Você está na página 1de 24

DECEMBER/JANUARY 2007

S ECURIT Y
eXeCUtiv e
A PUBLICATION OF ThE NATIONAL ASSOCIATION OF SECURITY COMPANIES

SECURITY, SYSTEMS & THE INSIDER

THREAT
ALSO INSIDE…

>PROTECT ThE COUNTRY—WhILE PROTECTING YOURSELF 16


> IN ThE NEWS 4
> LEGISLATIVE UPDATE 20

WWW.SECURITYEXECUTIVE.ORG
Consider
Your Liability
Insurance
Just Once.
As one of the leading providers of
insurance to security guard firms,
Brownyard Group is skilled in writing
insurance policies that consider
the unique exposures and risks of
your industry.

Brownyard Group’s custom insurance


packages are tailored to meet the
complex needs of our nation’s leading
security guard firms. In addition,
Brownyard’s admitted, A-rated carriers
provide the kind of security that your
business needs.

Your business is a specialized one.


Brownyard has been providing
specialized insurance coverage for
more than 50 years. Isn't it time they
became your partner?
Brendan Brownyard
For more information on how we can
help you, please have your agent or
broker call the Brownyard Group.

Commercial General Liability


Business Auto
Excess & Umbrella Liability
First & Third Party Dishonesty
Commercial Property
21 Maple Avenue, PO Box 9175
Workers’ Compensation Bay Shore, NY 11706
Inland Marine Call Toll Free (800) 645-5820
License Bonds www.brownyard.com
In-House Claims Facility

P i o n e e r s i n t h e P a s t . I n n o v a t o r s f o r t h e f u t u r e.™
Table of Contents

FEATURES
DECEMBER/JANUARY 2007 • VOLUME 2, NO. 1
W W W. S E C U R I T Y E X E C U T I V E . O R G
Security, Systems & The
Insider Threat EDITORIAL
Publisher
Today’s automated society is giving rise to a

12
Joseph Ricci, CAE
new breed of security professional. jricci@nasco.org
Editor
By Edward J. Appel Jennifer Sikorski
editor@securityexecutive.org

DESIGN & PRODUCTION


Art Director
Protect the Country—While Jacki Silvan
Protecting Yourself art@securityexecutive.org

Changes to SAFETY Act application help

16
foster better security. ADVERTISING SALES
Joan Daly
By Brian Finch joan@securityexecutive.org

BOARD OF DIRECTORS
IN EVERY ISSUE Chair: Martin Herman, Special Response Corporation
1st Vice Chair: Heather O’Brien, Security Forces, Inc.
2nd Vice Chair: James McNulty, Securitas Security Services USA
2 Calendar of Events 3rd Vice Chair: Stephen I. Kasloff, Guardsmark, LLC
Treasurer: Lynn C. Oliver, American Security Programs, Inc.
4 In the News Secretary: Robert Kilbride, The Wackenhut Corporation

TAKING INITIATIVE: IACP to Reinvigorate Public-Private Summit Director-At-Large


Dennis Roberts, SecTek
Initiatives
Executive Director: Joseph Ricci, NASCO
LEAD THE WAY: Why Do Employees Fail? Past Chair: G. R. Massimei, U.S. Security Associates, Inc.

TAKE NOTE: New Federal Spending Resource Online Security Executive is published bimonthly by the National Association of
Security Companies (NASCO), the nation’s largest contract security trade
KICK IT UP: CALSAGA Conference Recap association. Security Executive is designed to provide practical information on
all aspects of security management. Subscription rates: Free for members and
BOOKMARK IT: Security Author Publishes Fictional Murder Mystery non-members in the U.S., Mexico and Canada; $45 for international members;
$55 for international non-members. Security Executive content may not be
photocopied, reproduced or redistributed without the consent of the publisher.
FRONT LINES: Right Management Survey Says “Trust Me” Copyright 2007. All rights reserved.

