The Time To Build Relationships Is Before A Disaster

By Rod Cowan A disproportionate interest in terrorism is resulting in the Government and policy makers failing in the fundamentals of national security, which must entail an all-hazards approach to security and risk mitigation. Having spent more than 14 years building relationships through the Trusted Information Sharing Network (TISN) and the Security in Government (SIG) annual conference, policy wonks scrapped the … [Read more...]

Security Leadership

By Steve Mark Security is 90 percent psychological and 10 percent physical; that is, many see security as protecting people and property from intentional harm, and doing so by focusing on, for example, physical or digital barriers. This is of course entirely appropriate; however, it only forms part of the security ‘picture’, because security also connotes the psychological state of being secure, being free from fear. As … [Read more...]

Inside The Shadow Economy

By David Lake It costs money to commit acts of terrorism and field armies to fight the battles of jihad. The cost to pay for fighters, food, equipment, lodging, training, deployment and medical services for the jihadist by the controlling organisation or group is not cheap. When operating beyond the borders of the sponsor of terror, the costs can be five times as much as it would cost to conduct a local operation. For … [Read more...]

PSC16 STANDARD PRESCO™ & WIEGAND COMBO KEYPAD & PROX READER 

  The Presco™ PSC16 Proximity Reader is an advanced, self contained RFID (Radio Frequency IDentification) contactless reader. It is capable of interfacing to either a Wiegand input control panel or to Nidac’s range of Presco™ PAC decoders. When a PSR16 is coupled with any PAC series door access controller, users get the benefits of a secure door access control solution with all of the features of the Presco™ … [Read more...]

ONVIF: The Evolution of A Standard

By Per Björkdahl ONVIF has achieved a lot since its founding in 2008. The member consortium began as a small group of manufacturers that wanted to collaborate to accelerate the acceptance of systems based on network surveillance cameras. While ONVIF’s mission has not changed significantly since then, its application and influence has; it is now an industry alliance for the physical security industry. ONVIF has become a … [Read more...]

Technology Advancements Re-Shaping Security

By Rob Spinetti Facility safety and security are light years beyond the days of having several guards and an alarm system, and navigating a complex array of the technologies available. Whether the focus is on compliance and driving efficiencies, or simply bolstering efforts already in place, it is important to be aware of the trends currently shaping security and how they can benefit business. Following are five … [Read more...]

When Risk Becomes Reality

By Michael Dever Before considering what will/could/should/may happen after a major incident, definitional issues need to be considered. How is a ‘security-related atrocity’ or a ‘major event’ defined? In this context, what is being looked at is high-consequence, low-probability and low-frequency attacks causing a major incident and the appropriate reasoned and logical response to the incident in the post-event … [Read more...]

Protecting Sensitive Sites In A Changing World

By Laurie Mugridge In the wake of various terrorist attacks that have been carried out around the world in recent years, sensitive sites are facing a broader range of potential threats than ever before. These atrocities have been characterised by their unexpectedness and the difficulties involved in protecting against them. As a result, businesses are re-evaluating their defence systems in search of a complete security … [Read more...]

Whistleblowers And The Risk To Reputation

by Tony Jaques Whistleblowers are a well-recognised possibility in most organisations. But how the organisation responds to a whistleblower can help determine whether the problem exposed becomes a reputational crisis. The important lesson from such cases is that how a whistleblower is handled can sometimes trigger reputational damage even greater than the original issue. Management experts advise that whistleblowers … [Read more...]

Confronting an ISIS Emir: ICSVE’s Breaking the ISIS Brand Counter-Narrative Videos​

Most experts agree that the most successful counter-messaging campaigns against ISIS are the ones that utilize the voices of insiders: the voices of ISIS victims and ISIS cadres themselves who have first-hand knowledge of the group’s brutality, corruption, religious manipulation, and deception. In this regard, we at the International Center for the Study of Violent Extremism (ICSVE) have spent the last two years … [Read more...]

Expectations In An Emergency

When the theme of this edition, After the Atrocity, was proposed, my first thought was that I have done a few similar articles recently, but then I considered my involvement in the responses to a number of atrocities and the issues they had in common. Firstly, exercises and training are rarely accurate. That is not because they are not developed from real experience, or that they are not done with the best of … [Read more...]

Houston: We Have A Problem!

The recent film Hidden Figures tells the story of the impact three African-American women had on the National Aeronautics and Space Administration (NASA) space program in the 1950s and 60s. The movie highlights the struggle these women experienced working in a male-dominated industry. Fast forward to 2017 and women are still vastly underrepresented in the science and technology industries. I recently met a young woman … [Read more...]

Health Preparedness And Australian Counterterrorism Strategy

Killings carried out by terrorists are becoming worse and more gruesome to achieve the shock factor. While there is no suggestion of any new specific terrorist threat to Australia, the Australian Government is looking again at security for public events following last year’s Bastille Day attack to make sure that all necessary arrangements are in place. The Nice attack, where Mohamed Lahouaiej Bouhlel ploughed a truck … [Read more...]

Hikvision and Cisco Hold Joint Meeting on Cybersecurity Collaboration in Hangzhou

Cisco recognizes Hikvision’s dedication to safe R&D management Hikvision, the world’s leading supplier of innovative video surveillance products and solutions, together with Cisco, the worldwide leader in IT and networking, held a joint meeting on cybersecurity collaboration on April 26, 2017 in Hangzhou, China. This meeting marked the successful completion of the first phase of a collaboration that began in … [Read more...]

Steven Seagal banned from Ukraine as he’s deemed a ‘security threat’.

According to a recent report by UK news service The Sun, action star Steven Seagul has been banned from entering the Ukraine for five years after the security services (SBU) labelled him a security threat. The ban comes in the wake of Seagul receiving a Russian passport from Russian President Vladimir Putin during a visit with American actor Steven Seagal in the Kremlin late last year. According to the report, a … [Read more...]

Employee Theft Consequences: Risk vs. Gain Theory

Herman Laskey, Jr., LPQ, CFI from losspreventionmedia.com When associates properly understand employee theft consequences, they may not ever take the risk of being dishonest in the first place. I have found that discussing with associates the risks of theft and comparing them with the potential gains greatly reduces their potential to steal from their employers. Most associates do not consider the punishments and … [Read more...]