The President's Reception: A Whale of a Good Time
by Matthew Harwood
ASIS International members and their significant others ate, drank, danced, mingled, and networked at Monday evening’s President’s Reception, sponsored by AlliedBarton. The festivities stretched from the World of Coca-Cola across an expansive lawn to the Georgia Aquarium. Wolfgang Puck’s catering division prepared the menu for the event.
The evening got underway as ASIS President Timothy L. Williams, CPP, director of global security for Caterpillar, rolled into the World of Coca-Cola on a golf cart flanked by two mascots: the Coca-Cola polar bear and Georgia’s Aquarium whale shark.
Guests strode around the World of Coca-Cola—a tribute to the classic beverage—and gazed at the oversized Coca-Cola bottles that celebrated world cultures, old and new. The bottles lined the walls leading down to the reception’s main area. Others sipped Coca-Cola products at futuristic soda fountains from five continents as bright balls of vivid lights speckled the floor.
Among the more exotic soft drinks were “Inca” from Peru and “Vegitabeta” from Japan. One choice, “Beverly,” a soft drink from Italy, “has a tonic taste to it,” noted Alexander C. Sparaco, CPP.
Sparaco, president of Baker St. Associates and chair of the Connecticut Chapter, said his involvement with ASIS is based on a simple maxim: “If you sit on the sidelines, then you can’t complain about what happens.”
James Sanders, director of public safety for Advanced Systems Technology, ducked into the Coca-Cola Theater where classic commercials from around the world played on loop. Though not a member, Sanders said he attended the Seminar and Exhibits to expose his company to the security industry and also meet customers in person.
Steve Bucklin, president and CEO of Glenbrook Security Services Inc., expressed his amazement at how large ASIS has become. “I’ve been coming since 1982, and it’s amazing how much the industry has grown,” he said. “It’s neat to see.”
Curtis Baker of Cornell University’s IT Department said he came to the Seminar and Exhibits “to find new technology to integrate into our systems.” He didn’t anticipate, however, that he would receive such personal attention from vendors. He was particularly impressed with the customer service staffs of Lenel Systems and Stanley Security Systems.
“You can’t get that in Ithaca,” said his coworker Ray Price, a crime prevention officer.
The party continued across the lawn between the two buildings and into the Georgia Aquarium. Guests enjoyed cocktails and hors d’oeuvres as whale sharks and beluga whales swam inside their massive tanks in the background. Aquarium staff members were also on hand to help guests understand the denizens of the deep.
In a special VIP area, at the President’s Reception, members of ASIS’s new CSO Roundtable gathered to talk shop, sip drinks, and persuade other senior level security executives to join their program. The Roundtable now includes 111 chief security officers representing many of the world’s most significant companies. The group provides its members with a secure Web site to discuss matters critical to corporate security.
Thomas Tidiks, CPP, group chief security officer for Zurich Insurance Company, called the Roundtable “a tremendous opportunity for networking and for sharing high-level thoughts.” Tidiks, like all CSOs, wrestles with how corporate security executives explain security’s business value to their CEO. The Roundtable gives him the opportunity to talk to other CSOs and learn new strategies to talk about security as a “business enabler.”
The CSO Roundtable is making an impact in the high-stakes world of corporate security. One advocate enjoying the delicacies and camaraderie at the Aquarium was David Stackleather, manager of corporate security for Circuit City and member of the CSO Standards working group. “We’re laying the foundation for how corporations create their security environment,” he said, “everything from IT to managing risk.”
Foundation Turns Fun into Funding
This year at the ASIS International 54th Annual Seminar and Exhibits the ASIS Foundation, Inc., sponsored two fantastic events—the 12th Annual Golf Classic and the 26th Annual Foundation Dinner—that benefited the Foundation’s continuing work funding and managing endowments for a wide range of academic, strategic, and professional development activities.
Tournament Tees Off
On the morning of September 14, ASIS members toted their golf bags across the rolling terrain of the Smoke Rise Golf and Country Club for the Foundation’s Annual Golf Classic.
The picturesque course offered gorgeous views of Stone Mountain as well as thick stands of hardwood and pine trees surrounding creeks that make the course as beautiful as it is challenging. The par-72 golf course boasted the intimidating par-5 13th hole, measuring in at 625 yards from the back tee and 441 yards from the front. Teeing off on 13, many golfers fell prey to the ravine that swallowed up shots meant for the fairway.
Tournament golfers competed in teams of four with AlliedBarton Security Services’ Michael Ricketts, Bret Almassy, Matt Sorrell, and Thom Burress taking first. Second place was won by General Information Services’ Albert Bueno, Dick Coons, Rodney Metzer, and Paul Thomas. Rounding out the top three teams were Ron King, Jon Guzman, A.J. Oletti, and Geoff Oletti of Securitas Security Services.
Other winners included Dick Coons and Mark Lowers in the closest to the pin contest. Bret Almassy and Staci Ballou won the men’s and women’s longest drive contests for their booming blasts on holes seven and 13, respectively.
The Golf Classic received generous support from four sponsors: AlliedBarton was the event’s platinum sponsor for its $20,000 donation, which included a hole sponsorship; Securitas gave golfers a special gift bag for their play, while ARATA Expositions supplied special golf balls to players. Finally, parched golfers enjoyed refreshments from the beverage cart sponsored by iView Systems/Guard Tour Systems.
More than 250 attendees filled the Imperial Ballroom at the Marriott Marquis for Wednesday night’s Annual Foundation Dinner.
The featured act was the Del Baroni Orchestra, which has been in demand on the local social scene for years, performing to rave reviews. From Frank Sinatra, to Nat King Cole, to Jimmy Dorsey, to Bruce Springsteen, this 17-piece orchestra satisfied every musical taste.
