharmaceuticals
https://adminsm.asisonline.org/Pages/uncovering-smart-solutions-0013513.aspx2014-07-01T04:00:00ZUncovering Smart Solutions
https://adminsm.asisonline.org/Pages/online-pharmacies-0013326.aspx2014-05-01T04:00:00ZRogue Online Pharmacies

 

 

https://adminsm.asisonline.org/Pages/Book-Review-Maritime-and-Port-Security.aspx2019-02-15T05:00:00ZBook Review: A Practitioner’s Guide to Effective Maritime and Port Security
https://adminsm.asisonline.org/Pages/A-Global-Safety-Plan-Protects-Corporate-Travelers.aspx2019-01-01T05:00:00ZA Global Safety Plan Protects Corporate Travelers
https://adminsm.asisonline.org/Pages/Book-Review-Are-We-Safe-Enough.aspx2018-11-01T04:00:00ZBook Review: Are We Safe Enough?

 

 

https://adminsm.asisonline.org/Pages/Safer-Shipping.aspx2018-11-01T04:00:00ZSafer Shipping
https://adminsm.asisonline.org/Pages/Preventing-Port-Problems-.aspx2018-10-01T04:00:00ZPreventing Port Problems
https://adminsm.asisonline.org/Pages/Preventing-Port-Problems.aspx2018-10-01T04:00:00ZPreventing Port Problems

 You May Also Like...

 

 

