Posted by: Curtis Baillie, CSC | December 17, 2011

Identify and Prevent Retail Fraud and Scams

Curtis Baillie, CSC on December 6, 2011, was a speaker on the SecurityInfoWatch.com webinar titled,”Identify and Prevent Retail Fraud and Scams. The 60 minute webinar covered refund fraud schemes, credit card and gift card skimming, employee theft and what information might be needed to prosecute these types of cases. Click on the link to view the webinar.

Posted by: Jim McGuffey, CPP | December 12, 2011

Root Causes of Truck Crashes

TRUCK CRASHES AND ROOT CAUSES

Most attorneys representing clients in a truck crash and injury case hire an expert in accident reconstruction. While this is appropriate, the vast majority of these experts have not had full Profit and Loss (P&L) responsibility for managing trucking companies which is crucial in understanding what led to the crash.

Understanding the root cause of a truck crash requires more than understanding speed of travel, weather conditions, traffic conditions and driver or roadway conditions. While understanding these elements are essential to determine fault, there are several internal documents that must be examined to determine whether the organization consciously placed the lives of their employees and the public at risk.  Examination of documents such as training programs, fleet maintenance records and financial records also help to determine whether a company puts profits ahead of safety.

It is the author’s opinion that the majority of crashes result when companies fail to balance risk with profit. Many companies are placing profit ahead of adequate risk management processes which include: an effective hiring process, adequate training programs and proper fleet maintenance.

Most companies have some sort of training and other safety programs in place that when utilized, serve them well. However, senior managers can become short-sighted when achieving financial objectives which leads to reduction in training, fleet maintenance and shortcuts in the hiring process, all of which create huge risk exposure for the organization and general public.

Training programs which are essential in the prevention of crashes are often circumvented when hiring becomes difficult due to low unemployment or when absorbing large pieces of new business create new driving positions that must be filled immediately.  Regardless of the reason, a driver should not be placed behind the wheel of a truck prior to successfully completing a training program conducted by a certified instructor. Meeting customer or organizational demands are not acceptable reasons to place the public and the driver at substantial risk.

Fleet maintenance is often neglected or extended in order to reduce expense. New trucks destined to replace worn out trucks are placed on hold while worn out truck are held together with a “bandage approach” to repairs. Profits from these actions do not produce long-term success but some executives are willing to gamble, hoping for the best.

Truck accidents can be reduced by hiring qualified drivers. The hiring process requires drivers meet basic requirements, such as, verifying employment, having no more than X number of traffic violations, passing a DOT physical, passing a driver and drug test, and other sorts of requirements. Enhancing the hiring process can be accomplished by training interviewers in the art of interviewing and by not shorting cutting the hiring process to meet financial plan objectives. It may be difficult for some readers to believe that a manager working at a large well established company would place an unknown and untrained person behind the wheel of what could easily become a huge weapon or killing machine, but it happens all too often, with a manager thinking that if short cuts are taken, expenses can be reduced and profits will increase! There are too many companies that continue to place profits far ahead of safety and security.

These aforementioned basic actions will greatly reduce exposure and serve to protect the employee, the employer and the public.  Balancing risk and profit are essential for long-term success at any organization.

Disclaimer: This article is written for general information purposes only and is not intended to be and should not be used as a primary source for making security or safety decisions.

ABOUT THE AUTHOR:

James McGuffey, CPP, served as Area General Manager, District Manager and Regional Vice President with responsibility for trucking and security operations for 20 years. Jim was responsible for a large fleet of trucks, numerous facilities and several thousand employees during his career. He was awarded numerous national awards for improving profit, safety and security metrics.

Jim is a now a security consultant, retained by defense and plaintiff firms for forensics involving cash-in-transit and premise security incidents. He has been retained in cases involving truck crashes, embezzlement cases, workplace violence and death while in custody cases.  Jim also conducts security risk assessments for businesses. Please contact Jim at jimmcguffey@verizon.net or 215-460-7370 with any questions and visit our site at http://www.armoredcarexpert.com  to learn more about our services.

