WE HAVE MOVED - CHECK OUT OUR NEW HOME!
Wednesday, 22 December 2010
Monday, 20 December 2010
The Washington Metro Are To Conduct Random Bag Checks
The screening will be conducted before passengers pay to enter the rail system or board a bus, and customers who refuse the inspections will be "free to leave," Taborn said. But there is a possibility that those who decline screening will be questioned further.
Will this work? Is this enough to deter a terrorist? Isn't the 'MO' to detonate at first point of contact?
Still something is certainly better than nothing!
Friday, 17 December 2010
Pass The Password
- Tips for keeping your password safe
- Never use the same password across lots of different websites.
- Do not use a word that you - or a hacker - could find in the dictionary: these are susceptible to so-called 'brute force' attacks.
- Try to include some digits and special characters to add a layer of complexity that will make life difficult for a criminal.
- Pick a phrase or mnemonic that helps you remember your password.
- You can avoid having to remember passwords altogether by using a password manager program. There are many available to download online.
Tuesday, 14 December 2010
If You Suspect It, Report It!
- Terrorists need storage - Lock-ups, garages and sheds can all be used by terrorists to store equipment. Are you suspicious of anyone renting commercial property?
- Terrorists use chemicals - Do you know someone buying large or unusual quantities of chemicals for no obvious reason?
- Terrorists need funding - Cheque and credit card fraud are ways of generating cash. Have you seen any suspicious transactions?
- Terrorists use multiple identities - Do you know someone with documents in different names for no obvious reason?
- Terrorists need information - Do you someone taking an interest in security, like CCTV cameras for no obvious reason?
- Terrorists need transport - If you work in commercial vehicle hire or sales, has a sale or rental made you suspicious?
Monday, 29 November 2010
SSR Salary Survey
hostile vehicle mitigation, security security security security security security security security Personnel Security, personnel security, personnel security, personnel security, personnel security, physical security, physical security, physical security,
Friday, 19 November 2010
Get Safe Online - If you do nothing else, read this!
- Get anti-virus software, anti-spyware software and a firewall
- Keep your computer up to date
- Block spam emails
- Use an up to date web browser
- Make regular backups
- Encrypt your wireless network
- When you’re shopping online, look for clear signs that you’re buying from a reputable company
- On an online auction site, learn how it works and learn to pick good sellers
- Use safe ways to pay, such as PayPal or credit and debit cards
- Use your common sense to avoid scams – if it sounds too good to be true, it probably is
- Avoid identity theft by using an up to date web browser and blocking bogus emails with a spam filter
- Always use strong passwords
- Don’t give away too much personal information on blogs and social networking sites
Friday, 12 November 2010
Get Safe Online Week 15th to 19th November
Thursday, 11 November 2010
The Independents Front Page
The front page of The Independent 11th November 2010 |
Physical Security, Hostile vehicle mitigation, personel security, security, security, Physical Security, Hostile vehicle mitigation, personel security, security, security, Physical Security, Hostile vehicle mitigation, personel security, security, security, Physical Security, Hostile vehicle mitigation, personel security, security, security,
Physical Security, Hostile vehicle mitigation, personel security, security, security,
Wednesday, 10 November 2010
Poll Results: What's the most important quality of a security professional?
68% said Integrity
13% said Professionalism
13% said Business Acumen
4% said an Academic qualification (degree or higher)
Physical Security, Hostile vehicle mitigation, personel security, security, security,
An interesting set of results and we will be running more polls in the future. Any suggestions would be welcome
Monday, 8 November 2010
Terrorists (aka Tourists....according to the House of Commons) Banned From Big Ben!
Friday, 5 November 2010
Image, “Hydra-X” from Crooks & Forkum Editorial Cartoons |
Wednesday, 3 November 2010
AQAP Attempted Air Freight Bombing
Saturday, 30 October 2010
Identity Fraud – The Plague of the 21st Century?