THAT’S A WRAP: IASIR Conference Wrap Up Security Executive is distributed to more than 6,000 decision-makers at nearly
3,000 contract security companies.
LEADING MAN: AlliedBarton Appoints Gane to Lead Chemical Opinions or statements of authors and advertisers appearing in Security
Service Sector Executive are their own and do not necessarily represent the opinions or
statements of NASCO, its board of directors or NASCO staff.
BUSINESS’ BEST: NRCC Names Dolan 2006 Businesswoman of Security Executive welcomes article submissions and reader feedback. Articles
the Year and comments may be e-mailed to editor@securityexecutive.org. Include your full
name, address and phone number.
ON THE JOB: In the Line of Duty
For questions regarding subscriptions, please call 703.518.1478.
8 NASCO News Postmaster: Send address changes to Security Executive, 1625
Prince Street, Suite 225-B, Alexandria, VA 22314.
ON TASK: NASCO Conducts Federal Protective Service Working
Group
GETTING INVOLVED: NASCO Representatives Participate in
Industry Leadership Events
PLAN AHEAD: NASCO to Conduct Strategic Planning Sessions

20 Legislative Update National Association of Security Companies


1625 Prince Street, Suite 225-B | Alexandria, VA 22314
www.nasco.org
cover photograph: Jean schweitzer | agency: dreamstime

DECEMBER/JANUARY 2007 • SECURITYEXECUTIVE.ORG


1
Calendar of events

JANUARY 17–19 FEBRUARY 13


ASIS International Leadership Meeting NASCO Board of Directors
Arlington, Va. Bal Harbour, Fla.
www.asisonline.org www.nasco.org

FEBRUARY 5–7 FEBRUARY 14


ASIS Asia-Pacific Security Conference NASCO General Membership Meeting
Singapore Bal Harbour, Fla.
www.asisonline.org www.nasco.org

FEBRUARY 6–7 MARCH 27–30


Homeland Security: The Ripple Effect ISC West
Washington, D.C. Las Vegas, Nev.
www.apus.edu/disaster www.iscwest.com

When your company


is faced with a crisis,
whether man-made or natural;
trust the experts in security
100%
Military & Police Experience.
and executive protection:

Special Response Corporation,


where every security officer
has extensive military or
police experience...
And every one is
a security specialist.

The leader in specialized www.specialresponse.com


security services. 4 1 0 . 7 8 5 . 1 2 1 2

DECEMBER/JANUARY 2007 • SECURITYEXECUTIVE.ORG


2
REGISTRATION INFORMATION

Name
NASCO CEO Briefing

Increasing the Value of Your Private Title

Security Business
Company
Tuesday, January 23, 2007 • 11:30 a.m. –2:00 p.m. • New York City

Email address

This interactive session offers participants an overview of private security


trends and issues that impact the business of contract security, including Phone number
building and maintaining value and growth. Our distinguished panel of private
security industry leaders includes current and former contract security owners LOCATIONS
and creates a forum for information sharing. Additional panelist and special
New York City $35
guests will be announced for each event and will include: Tuesday, January 23, 11:30 a.m. –2:00 p.m.

Orange County $35


Tuesday, March 6, 8:00 – 10:30 a.m.

FRANK ARGENBRIGHT—Chairman and CEO, SecurAmerica Los Angeles $35


Tuesday, March 6, 12:30 –3:00 p.m.
Mr. Argenbright is founder of AHL Services provider of outsourced business
services for Fortune 500 companies; founder of Air Serv Corporation
San Francisco $35
provider of outsourced business services to aviation companies and founder Wednesday, March 7, 11:30 a.m. –2:00 p.m.
of SecurAmerica provider of outsourced security services.
• Chicago $35
Wednesday, March 14, 11:30 a.m. –2:00 p.m.
ROBERT PERRY—Principal, Robert H. Perry Associates
Mr. Perry has advised and managed the sale, merger and acquisition of more Atlanta $35
than 150 security guard companies across five continents during his 25 year Wednesday, April 4, 11:30 a.m. –2:00 p.m.
career.
• PAYMENT INFORMATION
STEVE FROST — Principal, TCB Services
Visa | MC | AMEX | CHECK
Mr. Frost has over 36 years in senior management positions at several of
the nation’s largest contract security companies and has participated in 94
security industry acquisitions.
Name on card

credit card number exp. date

signature

Other sessions to be held in:


Fax your completed registration form to
ORANGE COUNTY 703.706.3711
Tuesday, March 6 or RSVP at mquaranto@nasco.org or 703.518.1478.