Del Baroni is a graduate of the University of Miami where he majored in jazz and vocal music. While in Florida, he taught music at the college level while performing as a vocalist and bassist. He moved his family to Georgia 20 years ago and has been busy entertaining at Atlanta’s premier events ever since.
The elegant evening kicked off with a reception of drinks and light hors d’oeuvres. Once seated in the festively decorated ballroom, attendees enjoyed a four-course dinner and a night of musical fun.
Also on hand was theatrical pickpocket Bob Arno, who mingled with the crowd after dinner. While Arno frequently entertains, he also serves as a resource to law enforcement and consults with authors and screenwriters. Deft at the craft of surprising unsuspecting marks, Arno’s expertise has widened to include credit card fraud, identity theft, laptop theft, and Internet scams.
As he moved through the crowd, Arno managed to collect several watches, cell phones, glasses, and wallets. Eventually, he managed to remove one attendee’s tie and another’s belt. As he returned his bounty to its rightful owners, Arno described how pickpockets and con artists choose their marks and accomplish their trade by reading and using body language.
Proceeds from the Foundation Dinner support such signature endeavors as chapter matching student scholarships, Security Journal, the Academic Practitioners Symposium, and the National Retail Security Survey. This year, the Foundation added the Roy Bordes Award for Physical Security to its roster of outreach programs.
Brokaw Talks About America's Search for a Balance between Freedom and
By Joseph Straw
09-19-2008 -- For more than two decades, NBC’s Tom Brokaw enjoyed membership in one of the world’s most exclusive clubs, that of national news anchors who get to witness history and share each day’s events with millions of Americans gathered around their household televisions.
Despite that high perch, Brokaw shared a stirringly intimate perspective on 45 years of the American experience during Wednesday’s keynote address at the 54th Annual ASIS Seminar and Exhibits in Atlanta.
Fresh from trips to cover the Summer Olympics in Beijing and the country’s two major political conventions in Denver and St. Paul, Minnesota, Brokaw contrasted the plainclothes, almost transparent security of the Olympics with the fences, riot gear, and vehicle barriers of the two U.S. convention cities.
“In this country we’re still struggling to find the balance between freedom and the new security considerations. Both in Denver at the Democratic convention and at St. Paul at the Republican convention, it looked for a time as if we might all be living in some kind of a police state. And I do think, when it comes to that kind of security at least, our government and civic officials have to reconsider how we pose our security in public places,” Brokaw said.
Brokaw went on to recount the little-known story of the days preceding the government’s acknowledgement of the 2001 anthrax attack. Two members of Brokaw’s NBC staff were infected, and Brokaw struggled for nearly two weeks, with little affect, to raise alarm among federal officials. At one point, federal officials told Brokaw that one of his colleagues had probably suffered a spider bite.
“We were all on an emotional roller-coaster that was heightened by the fact that we had no systems in place to detect a biological attack of any kind,” Brokaw said. “Things have gotten a lot better in your companies and in those areas that you represent.”
Yet Brokaw recounted a recent visit to the U.S. Department of Homeland Security’s Web site, where he entered the search term “anthrax.” The site generated a list of nine speeches agency officials have delivered about the attack, “and very little useful information,” he said. “You know as well as I do that we still have miles to go.”
Sharing a security success story, Brokaw recounted a night spent at the home of Microsoft chairman Bill Gates. In his guest room, Brokaw tried to connect to the Internet using an NBC laptop, but to no avail. With a phone call, Brokaw said “about 26” technicians appeared, followed by Gates himself. “What we decided was that the GE firewall was fighting with the Bill Gates firewall, and it was a draw. These are the kind of realities we’re all dealing with today.”
Not surprisingly, Brokaw said he’s most often asked by fans and acquaintances about the most memorable events and interviews of his career. He responds not with tales of the moon landing or his 1987 one-on-one interview with new Soviet Premier Mikhail Gorbachev, the first conducted by an American journalist.
Instead, he flashes back to 1965, soon after he was hired by WSB-TV, coincidentally in Atlanta, and assigned to cover the Civil Rights Movement. One night in Americus, Georgia, African-American residents congregated in a local church, deliberating whether to march on downtown in support of desegregation. Brokaw saw pickup trucks lining the town’s main street and white residents armed with guns threatening to kill any blacks they saw.
When the church emptied, Brokaw approached a black teenage girl and asked what they had decided. When she said they planned to march, Brokaw reminded her of the danger and asked her why she would take such a risk. Her response, Brokaw said, “‘Because I have no choice.’”
The topic of selfless action led Brokaw to discuss the work for which he’s known nearly as well as broadcasting, his 1998 book The Greatest Generation, about the Americans who fought in World War II and returned home to spurn accolades and build their country into the world’s lone superpower.
Brokaw recounted when decorated World War II veteran and former Senator Bob Dole, who featured in the book, approached him with one last anecdote after the book had already gone to press. Critically wounded in Italy, Dole explained to Brokaw that he convalesced at Michigan’s Battle Creek Sanitarium, sharing a room with two other seriously wounded veterans. One, the son of interned Japanese immigrants, lost an arm fighting with an all-Japanese-American infantry unit in Europe and won the Congressional Medal of Honor. The other, a Georgetown-educated lawyer who could have avoided service, was wounded landing at Normandy on D-Day.
Discussing their futures, the three agreed that public service is the highest calling and the one each would pursue. The other two men were Sen. Daniel Inouye (D-HI) and the late Sen. Philip Hart of Michigan.
Flashing forward to the present day, Brokaw said that every day he dwells on the burdens borne by the country’s fighting men and women, both those in harm’s way and those back home, many critically and permanently disabled.
Brokaw recalled a trip to his hometown of Yankton, South Dakota. Three members of a National Guard unit based in Yankton were killed on a recent deployment to Iraq, while a fourth, Sgt. Corey Briest, returned home blind, confined to a wheelchair.