https://adminsm.asisonline.org/Pages/21st-century-security-and-cpted-designing-critical-infrastructure-protection-and-crime-prev-0.aspx21st Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition.<div class="body"> <p> <em> <span style="font-size:small;"> <span style="font-family:arial;">CRC Press. Available from ASIS, item #2078; 954 pages; $120 (ASIS member), $132 (nonmember). Also available as e-book.</span> </span> </em> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">As good as the first edition of 21st Century Security and CPTED was, this second edition surpasses it. Atlas, known in security circles as a consummate professional, has done an outstanding job in creating this second edition, which has twice as much material as the original edition. It also includes voluminous references and hundreds of outstanding clarifying photos in both color and black-and-white. Using humor and candid insight he incorporates all the concepts of CPTED, including design, construction, security countermeasures, and risk management strategies, and merges them into a highly informative reference manual for security practitioners at every level.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">There is a logical flow to the book. It lays a solid foundation by discussing architecture and its intent, as well as environmental crime control theories and premises liability. There is something here for everyone as it also discusses terrorism and critical infrastructure from differing perspectives. Several chapters on problem solving provide guidance on conducting threat, risk, and vulnerability assessments.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Throughout, Atlas provides a roadmap for merging security and CPTED into management principles and practices in a wide variety of facility settings, including healthcare facilities, critical infrastructure, ATMs, office buildings, parking lots and structures, and parks and green spaces. The latter portion of the book is reserved for concepts including lighting, LEED and GREEN certification, workplace violence, signage, data capture and analysis, and conducting CPTED surveys.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Atlas has created the definitive book on CPTED and security. Despite the magnitude and complexity of the science and art of security management, he has done an outstanding job of merging these and other disciplines and concepts together into a cogent display of information that the reader should be able to apply in a wide variety of locations and situations. If you are only going to buy one book this year, it is strongly suggested you purchase this one. </span> </span> </p> <hr /> <p> <span style="color:#800000;"> <strong> <span style="font-size:small;"> <span style="font-family:arial;">Reviewer:</span> </span> </strong> </span> <span style="font-size:small;"> <span style="font-family:arial;"> Glen Kitteringham, CPP, has worked in the security industry since 1990. He holds a master’s degree in security and crime risk management. He is president of Kitteringham Security Group Inc., which consults with companies around the globe. </span> </span> </p> </div>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://adminsm.asisonline.org/Pages/Soft-Targets,-Hard-Challenges.aspxSoft Targets, Hard Challenges<p>​Soft targets pose a particularly difficult protection challenge. Take, for example, the 2017 Las Vegas shooting, when concertgoers enjoying a music festival at the Las Vegas Village open performance venue suddenly became targets for an active shooter firing more than 1,100 rounds from his hotel suite.</p><p>The scope of the tragedy—the deadliest U.S. mass shooting committed by an individual, which left 58 dead—made a deep impression on many interested in security, including officials at the U.S. Department of Homeland Security (DHS). "The Las Vegas shooting was really a catalyzing moment for our department," Bob Kolasky, DHS deputy assistant secretary for infrastructure protection, tells Security Management.  </p><p>Ten days after the shooting, U.S. President Donald Trump nominated Kirstjen Nielsen to be the new secretary of homeland security. When Nielsen took over the position, one of her first priorities was to raise awareness of DHS' existing security guidance and resources, so that they could be well-used by those who need them, Kolasky says.   </p><p>"We want to make sure our security resources are publicized, so they can help," he explains. As the Vegas shooting illustrated, soft targets seemed to be a good initial focus for DHS "to advance the security of things that traditionally haven't been that secure," he adds. </p><p>And so earlier this year DHS issued a resource guide and security plan overview for Soft Targets and Crowded Places (ST-CPs). In the overview, DHS defines ST-CPs as "locations that are easily accessible to large numbers of people and that have limited security or protective measures in place making them vulnerable to attack." This includes spaces such as schools, sports venues, transportation hubs, shopping venues, bars, restaurants, hotels, places of worship, tourist attractions, theaters, and civic spaces, according to DHS. </p><p>"ST-CPs do not have to be buildings and can include open spaces such as parks and pedestrian malls. ST-CPs will not necessarily be crowded at all times—crowd densities may vary," DHS says in the overview. "Securing these locations and venues is essential to preserving our way of life and sustaining the engine of our economy."</p><p>The guide is a catalog of soft target resources for businesses, first responders, government, and the general public. It is broken up into action categories such as identify suspicious behavior; protect, screen, and allow access to facilities; prepare and respond to active assailants; prevent and respond to bombings; and protect against unmanned aircraft systems (UAS).</p><p>DHS decided to include the latter category on UAS because of two recent developments, Kolasky says. First, various incidents overseas have demonstrated that some terrorists have the capacity to use UAS to cause harm. "We see that the threat is real," he explains. Second, for some U.S. sports facilities, defending against UAS "is something that is a top-of-mind concern," he says. </p><p>"There's demand from the security profession and there's a threat that warranted it," Kolasky explains.</p><p>The resources that the guide links to in each action category vary, and include informational materials, in-person and online training opportunities, videos, websites, and other tools. Although some of the resources were created in collaboration with partners, the DHS guide does not link to any resources that have no government connection. "That would be a more time-consuming effort and one that is fraught, at least a little bit, with the implications that recommending suggests endorsement," Kolasky says. "For now, we haven't worked through that."</p><p>One soft target expert, Jennifer Hesterman, says she was "really surprised" when the resource guide and overview were made public, because previously the agency had not been active with resource promotion. "They have been pretty quiet on the DHS side," says Hesterman, the author of Soft Target Hardening: Protecting People from Attack, which won ASIS International's 2015 Security Book of the Year Award.</p><p>Nevertheless, Hesterman says she is pleased with the issuance of the guide, for a few reasons. One is that it is a valuable public acknowledgment by the federal government of the risks of attacks. This is helpful at a time when some members of the public suspect that security professionals sometimes overplay risk because it benefits them professionally. "I've been called a merchant of doom," she says. "People think we just want to generate business, and so we will tell them horrible and scary things."  </p><p>Moreover, given the frequency of attacks like school shootings, some people are experiencing "security fatigue," and they simply do not want to discuss the topic any more, Hesterman explains. And to avoid causing widespread panic among the citizenry, federal officials are often measured in their communications about risk, so sometimes no sense of urgency comes through.</p><p>This is understandable, she says, but it's also important to realize that growing threats are out there, such as more attacks on critical infrastructure facilities. Citizens have the right to understand such risks, so in that respect the new DHS guide is helpful, she adds.</p><p>As for the section on UAS, Hesterman says it is a valuable asset for security practitioners. "Terrorists are already using drones to advance their goals," she explains. She also emphasizes that, on this issue like many others, "we have to think about what's next." Drones are also being used for security purposes, "but we have to think about how drones can be hacked. They can he hacked and grounded," she says. </p><p>Another growing area of vulnerability for soft targets is insider threats, she adds. In part, this is driven by a principle she explains as: "People have a public life, a private life, and a secret life." That secret life could include a gambling problem or another secret addiction that could push the person to extreme actions, and even those close to them may not realize that they are unraveling. "Insider threat is huge, and it's totally overlooked," Hesterman says.</p><p>Finally, Hesterman says the potential soft target threat of terror groups like ISIS has also grown.  Overseas, these groups have attacked soft targets like schools, whether it be Boko Haram kidnapping students in Nigeria or the Taliban killing more than 100 in an officer school in Pakistan. For these militant groups, soft targets are legitimate ones. "Terror groups and lone actors can leverage those to fit their agenda," she says. In fact, one statistic holds that 90 percent of war casualties are civilians, she adds. "Now it's like downtown is where the battle is."</p><p>The soft target guide and overview may turn out to be the first in a series of efforts by DHS to better leverage its preventative resources, officials say. The department released a similar guide and overview for school shootings in August (which will be covered in a future issue of Security Management), and officials are con­ducting a departmentwide review to determine what other resources can be promoted. ​</p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://adminsm.asisonline.org/Pages/Active-Shooter.aspxActive Shooter Guidelines<p>​How to handle an active shooter situation is the subject of two new guidelines, including one <a href="http://www.dhs.gov/publication/active-shooter-how-to-respond" target="_blank">released by the Department of Homeland Security</a> that​ targets a more general audience of managers and employees.</p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465