Who is using your identity? |
My top 5 tips to help prevent you becoming a victim of ID fraud:
Friday, 29 October 2010
So can the secret Ring of Steel save the City from terrorism?
Friday, 22 October 2010
Thank you!
Over the next couple of months we will continue to add new content, but we will be asking a couple of guest bloggers to contribute also........so please watch this space!
Tuesday, 19 October 2010
Securing Britain in an Age of Uncertainty: The Strategic Defence and Security Review
Wednesday, 6 October 2010
Beer Googles!
Some of the Internet Search Engines |
Any information posted on the internet is in the public domain so surely I/you shouldn't put anything on here that you don't want others to potentially see (for whatever reason), however the issue then comes when someone else puts something on the internet without your knowledge and which could potentially lead to reputational damage for you! Obviously the privacy settings within social networking sites could help here, but these are only as good as the users awareness of these and also your friends of a friend of a friends awareness of these also!!
From a legal or DPA prospective I am not too sure what the view on this is(but I can guess that it’s not particularly pro). Now with my security hat on surely advising a candidate at the initial stages that an internet search may take place will potentially deter the candidates who could pose a problem................in the current climate good candidates are a plenty, we all want to recruit the best, but we also don't want to recruit the candidate within the accounts department who has previous for fraud (but never convicted) or the candidate who has links to a terrorist organisation that joins your business to gain valuable intelligence and pose an insider threat.....or the person that lacks integrity and is clearly not a team player!
Update 7/10/10: Sal Remtulla, Head of Employee Screening at Risk Advisory has recently circulated some snapshots of recent CV liars. You can read her analysis here
Saturday, 2 October 2010
Friday, 24 September 2010
Chatham House Rule
Tuesday, 21 September 2010
20-26 Sept 2010 UK Home Security Week
Friday, 17 September 2010
Thursday, 16 September 2010
Counter Terror Conference 7-8 December, Russell Square, London UK
Counter Terrorism is delighted to welcome the following keynote speakers:
- Detective Chief Superintendent Liam O’Brien, ACPO TAM Interoperability Lead
- Adrian Dwyer, Counter Terrorism Risk Advisor, British Transport Police
- Mike Downing, Deputy Chief, Counter Terrorism and Criminal Intelligence Bureau, LAPD
- Andrew Huddart, Program Manager, National & Local London Resilience Team
- Rob Bartlett, Programme Manager Operations, Government Olympic Executive 2012
- Sue O’Sullivan, Deputy Chief of Police, Former President of the Counter Terrorism Alumni Association, Ottawa Police Service
- Col Tony Abati, US Army Special Forces Chief of Current Operations Deputy Director for Special Operations (J37) 3000 The Joint Staff, The Pentegon
- Detective Chief Inspector Chris Philips GCGI, FSyl, National Counter Terrorism Security Office (NaCTSO)
- Superintendent Alan King, CBRNe Co-ordinator, Metropolitan Police
- Joris De Baerdemeaker, Bio Terrorism Prevention Program Manager, INTERPOL General Secretariat
- Chief Inspector Tim Marjason, Strategic Business Continuity Manager, CO3 Emergency Preparedness OCU, Metropolitan Police Services
- and Me, Richard Bell, Security Audit Manager, Transport for London
- Expanding the use of scanning devices outside of airport security
- Operational command and control
- Overcoming communication challenges to improve response times
- Operational feedback from anti terror CCTV
- Future requirements for surveillance technology
- Combating the emerging threat of cyber terrorism
- Latest developments in biometric identification
Social Engineering Definitely a Massive Threat!
When was the last time you spoke to a recruitment company? The consultants use a form of Social Engineering to 'tease out' information about you, the organisation you work for (or previously worked for) and also some information about your colleagues. This information is not only used by them to help you but its also utilised by them to make more contacts, to get a better understanding of what the job market is doing and to ultimately make more money (and why not).