Briest and his wife live in the house Brokaw’s parents built. When Brokaw offered to pay for construction of a new, wheelchair-accessible home for the family, the local leaders told Brokaw they would accept a donation, but insisted on matching it.
“That small town in southeastern South Dakota understood instantly that Corey will be a part of their lives forever and that they will measure up to it,” Brokaw said. “For the rest of their lives in this small town, they’ll have an acute reminder of the price of war, how little was asked of most of them, and how much was asked of Corey and his family. And they’ll take care of them.”
“These young men and young American women have volunteered for this duty. They get paid modest wages, but they pay a very high price,” Brokaw said. “However you feel about this war, about the wisdom of this war…they cannot be long removed from our thoughts on a daily basis. I hope that when you leave here and go home, you’ll find a way in your community or your workplace, your culture, your travel, to have a real connection to those families.”
Washington Insiders Carville and Matalin Dissect the Presidential Campaign
By Stephanie Berrong
09-17-2008 -- The battle of the sexes met the battle for the White House in Tuesday’s opening session as political gurus Mary Matalin and James Carville stepped to separate podiums. The husband-and-wife team, who epitomize the axiom “politics make strange bedfellows” with their famously divergent political persuasions, entertained seminar-goers with personal anecdotes and insights on the presidential campaign.
“You are living in the midst of stunning political history!” exclaimed Carville, a Democratic strategist who managed Bill Clinton’s 1992 presidential campaign. In his signature Louisiana drawl, Carville pointed to the “breathtaking diversity in the field” of candidates and the robust television ratings for political events so far in the campaign. “You’ve never seen anything like that ever, ever, ever,” he said. “So much for the fact that Americans don’t care about politics.”
Matalin is well-known as a Republican campaign advisor who has served as counselor to Vice President Dick Cheney and directed President George Bush’s 1992 re-election campaign. She explained where Democratic nominee Barack Obama has gone wrong in recent weeks and what Republican candidate John McCain has done well. She said Obama should have spent more time unifying his base after a long, hard-fought primary battle with Hillary Clinton. McCain, on the other hand, started unifying his party immediately, Matalin said.
She called McCain’s surprise choice of Sarah Palin as his vice presidential pick “the big game changer,” but warned that “it’s not over. In the end, this is a 50/50 country,” Matalin said. “Each side knows what they have to do.”
Carville spoke about the election more generally than his wife, touching only briefly on the candidates. The strategist called Obama “a little prickly” and cited one of the 72-year-old McCain’s biggest weaknesses – his age. “McCain, he’s old, there’s no other way to put it,” Carville said, “and he gets confused.”
Both he and Matalin said the election likely would depend on something that hasn’t yet happened. “It is impossible to have four people running for major public office…with this kind of pressure, this kind of intensity, this kind of coverage, where they don’t say stupid things,” Carville said.
Matalin explained the unlikely union between herself and Carville saying they have separate TV-watching rooms. She alternated between loosing her sharp wit on her husband (“He has the attention span of a hummingbird,” she said.) and calling him “brilliant.” Carville, clearly enjoying the healthy repartee, entertained the audience with his own anecdotes from their personal lives.
Security professionals who recently earned the Certified Protection Professional (CPP), Professional Certified Investigator (PCI), and Physical Security Professional (PSP) designations were also recognized during the session. Darryl R. Branham, vice president of the ASIS Professional Certification Board, also honored Robin C. Brown and Per A. Lundkvist who are board certified in all three designations.
Caterpillar Global Security and Securitas Security Services USA, Inc. received Special Recognition Awards, which salutes individuals and organizations that play an instrumental role in the promotion and advancement of the society’s certification programs. Michael E. Buckley, CPP, for Caterpillar and Rocco L. DeFelice, CPP, for Securitas accepted the awards.
The ASIS Organizational Award of Merit was presented to COL Keith C. Blowe, CPP, Command Provost Marshal, U.S. Army and to Marilyn W. Hollier, CPP, the director of the University of Michigan Hospitals and Health Centers’ Security Services Dept. for supporting the improvement of skills for security professionals through industry-standard credentialing.
Education Sessions Wow Attendees
by the Editors of Security Management
09-16-2008 -- On Monday, security professionals attended educational sessions on a variety of cutting-edge topics. Sessions covered issues such as critical infrastructure protection, terrorism, illegal immigrants in the workforce, computer security, and risk management.
Seminar attendees charged with protecting the nation’s critical infrastructures and key resources (CI/KR) received an overview of the Department of Homeland Security’s (DHS) risk mitigation outreach efforts during a Monday session on the agency’s Protective Security Advisor (PSA) program.
The initiative has placed 79 advisors in 60 districts across 40 states and Puerto Rico. PSAs are security experts, most with at least 20 years experience, typically in law enforcement, the military, or counterterrorism specialties. PSAs serve primarily as facilitators in protecting 3,000 assets DHS has designated for heightened protection based on the consequence factors of an attack: potential loss of lives and economic impact.
PSA’s work consists primarily of one-on-one interaction with CI/KR owner operators, including site visits and assistance with vulnerability assessments to help those operators determine where and how best to direct limited resources for protective measures.
Mike Norman of DHS’s Protective Security Coordination Division, within the Office of Infrastructure Protection, spoke in place of division Director William F. Flynn, who was unable to attend due to the agency’s response to Hurricane Ike in Texas and Louisiana. Norman explained that DHS has set about the massive task of assessing both risk across CI/KR sectors and the cascading nature of failures based on sectors’ interdependence.
OIP has begun the acutely challenging job of assessing consequences within systems, as opposed to hard assets, Norman said. “We’ve done a few, and we’re looking at doing more in the coming year: many, many more.”
Coming year’s budgets will fund added PSAs, Norman said, with plans to post a PSA to each of the nation’s more than 50 state, regional and urban intelligence fusion centers, where officials seek to detect emerging terrorist threats. “If you don’t know your protective security advisors, I recommend you reach out to them,” Norman told the audience. “They’re out there every day, doing great things, working in the community. They’re very energetic.”