Posted by: Jim McGuffey, CPP | December 12, 2011

A Security Survey Can Help Make Churches Safer

As our http://www.churchsecurityconsultant.com website develops, we will discuss many aspects of security and safety and share tools and resources to help make your church a safer place. One of the tools needed to evaluate security and safety at your church is the security survey. A security survey is the basic tool used in the security risk analysis process. Please refer to our Security Risk Analysis Process article for an explanation of this process.

The security survey consists of an on-site examination to determine existing security measures, identify deficiencies, establish protection needed and recommend measures to enhance overall security. A survey should be done prior to purchasing security equipment or changing an existing security process or system. It is conducted by a qualified security practitioner along with someone familiar with the property and daily operations at your church.

I begin each security survey by walking around the perimeter of the church putting myself in the mindset of a person who is casing your church looking for easy access into your facility. I am searching for hiding places near shrubbery not properly maintained and too close to facility doors or windows since I may need this space for concealment if police drive by or to hide and wait to accost someone entering or leaving the church. It is especially helpful if this area has little or no lighting. To make my crime even easier, this church is in an area that is not well traveled. I am at ease since I already know from attending this church that there is no alarm system in place and often the rear door is left ajar. But even if someone remembered to secure the door tonight, the entire rear side of the church contains so many windows, most of which can be easily accessed. The chances of me stealing, vandalizing and causing havoc without being captured are extremely good because of these conditions.
I know that my night is going to be lucrative since I have located a church considered to be a soft target. I don’t like churches and other facilities that are difficult to access so I simply avoid them. You don’t have to have a college education to know that your chances of being caught are much greater when you can be seen approaching a church with adequate lighting and no place to hide. I may be a criminal but I’m not stupid!

Once inside your church I know that I will be able to locate computers and other sorts of equipment that I can sell and finding cash will be easy since the church money counters often leave money from Sunday morning collections inside a metal box. They thought this box was well hidden underneath a towel on top of the second shelf inside the tall filing cabinet in the kitchen. Someone will take the money to the bank Monday morning so tonight is the time I decided to strike. I happen to know where this money is located but finding where people hide valuables has never been a problem for me since I often burglarize to support my habits. When I am finished, I may even destroy some of the artwork and things that I know these church people value just for the fun of it!

Now back to being a security practitioner. Since I want to make sure that lighting is sufficient, I will walk around your church during hours of darkness looking for open or unlocked windows and other vulnerabilities that may exist during hours of darkness. This is a good time to observe evening church services or the youth group returning from a field trip and other activities occurring to ensure that processes exist to protect people and property.

As I enter the inside of the church or facility, I notice the doors, windows and other possible access points. I look to see if the locks on the doors are working and adequate and the door and its frame are solid. I even look at the door hinges to see if they are located on the outside of the door and can be easily removed if window access is difficult which in most cases it isn’t. Too often windows are left open or the locks are broken so entry is not an issue for the criminal.

I observe where children and infants are cared for during church activities and ask questions about processes in place to ensure that someone other than the parent or guardian cannot easily kidnap an infant. I ask a lot of questions about controls in place to protect not only the welfare of people visiting this church but also controls and processes in place to protect the reputation of the church. I want to know how often inventories are conducted and how money is handled. I have quite a few questions to ask and most of the time people are surprised since they never thought of how important the responses to these basic questions were to the success of their ministry.

Most churches and other organizations review a security program has being costly and burdensome and now days church leaders think that if they even consider security it should be to prevent or mitigate damage from a mad person entering a service firing a weapon. I do not recommend implementing a security program just for this purpose since this event is far less likely to occur than other security events such as fires, embezzlement, child abuse, sexual harassment, damage from storms, burglaries, simple assaults and other crimes and security loss events. A security survey will help to assess your vulnerabilities and determine security strategies to mitigate damage from threats and hazards.