Personnel Security is now a very important part of any organisations security strategy. The potential risks from an 'insider threat' are reducing (with the appropriate processes in place), but attackers no longer need to gain legitimate employment they can gain the trust of the unsuspecting staff (normally at a junior level) to provide the sensitive information they require to penetrate your organisation (physically or electronically).
Tuesday, 14 September 2010
Don’t pay for Skype – It’s a scam
Action Fraud states that Internet users are being warned to watch out for a scam that charges money for what appears to be an upgrade of Skype. Check out this, other current fraud threats and how to report fraud at http://www.actionfraud.org.uk/ or read more
Monday, 13 September 2010
Cash Machine Device Found
http://www.securityoracle.com/news/detail.html?id=17331
Tuesday, 7 September 2010
The Security Institute Conference 2010
The thing with conferences is it's probably impossible for the organisers (who did a great job by the way) to provide speakers who are relevant and of interest to all the attendees but the common theme was security - or rather 'Security Art or Science' and at times we appeared to wander from this path. To be a little more specific there were at least two speakers who just simply gave a breakdown of the work they and their teams do - which was not inline with the conference portfolio and if I am totally honest I found it a little self indulgent. There was also one speaker who mentioned security twice throughout the entire presentation and is 45mins of my life that i will never get back.
Before anyone asks I don't mean the presentation by 'The Colourworks' which was great and very thought provoking, non 'security' related yes but very relevant to building a more effective and dynamic team.
I thought Lord Carlile was great and what a fantastic president for the SyI bearing in mind the roles past and present he has held.
So the big question for me is still around the institute acquiring Chartered status and how this will be obtainable by me and other members.......I guess it's out of my hands and one to keep a watching brief on.
Below is brief breakdown of the two days:
1330: CoLP a good insight into the work that is being carried out by the NFIB.
1246: Lord Carlile a very worthy president of the SyI.
1151: Azeem Aleem is talking convergence, what an interesting subject. A very knowable presenter and a few bits to take away and think about.
1132: William Hill 30mins in and security has been mentioned once.
1047: Mitchell's and Butlers a basic presentation to a group of experienced security professionals.
0940: Bill Butler from the SIA was interesting. I wouldn't want his job for any amount of money.
0900 Day 2: Don Randall was funny and gave a good insight into the work around acquire Chartership, the register of security particinors and the WCoSP.
1802: End of day one. It's been an entertaining afternoon and we have had some interesting speakers (Hostage UK was my favourite). Let's wait until the end of tomorrow for my overall thoughts. Time for a beer.......the BBQ starts at 7pm.
1721: You and your team - unleashing the x-factor.......very entertaining and interesting actually quite thought provoking!
1623: Hostage UK are on, maybe one day I might need them if I spend anymore time in Croydon! A very interesting presentation from a knowledgable presenter. That's one business card that I will hopefully never need to use!
1500: The Art of the Forger seems to be a debrief of successful UKBA 'jobs'. Entertaining but I question if its relevant to the audience at the senior level of them (not me) are at?! More useful to a bunch of HR managers.
1436: Just had a whirlwind tour of Risk Management. Audit and review were mentioned but a little negatively I thought! Ummm some education needed.
1345: Things have kicked off.......hold on tight.
1135: What a great location! Let's hope the content is up to scratch.
Monday, 6 September 2010
Personnel Security is a must for any organisation.
Security is simple - another data loss
Keychain cops
A memory stick containing anti-terror training manuals and other sensitive material was reportedly found on a street outside a Manchester police station.…Tuesday, 24 August 2010
SMT Online End User News
Monday, 26 July 2010
FGH Security Get The Dragons Backing
- Posted using BlogPress from my iPhone
Thursday, 22 July 2010
Certificate in Terrorism Studies
Counter Terrorism Conference, 10th – 11th November 2010, London, UK
Counter Terrorism Conference, 10th – 11th November 2010, London, UK
Counter Terrorism Conference “Prepare, Prevent, Pursue, Protect” will be held 10th – 11th November 2010 at Hilton London Kensington, United Kingdom. Take the chance to hear a Keynote Address from Richard Bryan, Director of Commissioning, Olympic and Paralympics Security Directorate, Home Office, UK. His presentation will update you on the challenge of securing the London 2012 Olympic Games.