Use of product and service vendors is all but unavoidable in today’s security environment. But are the folks who help you protect people and property taking more than their share from your company? That was the topic of a Monday session titled “Vendors: Are They Ripping You Off?”
R.A. (Andy) Wilson, CPP, CFE (Certified Fraud Examiner), and George E. Curtis, a professor in the Economic Crimes Program at Utica College in New York, provided an overview of the crime risks facing security managers who use vendors.
Curtis said that any client company hiring a vendor should require that the vendor abide by the same laws and guidelines as it does—from an internal code of conduct to regulatory statutes like Sarbanes-Oxley. Service contracts should afford the client the right to audit the vendor’s books, to ensure they match up with the client’s, Curtis said.
Curtis further advised client firms to scour and clean out their in-house vendor file. Typically, about half the vendors in those files are inactive, and thus unduly expose firms to phony billing. Companies must also eliminate duplicate or erroneous company titles, such as the same company listed two different ways, such as “IBM” and “I.B.M.”
The session also covered the “the fraud triangle” that is present when employees rip off employers: opportunity, motivation, and moral justification. Red flags for fraud include employees facing personal financial difficulty or suddenly living beyond their legitimate means.
Asked about best practices relative to gratuity policy, such as guidelines for employees accepting gifts from vendors, Wilson recommended a value limit, like $25 or $50, rather than a ban. If gifts are banned, he explained, employees are likely to still accept things like mugs or computer mouse pads, which could create a slippery slope.
While illegal immigration may be a contentious issue politically, security professionals have an obligation to their companies to assess the liability and risks associated with employing illegal immigrants, said Neville Cramer, a retired special agent-in-charge at U.S. Immigration and Naturalization Services, during a Monday morning session. “Despite one’s personal feelings about ‘comprehensive immigration reform,’ security professionals must realize that employing illegal immigrants poses a growing threat to the safety and security of the United States,” said Cramer. He also noted that it’s illegal.
The exact number of illegal immigrants in the United States is not known, but experts estimate there are 15 to 20 million employed throughout the country. The states with the highest concentrations of illegal workers are Arizona, California, Florida, Illinois, New York, New Jersey, and Texas.
While Cramer acknowledged the industriousness of many illegal immigrants who want nothing more than a better life, he said certain factors associated with illegal immigration present unique threats to the United States. First, illegal immigrants have few, if any, ties to the country. Second, illegal immigrants know their punishment ahead of time if they’re caught committing a crime: deportation. Therefore, some engage in illegal activity knowing that if they’re caught, all they receive “is a ticket home,” said Cramer.
Cramer distinguished the risks associated with employing illegal immigrants by sector. There’s a “minimal threat” to companies that hire illegal immigrants to do labor-intensive jobs such as farming, landscaping, and day laboring. The risk, however, increases significantly when illegal immigrants are hired to do jobs where they can access sensitive, proprietary information. Such jobs include security guards, building cleaning services, daycare, healthcare, hotel staff, and data entry.
Cramer also warned that fingerprint checks do not prevent the employment of illegal immigrants. There are multiple reasons for this. Many illegal immigrants don’t have finger prints on file and there’s little or no verification of either a person’s Social Security number, Alien Registration number, or biographical information on the government’s fingerprint card. “It’s false security at the highest level,” he said.
A scholar from the University of Central Florida led a Monday session titled “Looking Beyond the Threat Horizon: Future Trends in Terrorism and their Strategic Implications,” which highlighted the importance of identifying trends amid the violence.
“The need to identify future movements is absolutely important,” said Dr. Stephen Sloan, professor and fellow in the university’s Office of Global Perspectives. He noted that future analysis may seem like an academic endeavor, but it has “serious operations implications.”
Citing the work of his colleague Abeer Abdalla, a Global Connections Advanced Scholar on Terrorism at the university, Sloan discussed the importance of tracking attacks to better understand important trends, including geographic distribution of attacks and information about the perpetrators and the victims. For example, data shows that more than 50 percent of terrorist attack victims in 2007 were Muslim, and Sloan anticipates that inter-religious, sectarian violence will intensify.
And, with more than 2,400 children reported killed or injured in terrorist attacks last year, 25 percent more than 2006, Sloan worried about the legacy left behind. “You have youngsters who are combat veterans at 12 years old,” he said. “I think increasingly warfare will be fought by these youngsters.”
Sloan outlined some ongoing challenges including: state-sponsorship of terrorism with Iran and Syria supporting the destabilization of Iraq, the Taliban resurgence in Afghanistan, the Israeli-Palestinian conflict that remains a source of terrorist motivation, and the opportunities for recruitment that multimedia channels offer.
Some current trends included an intensification of terrorist propaganda, al Qaeda as a global insurgency, and the radicalization of immigrant populations, especially youth and minorities in Europe, Africa, and the Middle East.
In a building flooded with the latest in security gizmos and high-tech services, attendees at a Monday session on security awareness learned that most important factor in protecting facilities and information is an organization’s staff.
“It is fundamental to have an excellent security awareness program, because…guns, gates, guards? The most important resource you have is people,” said Deborah Russell Collins, executive director of the Chantilly, Virginia-based National Security Training Institute.
Shawn S. Daley, chief security officer of the Massachusetts Institute of Technology Lincoln Laboratory in Lexington, Massachusetts, described a multi-faceted security education and awareness program that regularly engages employees and researchers in different ways, whether they learn best by listening, reading, or watching.
“Audio” learners can be engaged in their new employee orientation, briefings, or a novel device Daley employs: regular security seminars. “Readers” might best be reached through informational packets, newsletters, and easy access to government counterintelligence materials. “Visual” learners might benefit most from World War II-style security posters, which Daley recommended arranging on a strategically placed bulletin board, which he calls a “Security Corner.”