LOS ANGELES
Tuesday, March 6 NASCO VALUED VENDORS

SAN FRANCISCO
Wednesday, March 7

CHICAGO
Wednesday, March 14
NASCO CEO BRIEFINGS SUPPORTER

ATLANTA
Wednesday, April 4
In the news

LEAD THE WAY


summit report
IACP to Reinvigorate

TAKING INITIATIVE
Why Do
recommendations
Public-Private
Employees Fail
Leaders of the major law
enforcement and private
security organizations should
Summit Initiatives
make a formal commitment to A resolution adopted by the International Associa-
cooperation. Forty-six percent of new hires fail within 18 months
tion of Chiefs of Police (IACP) on Oct. 17, 2006,
of their employment, while only 19% achieve
may bring new energy to the action steps recom-
The Department of mended by more than 100 prominent executives unequivocal success. According to a study by Leader-
Homeland Security and/or from law enforcement and private security during ship IQ, poor interpersonal skills, such as the ability
Department of Justice should fund a 2004 National Policy Summit. That conference, to accept feedback or inability to understand and
research and training on relevant
“Building Private Security/Public Policing Partner- manage emotions, account for the majority of failed
legislation, private security and
law enforcement-private security ships to Prevent and Respond to Terrorism and
employment experiences. n
cooperation. Public Disorder,” focused on the importance of such
cooperative efforts as part of the nation’s homeland
security, as well as on more mundane criminal According to the study, the top five
The Department of reasons for new hire failure are:
conduct.
Homeland Security
and/or Department of Justice Coachability – 26%
should create an advisory The U.S. Department of Justice Office of Com-
Emotional intelligence – 23%
council composed of nationally munity Oriented Policing Services (COPS) and the
prominent law enforcement and Motivation – 17%
IACP organized the summit. NASCO — along with
private security professionals Temperament – 15%
ASIS International, Security Industry Association
to oversee the day-to-day
implementation issues of law and International Security Management Associa- Technical competence – 11%
enforcement-private security tion — was a corporate sponsor of the event.
partnerships.
The recently approved resolution, submitted to the
general membership by the IACP’s Private Sector
The Department of
Homeland Security Liaison Committee (PSLC), calls for the IACP to TAKE NOTE
and/or Department of Justice, coordinate with the summit’s other principals a fact-
along with relevant membership
New Federal
finding meeting to determine the current status of
organizations, should convene the recommendations. It then will share its findings
key practitioners to move this
with the PSLC. If the IACP leadership finds that no

Spending
agenda forward in the future.
significant activity has furthered accomplishment
of the itemized recommendations, it will designate
Local partnerships should
set priorities and address
liaisons from the Board of Officers and staff, respec-
tively, to assist the PSLC in moving these critical
Resource Online
key problems the summit
recommendations forward. Find information regarding contracts and grants
identified. Examples of local
and regional activities that can issued by federal agencies and departments at www.
and should be undertaken Recommendations from the summit report address
FedSpending.org. Developed and maintained by the
immediately include the following: the urgency of developing partnerships and the im-
improve joint response to portant roles of law enforcement and private sector
Office of Management and Budget Watch, a private
critical incidents; coordinate “watchdog” group, the site’s data comes from the
organizations in guiding the necessary processes to
infrastructure protection;
improve communications and nurture and support those cooperative efforts. n Federal Procurement Data System and the Federal As-
data interoperability; bolster sistance Award Data System and shows where
information and intelligence
money is spent, type of competition
sharing; prevent and investigate
high-tech crime; and devise
responses to workplace violence.
RESOURCE and links companies with their
subsidiaries. n
The full report can be found at
www.cops.usdoj.gov/mime/open.
pdf?Item=1355. RESOURCE
Find this resource at:
www.FedSpending.org