Hear how we will ensure a joined up multi-agency approach and the challenge of striking a balance between effective and visible security.
Keynote addresses also include:
- Assistant Chief Constable John Wright, Head of Prevent, Office of the National Co-ordinator Special Branch, Home Office, UK
- Asim Hafeez, Head of Intervention, Office of Security and Counter Terrorism, Home Office, UK
- Detective Chief Inspector Raffaele D’Orsi, S015 Counter Terrorism Command Ports, Metropolitan Police, UK
HOW TO BOOK
Visit www.smi-online.co.uk/counter-terrorism7.asp
Contact Teri Arri on: +44 (0) 20 7827 6162or email: tarri@smi-online.co.uk
Wednesday, 21 July 2010
This is an Interesting Feed on Linkedin
For now I will remain tight lipped on this subject, but watch this space!!
Monday, 21 June 2010
£3m 'anti-terror' CCTV cameras 'set up to spy on Muslims' to be covered
Rodger Godsiff, Labour MP for Hall Green, said: ‘Police have got themselves into a bit of a hole now because they have a difficult problem to explain to the public and try and get them on their side. ‘If the money did not come out of a counter-terrorism budget they may have got a different reaction.’
Wednesday, 2 June 2010
How to Provide Security Assurance in 9 Easy Steps!
In conjunction with management you should produce and deliver an Annual Programme (1) of risk based audits aimed at ensuring security risks are identified and effectively managed. It is more than useful to obtain senior executive level approval that is communicated throughout your organisation and that clearly sets out the objectives, authority and responsibilities of the Department conducting these security audits.
Once high level approval is obtained you need to develop a structure as to how these security audits should be done and who needs to be involved. Below is an idea for a structure that could be adopted once the business area or security risk owner (also known as an auditee) has been identified.
Tuesday, 1 June 2010
Personnel Security - Something we should all be paying a lot of attention to!
In these modern times not only are organisations at risk from external threats but we also have a very significant threat from the insider. An insider is classed by the CPNI (part of the security services) as 'someone who exploits or has the intention to exploit their access to an organisations assets'. So this could result in a number of different scenarios including fraud or an employee who sells your company data to a competitor or an employee who is feeding information to a terrorist organisation.
Personnel security is an area that many 'security professionals' think they understand, but in my experience actually don't. There are elements of personnel security which are managed by non security departments for instance pre employment screening by HR or it may even be outsourced to a 3rd party provider. If this is the case I recommended carrying out some of your checks to see if they are doing what you think and expect they should be doing.
I am lucky enough to receive training from some world class experts in this area, but the level of understanding is very different from organisation to organisation. The strategic objectives for personnel security are the same for everyone but in a private sector environment I believe it is a little more difficult, for example government departments have a security policy framework(SPF) which includes 70 mandatory controls (supported by various baseline standards) which must be adhered to (along with a annual declaration of adherence). The private sector has not got this level of hierarchy governance but of course there is no reason why at a local level you can’t have a similar assurance process. I would recommend any security professional obtaining a copy of the SPF which is publicly available here It is useful and a document which I refer to regularly.
1. Assess Personnel Security Risks and include these on your risk registers
2. Have a helpline in place for employees to confidentially report concerns
3. Know the source of employment references
4. Confirm employee has the Right to Work in the UK (a legal requirement)
5. Carryout qualification checks and check physical certificates where possible
6. Where possible complete the 'pre-employment screening' process prior to start date
7. Promote a positive security culture
8. Advise potential employees of the level of checks you use, this may deter potential insiders
9. Transparency - have clear polices and procedures in place
10. Audit - to provide assurance that the systems are effective
In future blogs I intend providing some more details on each of the individual personnel security subjects which will hopefully help you going forward.