Daley recommended reaching out to the National Security Agency (NSA) based at Fort Meade, Maryland, where fellow speaker H. Robert Kennedy Jr. runs the agency’s Counterintelligence Awareness Division.
Kennedy’s office indoctrinates all new NSA employees and contractors to ensure they are prepared for the ever-present threat of elicitation by foreign agents. The division also produces myriad visual education materials, like posters, which it distributes free-of-charge to all government security stakeholders who ask.
All the speakers, including Kennedy, said security must appear accessible so employees will feel comfortable reporting concerns. Training and education programs can help demonstrate that accessibility. “We want people to come see us. We want to stop something before it becomes a real problem,” Kennedy said.
In the session “Recognizing, Assessing, and Managing Those Who Present Workplace Risk: A Case Study,” speaker John Lane, vice president of crisis and security consulting at Control Risks, provided advice on how to recognize and deal with potentially violent employees. He pointed out to a standing-room only crowd that 70 percent of workplaces do not have a formal workplace violence program, despite findings that there are thousands threats of violence every workday.
One challenge in fighting workplace violence is the fact that about 43 percent of those threatened and 24 percent of those attacked at work do not report the incident, according to the Bureau of Labor Statistics. Lane said it’s important to conduct training and demonstrate to workers that your team is capable and prepared to respond to workplace violence issues.
Lane dispelled several common workplace violence myths, including the perception that most incidents come out of the blue. “These incidents don’t just happen spontaneously,” said Lane. “People work through a process—there is a pathway that people will pursue toward ultimately committing violence."
Some of the risk factors for workplace violence that Lane pointed out are paranoia, depression, and feelings of grievance. “People will rationalize in the workplace that others are out to get them…will ultimately have increased potential to commit violence.”
The process of evaluating an employee’s violence risk should be a fluid one, warned Lane, because in many cases, the evaluator won’t get the information he or she wants and needs. For example, it’s difficult and sometimes impossible to get accurate mental health and criminal histories. “Whatever type of a conclusion you draw as a team today about the risk that an individual presents is going to change probably before that day is over, especially if you’re doing your job and you’re trying to acquire more data.”
Ten years ago security professionals never imagined that everyday objects like airplanes, fertilizer, and the postal service could be used so effectively by terrorists. And perhaps no other country faces as many rapidly changing security challenges as Israel.
WEAPONS OF MASS DESTRUCTION
In a Monday session titled “Cutting-edge Security Development in Israel–Intensive Co-op and High-tech,” a senior advisor at the Israel Export Institute said the next great terrorism threat will be the unconventional weapon of mass destruction. “There is a lot of activity among terrorist organizations trying to obtain this type of weapon,” Major General David Tsur said.
He pointed to the Madrid train bombings as an example of the effectiveness of the suicide attack strategy. The attack prompted voters not to reelect the incumbent political party, and the new government pulled Spanish forces out of Iraq. Even though the bombing was not a huge terrorism attack in terms of casualties, “it became a strategic attack because of the influence on the government, which had to take actions and measures because of the public pressure.” He added: “It’s the most primitive weapon you can think about.”
In 2002, Tsur said, there were 145 incidents of suicide attack. In 2004 the number was reduced to 50, and in 2005 to fewer than 10. Several companies made presentations about new high-tech tools used to fight terror, but Tsur warned, “Technology by itself cannot solve the problem.”
Attendees Flock to Preseminar Programs
by the Editors of Security Management
09-15-2008 -- Dedicated security professionals arrived early in Atlanta to take advantage of the various preseminar programs on offer at the Marriott Marquis. The programs, which were held on Saturday and Sunday before the launch of the ASIS International 54th Annual Seminar and Exhibits , offered information on various topics. Some of the programs offered were security consulting, detecting deception, security management for beginners, college and university security, developing business acumen, critical infrastructure protection, and convergence.
A line-up of experienced security consultants shared their expertise with those looking to start a consultancy at the “Successful Security Consulting” program held on Saturday and Sunday. The session was sponsored by ASIS and the International Association of Professional Security Consultants.
Steve Kaufer of Inter/Action Associates, Inc., in Palm Springs, California, led the opening session of the program. “We will give you the information you need to consider whether you want to pursue consulting,” he told the attendees.
Kaufer explored the positives of a consulting career, including an interesting range of projects, flexibility in the number and complexity of jobs, and, of course, additional income. He also noted that the need for consultants is on the rise. “There is a greater demand from organizations for outside help and temporary help because companies can’t always add staff,” Kaufer said.
In the program, speakers covered every aspect of security consulting from writing winning proposals and gaining clients to preparing reports, performing security surveys, partnering with other consultants, establishing fees, and marketing. However, the program did not cover security. “You already have a tremendous base of knowledge,” said Kaufer. “We aren’t going to talk about security. You already have this knowledge, and other people need it.”
Attendees gathered on Saturday and Sunday to learn a critical investigative technique—how to tell whether someone is lying. In the program “Statement Analysis and Verbal Clues of Deception,” presenter John H. Dietz, CPP, covered issues such as how to eliminate multiple suspects from an investigation and how to develop rapport with the person being interviewed.
Dietz then led attendees through a series of exercises to help them pick up on deceptive language. For example, in written statements, investigators can learn much from the insertions and deletions suspects make to a document. Changes in the use of nouns and verb tenses as well as skipping forward in time can indicate deception, according to Dietz.
As a practical exercise, the group analyzed real cases. Dietz pointed out how helpful this can be. In one training exercise, the class analyzed a group of interviews and narrowed the list of suspects down to one person. “The class worked it out and the police went to interview the prime suspect the next day,” said Dietz. “They got a confession.”