DECEMBER/JANUARY 2007 • SECURITYEXECUTIVE.ORG


4
CALSAGA Conference Recap
KICK IT UP

On Nov. 8 and 9, the California Association of taser products, live scan and biometric products that will further help protect companies from
Security Agencies, Guards, & Associates held its and guard monitoring systems. potential lawsuits.
annual conference, CALSAGA & You: A Security
Partnership for the Future, at the Pechanga Resort CALSAGA President Mark Miller kicked off Other highlights of the conference included
& Casino in Temecula, Calif. Leaders from the the conference by briefing the group on the Erroll Southers, former deputy director of
security industry and state agencies joined mem- progress of CALSAGA in 2006. He also touched California Homeland Security. Southers cur-
bers of California’s private security industry for the on several issues that are critical to members rently is the associate director for California
association’s largest event of the year. and was hopeful that the conference would Risk & Economic Analysis of Terrorism Events
create the necessary dialogue needed to address (CREATE) at the University of Southern
The conference brought together industry experts these problems, specifically with meal/rest break California. He presented profiles of potential
and private security companies to discuss issues period compliance. terrorists and terrorist cells that have been
facing the security industry. Attendees had access linked to California from one time or another.
to a wide range of vendors, including companies In the morning segment on the first day of the Southers did a fantastic job of clearly outlining
providing uniforms, insurance services, meal and conference, California Labor Commissioner the dangers the country faces.
rest break tracking, guard monitoring systems, Robert Jones specifically addressed what his
merger and acquisition services, consulting and office is doing with regard to meal/rest break Guest speaker Mickey Doll also gave a presen-
marketing services, time and attendance software, period compliance-related issues. As expected, tation on emergency preparedness and disaster
many attendees expressed concern and asked the response lessons learned from Hurricane Ka-
commissioner what they can do to protect their trina. There was also an in-depth discussion on
businesses from potential lawsuits associated California workers’ compensation system from
with meal/rest breaks. The commissioner was Carrie Nevans, director of the State Division
very forthright with the group on the issue but of Workers’ Compensation, and Mark Webb
vowed to work with the industry and specifically with Employers Direct Insurance Company.
encouraged each company to report meal/rest
break lawsuits directly to him and he would BSIS Chief Paul Johnson and Deputy Chief
investigate further. Rick Fong were on hand to give a report from
the bureau. BSIS also staffed a booth for the
Attorney Laura Innes of Simpson, Garrity & entire conference so that attendees could have
Innes also addressed the issue of meal/rest break questions answered in person. n
CALSAGA President Mark Miller kicked compliance on the second day of the confer-
off the conference by briefing the group on
ence, promising attendees that she would send
the progress of CALSAGA in 2006.
the group a meal/rest break period waiver form

BOOKMARK IT

Security Author Publishes Fictional Murder


Mystery
Ernest C. “Bud” Blount, director of Strategic Part- they are based on real-world experiences and and side entangle-
nerships for Wackenhut Services Incorporated and cases I’ve worked over the years.” ments with mortal
a long-time private security and law enforcement enemies arise.
leader, recently published his first work of fiction. In the book, Palm Beach County Sheriff ’s
The novel, “Death is a Window,” is a murder detective Jake Cade is tired, divorced and lonely, As a former criminal investigator, Blount
mystery set in Palm Beach, Fla. oiling his emotional wounds with booze and brings this police-crime saga to life as only a
thinking suicide. But when a brutal serial killer person with his investigative experience and
“I’ve written and published several non-fiction starts mutilating young student nurses, Cade is writing talent can. The book has received good
security-related books,” Blount says. “I wanted to drawn into a catch-them-before-they-kill-again reviews and can be purchased at www.eblount.
stretch myself to write a believable mystery novel. time warp that produces a life-changing emo- com or Amazon.com. n
While all the people, cases and story are fictional, tional shift for him. It’s a deadly race with time

DECEMBER/JANUARY 2007 • SECURITYEXECUTIVE.ORG


5
In the news

Right Management Survey Says “Trust Me”


FRONT LINES

During the past two years, according to a


recent Right Management survey, 37% of toP wAys mAnAgers cAn toP wAys mAnAgers
respondents believe trust in the workplace Lose trust cAn BuiLd trust
has remained the same, 34% believe trust has 64% Lying or half-truths 57% Respect for fellow employees as
increased and 29% say trust has decreased. partners and equals
61% Inconsistent behavior between what
you say and do
52% Honesty
When it comes to building or destroying trust, 36% Withholding information
respondents had some ideas: 47% Involvement with vision and strategy
22% Demeaning attitude
19% Failing to develop subordinates 30% Information-sharing

18% Seeking personal gain above shared 21% Commitment to developing people
interest
14% Rigid, inflexible behavior and close 17% Doing the “right thing” regardless
mindedness of personal risk

13% Unpredictability 15% Focusing on shared goals, not


personal agendas
13% Arrogance
ACCORDING TO RIGHT MANAGEMENT’S SURVEY

THAT’S A WRAP

IASIR Conference Wrap Up


At the International Association of Security updating and policy discussions. Regulatory have delayed implementation of the 2004 law
and Investigative Regulators (IASIR) an- administrators also embarked on a long-term have finally been cleared at the federal level.
nual conference, regulatory officials from the project of benchmarking regulatory best Several state agencies, previously lacking the
United States and the United Arab Emirates practices. authority to conduct federal checks on security
swapped information with their Canadian applicants, were pleased to learn that the focus
counterparts on various licensing and enforce- IASIR has been a strong supporter of the can now shift to individual states to make this
ment issues about planning for crises ranging Private Security Officer Employment Autho- long-sought procedure a reality.
from an avian flu epidemic to a shrinking rization Act, which allows authorized private
workforce as baby boomers transition to retire- security employers to obtain criminal history To learn more about IASIR and to read
ment. The conference, held Nov. 7-9, 2006, background checks in jurisdictions that lack about the Halifax conference programs, go to
in Halifax, Nova Scotia, attracted participants the usual state law mandate for background www.iasir.org. n
from the government and the security industry checks through the Federal Bureau of Investi-
for a three-day marathon of problem solving, gation’s database. Administrative hurdles that