There are many questions that are asked during a security survey and many observations that are noted. Based on the findings and completion of a security risk analysis, cost effective security strategies are implemented using volunteers. In many cases adding security equipment is not required with the exception of an inexpensive burglar and fire alarm which often results in a discount on your insurance premium. Having a burglar alarm can also improve safety when opening your church in the morning which is a topic to be discussed later.

Disclaimer: This paper is based on what the author believes are generally accepted security principles as of the date of its writing, and on data gathered from what are believed to be reliable sources, this article is written for general information purposes only and is not intended to be, and should not be used as, a primary source for making security decisions.

About the Author: Jim has 40 years in security and during a 26 year period of his career, he was responsible for several thousand employees and 70 high risk facilities. He board certified in security management and serves as an expert witness in premise security cases and armored car incidents.
Jim has held various church leadership positions and he understands the importance of maintaining a security program which is not expensive or burdensome to the church. He also understands the importance of a security program and the immense value that it adds to the overall ministry. Jim can be reached at jimmcguffey@verizon.net

Mr. White was quoted in a story that he authored regarding prisoners/patients in the healthcare setting.  His comments are under the heading Legal Corner on Page 13, titled “Prisoner and/or Patient; Who is Responsible for their Security.”

John has over 14 years in healthcare security management experience, and has been quoted and published in several professional journals and news sources.  To see this most recent article click on the link or go to the Protection Management website at Protection Management LLC.

ASIS International Healthcare Security Council Newsletter

John M. White, CPP, CHPA, President/Principal Consultant at Protection Management, LCC. was recently quoted in two articles in the October 2011 issue of the Healthcare Security & Safety Directions II.  Mr. White was also recently appointed to the Editorial Advisory Board of this publication.  Directions II is published by Rusting Publications, Inc. under  license from the International Association for Healthcare Security & Safety (IAHSS).

Protection Management, LLC News

Mr. White was published in the November issue of Security Management, Volume 55, Number 11, ASIS International, in a story titled, “How To Control Cards; Security professionals must design their access control systems carefully and then audit them frequently.”

To read the article in it’s entirety, please follow this link.

Protection Management, LLC News

Posted by: Ken Wheatley | December 2, 2011

Minieri Associates Completes Fifth Project In China

Security Consulting and Engineering firm, Minieri Associates announced the completion of a 5th engagement in China since establishing a regional in the Philippines.

Read the complete press release at this link: Media_Release_CHINAprojects

Posted by: Ken Wheatley | November 24, 2011

IAPSC Board Member Ken Wheatley Interviewed for ISO Focus Magazine

 After Ken Wheatley presented the keynote address at the recent annual ISO (International Organization for Standardization) Technical Committee 8 meeting in Helsinki, Finland he was interviewed for the November/December issue of the globally distributed ISO Focus magazine.

Here is the link to the article:

ISO Focus Ken Wheatley Interview

Posted by: Ken Wheatley | November 24, 2011

Feds concerned about hackers opening prison doors

IAPSC member John Strauchs provided the following link to an article dealing with the vulnerabilities in industrial control systems (ICS) that have been in the news recently for other reasons – Iran’s nuclear program and centrifuges.

http://www.washingtontimes.com/news/2011/nov/4/feds-concerned-about-hackers-opening-prison-doors/

Posted by: Ken Wheatley | October 13, 2011

IAPSC Member Ken Wheatley to Speak in Helsinki, Finland

Ken Wheatley will be the keynote speaker at the International Organization for Standardization’s annual global meeting of Technical Committee 8, Ships and Marine Technology, on October 27th in Helsinki, Finland. He will be speaking on the issues of global supply chain security, crime and terrorism prevention, natural catastrophes, and resilience in the supply chain.

Technical Committee 8 is responsible for the creation of ISO28000, the global supply chain security Standard, among countless other Standards.

Ken was appointed to the Chairman’s Strategic Advisory Group in 2008.

 

« Newer Posts - Older Posts »

Categories