Attendees at “Security Management for the Beginner: Where Even Experts Can Go Wrong” learned that it doesn’t matter whether a security manager comes from the world of law enforcement, the military, or elsewhere—nothing substitutes for on-the-job training.
In a talk presented in conjunction with the International Foundation for Cultural Property Protection, Stevan P. Layne, CPP, discussed the various roles of an effective security manager, from leader to disciplinarian to coach.
Layne noted managers often make disciplinary mistakes. He said leaders must be fair and hear workers out, and he asked, “How can you evaluate whether someone followed the rules without hearing their side?” Layne said an oft-overused tool is suspension without pay. Although there are certain situations where such action is necessary (like during an internal investigation), Layne said when a manager relies on such disciplinary action “above all else,” workers end up terrified and often come back from the suspension just as unproductive. Layne instead advocates getting to the heart of the problem through communication and problem-solving.
Effective managers must also take an active interest in their employees, listen to them, and encourage them to advance in their own careers.
Above all, a manager must be a leader. “Are they going to follow you into battle?” asked Layne, because when a disaster or crisis hits, the environment becomes a “quasi-combat zone.” Layne suggested subjecting applicants to a stress interview, where several people with various fields of expertise spit rapid-fire questions at the interviewee to see how he or she handles it. If they become nervous in that situation, it could be a sign that they won’t be able to respond well in a true crisis later on.
Layne also emphasized that while a manager must be respected, he or she must also be open to learning from others. He said a true leader is an interested manager, “someone who doesn’t know everything but is willing to find out.”
PROTECTING THE CAMPUS
The massacre at Virginia Tech has led to widespread investment in new security technologies and the creation of new policies and procedures across college and university campuses everywhere. But few campus security stakeholders know what technologies or procedures they should select to protect their campus.
Bernard D. Gollotti, CPP, executive director of public safety for the University of the Sciences in Philadelphia and the vice chairman of ASIS International’s Philadelphia chapter, helped security practitioners sift through recommendations from recent public and private campus threat assessments during the preseminar session, “Protecting Your Campus: Selecting the Right Technologies,” on Sunday morning.
The problem with campus security after Virginia Tech, according to Gollotti, is that everyone fears the high cost, low probability events most, when more mundane things such as fires in residence halls or college students crossing busy city streets gets short thrift. “Somewhere in the next few weeks someone’s going to ask how you’ve planned for a pandemic [flu outbreak],” he said, stressing his point.
Among Gollotti’s many recommendations to campus security officials were the creation of behavioral threat assessment teams to share information on problem individuals on campus; coordination and collaboration with local, state, and federal responders; the adoption of a multilayered emergency notification system; the installation of remotely-controlled keyless locks in dormitories and classrooms; and more active monitoring of a campus’ CCTV system.
Gollotti told campus security practitioners to become well-acquainted with their respective institution’s IT department because they are the foundation of any good security system. “One day we may all be working for IT and not public safety,” he said. “They control the network,” especially necessary technologies such as IP cameras and access control systems.
Chief security officers often have a tough time persuading the executive suite of their critical importance to business. The big problem, according to John Lingle, principal consultant for the Metrus Group, is that many CSOs can’t “communicate their value in a language business executives understand.”
Lingle’s preseminar session, “Business Acumen for Security,” on Sunday morning, sought to change that. By providing security professionals with the financial fundamentals, the strategic focus, and the return-on-investment (ROI) acumen, he says security can find itself on the positive side of the bottom line.
Business executives want measurable results and those in the security field that can’t provide metrics, such as ROI, suffer. According to a 2006 Metric Group study, security departments that did not use ROI measures experienced slower budget growth and were three times more likely to suffer personnel cuts than those security groups that provided ROI metrics.
Security professionals also need to identify the various ways they provide value to a business and categorize them according to cost, Lingle says. For instance, hiring more security guards to reduce theft is often a less expensive endeavor than creating and implementing a supply chain protection program. Security professionals should also understand the concept of an opportunity cost or the realization that investing in one problem’s solution will often leave other problems unaddressed. Security professionals, therefore, must choose those security investments that will solve the problem with the greatest ROI possible.
To do this correctly, security professionals need a strategy. Lingle says CSOs should ask “What are the underlying assumptions when I spend money here rather than there?” Security professionals should assess their department’s strengths and weaknesses, determine what opportunities are available to achieve their goal, evaluate how their environment may change, and decide what they will not do because of scarce resources.
The strategy should also realistically gauge what a security professional or department can achieve. Lingle says security professionals can typically list 20 or more weaknesses of their organizations on average. His advice: “You can’t fix 20 things. Pick the three most important.”
Afterwards, if a security group’s strategy fails, there are only two options as to why: “Either you had a bad strategy or you had bad execution,” Lingle told his listeners.
Security stakeholders from the private, homeland security, and defense sectors gathered for a daylong session highlighting “Public and Private Perspectives on Critical Infrastructure Protection.”
Steven D. Young, CPP, deputy director of the Department of Homeland Security’s (DHS) Infrastructure Information Collection Division, provided an overview of the decade-old federal effort to define and help protect the nation’s critical infrastructure and key resources (CI/KR), which range from bridges and highways to the nation’s financial system.
King discussed DHS’s new Homeland Infrastructure Threat and Risk Assessment Center (HITRAC), a critical new link in public-private collaboration for CI/KR protection. HITRAC’s analysts monitor intelligence from around the world to produce threat advisories tailored to domestic interests.
The HITRAC process quickly detected and addressed a disconnect between the federal government’s typical terrorism intelligence and the needs of U.S. private security, King said. After an attempted terrorist attack on an oil facility in Saudi Arabia, HITRAC flew analysts to Houston to brief U.S. oil industry security officials on the event.
At the briefing, industry officials wanted information about factors like the attackers’ clothing and vehicles and the performance of the facility’s physical security elements. Analysts, however, had focused their research on topics like attack financing and organization. HITRAC officials learned that the intelligence needs of private security are far different than those of federal counterterrorism officials, and the program has adapted its products, King said.
Paula Scalingi, a veteran government security professional and now director of the Pacific Northwest Center for Regional Disaster Resilience, also addressed the session, discussing the potential impact of a “bio-event,” whether a terrorist attack or a pandemic outbreak, on CI/KR. Continuity and resilience plans will only work during a bio-event if they are prepared on a region-wide basis, Scalingi said.
Planning efforts to sustain CI/KR during bio-events are lacking, Scalingi said, listing gaps in areas such as identification of sector interdependencies, assigning roles and responsibilities, information sharing, and IT infrastructure maintenance.
Many organizations are converging their physical and information security applications onto their main corporate network. But once these myriad applications, some of which previously ran on private networks, are conjoined, what’s the best and most effective way to run them all?
That was a central focus of a preseminar program, “Going IT: The How and Why of Putting Your Security System onto the Corporate Network.” Companies are looking to put just about everything security-related on their network, says Howard J. Belfor, CPP, regional vice president for the southern USA for ADT Advanced Integration. Applications range from e-mail programs to Internet Protocol telephony to fire alarm systems.
The program looked at some of the applications that are being integrated. It also discussed some of the ways hackers are trying to take advantage of network vulnerabilities. It then broadly discussed some cutting edge-integration systems that can help managers run all their systems in one place or on one integrated software application.
A Real Peach
By Ann Longmore-Etheridge
September 15-18, the ASIS International 54th Annual Seminar and Exhibits will electrify the Georgia World Congress Center in downtown Atlanta. The event will offer more than 175 educational sessions for security practitioners of all levels while the exhibits will encompass the latest security technologies and innovations in the world. It is expected that this year’s Seminar and Exhibits will bring together more than 23,000 security, business, and government professionals from more than 90 countries for an exchange of ideas and information in the classroom, on the exhibit floor, and during after-hours events.
This year’s educational sessions have been peer-reviewed and selected from a field of entries in a highly competitive submission process. Among the offerings will be “What Hackers Don’t Want You to Know;” “Campus Strategic Security Initiatives Emphasizing Early Warning, Early Notification and Layered Communications Systems;” “Pandemic Influenza Planning and Response;” and “The Business of Ethics in Today’s Security;” as well as “Transforming the U.S. Government Security Clearance Process,” “Implementing International Enterprise Security Solutions,” “Security and Illegal Immigrants in the Workforce,” “Successfully Selling Security to Executive Management,” and “Options for Disaster Recovery Exercises.”
Eighteen sessions will be offered in Spanish; an additional nine sessions will be simultaneously translated from English into Spanish. Keynote speakers will include legendary newsman Tom Brokaw, political players James Carville and Mary Matalin, and Flags of Our Fathers author James Brady.
The exhibition hall will feature more than 280,000 square feet of the latest security technology and services, providing a showcase for more than 950 companies demonstrating cutting-edge products and services that are shaping the security industry today.
Among the special events slated for the Seminar and Exhibits is a Thursday special session on the Convergence of Enterprise Security Organizations and, also on Thursday, the Annual Security Insights program on Internet abuse. The anonymity of the Internet has become increasingly relevant for most institutions and a challenge to security professionals. For example, trolls and flamers defame management or release potentially damaging inside information in chat rooms, and unknown individuals impersonate managers to harass other employees or spread lies about them. A panel of experts, guided by former hacker Kevin Mitnick, will explore this potent topic on Thursday, September 18.
Other not-to-be-missed events will be the ASIS Foundation Inc.’s Annual Golf Tournament and Foundation Dinner, as well as the Annual President’s Reception, which will be held Monday, September 15, at 7 P.M. Reception attendees will gather at a lively garden party held between the Georgia Aquarium—the world’s largest—and the unique New World of Coca Cola museum on the other. Unlimited networking, high-octane entertainment, plus refreshing drinks and culinary delights catered by Wolfgang Puck offer you a once-in-a-lifetime event.
For three consecutive years, Tradeshow Week magazine has recognized the ASIS’s Annual Seminar and Exhibits as one of the 50 fastest-growing tradeshows in the United States and Canada.
Southern hospitality. Atlanta has undergone a transition from a city of regional commerce to a city of international influence. Between 2000 and 2006, the metropolitan area grew by 20.5 percent, making it the fastest growing metropolitan area in the nation.
Today, Atlanta offers something for everyone. Not only is it a world-class city with dozens of fine hotels, dining venues, and public parks; it is also home to the aforementioned Georgia Aquarium and Coca Cola Museum, as well as CNN Studios, the Atlanta Botanical Garden, High Museum of Art, the Fernbank Museum of Natural History, Zoo Atlanta, and the Atlanta History Center. Both nightlife and shopping abound in the Buckhead district, a charming neighborhood north of Midtown Atlanta. Downtown also features more than 30 nightclubs.
For more information and/or to register for the ASIS 54th Annual Seminar and Exhibits, visit www.asisonline.org; e-mail email@example.com; or call 703-519-6200. For more information on the city of Atlanta, visit the Atlanta Convention and Visitor’s Bureau Web site, www.Atlanta.net .
Brokaw, Carville, Matalin, Bradley Keynote in Atlanta
By Ann Longmore-Etheridge
Tom Brokaw, one of the most trusted and respected figures in broadcast journalism, and political consultants James Carville and Mary Matalin, will be the keynote speakers at the ASIS International 54th Annual Seminar and Exhibits in Atlanta, September 15-18.
Brokaw. Retired NBC News Anchor and Managing Editor Tom Brokaw will speak at Wednesday’s special session on September 17, at 8 A.M. The respected journalist, who stepped down after 21 years, continues to work with NBC, reporting, producing documentaries, and providing expertise during breaking news events.
During his decades in journalism, Brokaw received numerous honors and awards, including the Edward R. Murrow Lifetime Achievement Award and an Emmy for Lifetime Achievement. He was inducted as a fellow into the prestigious American Academy of Arts and Sciences and is a member of the Horatio Alger Association of Distinguished Americans. He has received the Records of Achievement award from the Foundation of the National Archives, and the Association of the U.S. Army gave him with their highest honor, the George Catlett Marshall Award—the first ever bestowed on a journalist.
In 1998, Brokaw became a best-selling author of The Greatest Generation—a book constructed from 15 years of interviews with Americans who came of age during the Great Depression and the Second World War and went on to build modern America. His most recent book, Boom—Personal Reflections on the 60s and Today, was released in November 2007.
Brokaw’s career began at KTIV in Sioux City, Iowa . He later served as a news anchor in Los Angeles, as a White House correspondent, and NBC News’s Today Show host. In 1982 , Brokaw began co-anchoring NBC Nightly News, along with co-anchor Roger Mudd , and became the anchor in 1983 . After a storied career and regarded as the most popular U.S. news personality, Brokaw announced his retirement in 2002.
Carville and Matalin. James Carville is one of America’s best-known political consultants. He and wife Mary Matalin, Republican pundit and former assistant to President George W. Bush and counselor to Vice President Dick Cheney, will speak on Tuesday, September 16, at 8 A.M.
Carville graduated from Louisiana State University with an undergraduate and law degree . As a campaign strategist, he has contributed to a long list of electoral successes. Carville’s winning streak began in 1986 when he managed the gubernatorial victory of Robert Casey in Pennsylvania. In 1987, Carville helped Wallace Wilkinson, who commanded less than 1 percent of the vote in the early polls, win a hard-fought gubernatorial campaign in Kentucky.
The following year brought Carville to New Jersey where he guided Frank Lautenberg’s campaign for U.S. Senate to victory. Carville next managed the successful 1990 gubernatorial campaign of Georgia’s Lieutenant Governor Zell Miller, including a tough primary win over Atlanta mayor Andrew Young.
In 1991, Carville drew national attention when he led Senator Harris Wofford from 40 points behind in the polls to an upset landslide victory over former Pennsylvania Governor and U.S. Attorney General Richard Thornburgh. With the startling and unpredicted Wofford win, Carville exposed the political vulnerability of George H. W. Bush, who enjoyed a 91 percent approval rating during the Gulf War.
Having wounded the sitting President in 1991, Carville finished the job the following year when he guided Bill Clinton to the Presidency in 1992. In 1993, Carville was honored as Campaign Manager of the Year by the American Association of Political Consultants for his leadership of Clinton’s fearsome and intense “War Room” at campaign headquarters in Little Rock, Arkansas. Carville was also the focus, along with George Stephanopoulos, of the feature-length Academy Award nominated documentary The War Room.
After the Clinton victory, Carville began to focus on foreign consulting. Since that time, his political clients have included Greek Prime Minister Constantine Mitsotakis, Brazilian President Fernando Henrique Cardoso, Honduran Prime Minister Carlos Flores, President Jamil Mahuad of Ecuador, the Liberal Party of Canada, and British Prime Minister Tony Blair. In 1999, Carville helped Ehud Barak gain a victory in his campaign to become the Prime Minister of Israel.
In addition to his political activities, Carville is an author, actor, producer, talk-show host, and restaurateur.
Matalin has been active in politics since college, starting at the grassroots level in local and statewide campaigns in her native Illinois. The “Reagan Revolution” brought her to Washington, D.C., where she served on the Republican National Committee. After a hiatus from Washington to attend Hofstra Law School, Mary returned to the RNC in 1984, to serve as national voter contact director for the Reagan-Bush Campaign. She held senior positions in the George H. W. Bush 1988 campaign and, upon President Bush’s election, was appointed chief of staff for the RNC.
In 1992, President Bush named her the deputy campaign manager for political operations, responsible for the overview and organization of all 50 state operations. As the planner who traveled with President Bush throughout the 1992 campaign, she emerged as the vocal, and occasionally controversial, defender of the president and his policies.
Matalin was the founding co-host of the Washington-based political weeknight talk show, "Equal Time." Her political astuteness and antics contributed to the show’s being called “the best talk show on television” by Knight Ridder News Service. Before joining the current administration, Matalin was a host of CNN’s “Crossfire.”
She has made frequent television appearances as a political commentator and has written for various periodicals including Newsweek and The Los Angeles Times. She is coauthor, with her husband, of the best-selling political campaign book, All’s Fair: Love, War, and Running for President. Her most recent book, Letters to My Daughters (April 2004), was named a Book of the Month Club selection as well as made The New York Times and The Washington Post best-seller lists. Matalin now runs Threshold, a new conservative publishing imprint at Simon & Schuster.
Bradley. At 12 P.M., Thursday, Sept. 18, best-selling author James Bradley will speak at the closing luncheon.
In 2000, Bradley burst onto the national scene as an author in 2000 with his book, Flags of Our Fathers. Released as a movie in 2007 that was directed by Clint Eastwood, it is the story of six young men who raised the American flag on Iwo Jima. One of the men in the famous photograph of that event is Bradley’s father, John Bradley. Bradley’s second book, Flyboys, released in 2003, is the story of eight captured naval aviators who were beheaded by the Japanese on the island next to Iwo Jima.
Bradley was raised in Wisconsin, studied at the University of Notre Dame, Sophia University in Tokyo, and graduated with a degree in East Asian History from the University of Wisconsin. Bradley has vast experience writing and producing corporate films and corporate meetings; he has traveled the world, living and working in more than 40 countries for nearly a decade. Bradley is President of the James Bradley Peace Foundation, which is dedicated to fostering understanding between America and Asia. The foundation sends American schoolchildren to High School in Japan and China where they live with a family.