© photographer: bora ucak | agency: dreamstime.com


ELECTIONS FOR IASIR OFFICERS AND DIRECTORS WERE HELD DURING THE CONFERENCE. HERE ARE THE RESULTS:

OFFICERS Treasurer: Constance Crawford, Florida Ted Williams, Ohio Department of Public
President: Marie Ohman, Minnesota Board Department of Agriculture & Consumer Safety, Homeland Security
of Private Detective and Protective Agent Services, Division of Licensing
Jon Herberman, Ontario Ministry of
Services
Past President: Leon D. Baker Jr., Virginia Community Safety & Correctional Services
First Vice President: Wayne Rogillio, Louisiana Department of Criminal Justice Services
ASSOCIATE DIRECTORS (NON-VOTING)
State Board of Private Security Examiners
DIRECTORS AT LARGE Electronic Security: Beth Cain
Second Vice President: Rudy Buck, Arizona Arthur Varnadore, Florida Department of
Investigations: Bruce H. Hulme
Department of Public Safety Agriculture & Consumer Services, Division of
Licensing Security Officers: Gail Simonton
Secretary: Karen Forsyth, Department of
Justice, Province of Nova Scotia Robert Edwards, Vermont Board of Private LEGAL ADVISOR
Investigative and Security Services Louis Gurvich, Esq., Louisiana State Board of
Private Security Examiners

DECEMBER/JANUARY 2007 • SECURITYEXECUTIVE.ORG


6
LEADING MAN

AlliedBarton Appoints Gane to Lead Chemical


Service Sector
AlliedBarton Security Services, the larg- tion and safety, including his experience with safety,” Gane says. “AlliedBarton is committed
est American-owned and managed security nuclear facilities and with working within a to ensuring this critical part of our national
services firm, announced the appointment regulatory environment, makes him the ideal infrastructure is protected and well served.” n
of Scott R. Gane, vice president, to lead leader to grow AlliedBarton’s specialized ser-
AlliedBarton’s Special Service Offering in the vice offering in the chemical and petrochemi-
Chemical and Petrochemical industry. Gane cal sector,” says Bill Whitmore, president and
joined AlliedBarton through the acquisition CEO of AlliedBarton Security Services.
of Initial Security, where he served as regional
vice president of the East Central Region. “The chemical and petrochemical industries
are essential to the nation’s efficiency and
“Scott’s extensive background in plant protec- competitiveness as well as overall health and

ON THE JOB
BUSINESS’ BEST

NRCC Names
Dolan 2006 In the Line of Duty
Businesswoman During the past few months, several security fenced facility. The officer, Reina N. Lynch,

of the Year officers have risked their lives to protect


people and property, including during a
was a school bus driver and the mother of
two children. Police said a fellow security
bank robbery in Los Angeles and at a FedEx officer arriving for the day shift at 7 a.m.
Tom Reynolds,
facility in Maryland. discovered Lynch lying on the ground with
lisa dolan

chairman of
a single gunshot wound in her upper body.
the National
A 64-year-old security officer at a Bank of She was pronounced dead at the scene.
Republican
the Orient 20 miles outside Los An- Company officials were providing inves-
Congressional
geles is being hailed as a hero for tigators with security films, entry
Committee,
thwarting a bank armed robbery logs and other information.
named Lisa
despite several bullets wounds.
Dolan, CPP,
The officer was shot twice and Lynch worked for Ronin Risk
the 2006 Busi-
still managed to wrestle International, a security firm
nesswoman of the Year for New York. Dolan
a gun from the assailant. with 600 employees based
is president of Securit, a licensed private
The officer was first shot in Salt Lake City spe-
investigations firm located in Flushing, N.Y.
following his command cializing in providing
© photographer: Ivan cholakov | agency: dreamstime.com

to the suspect to drop security for goods in


The award recognizes the top U.S. business
to the floor and shot a transit and at ware-
leaders who have successfully integrated busi-
second time while trying houses and distribution
ness and financial success with the support of
to subdue the suspect centers. n
Republican ideals.
using pepper spray. The
name of the officer and
Influential community leaders were singled
firm was not released.
out to receive this prestigious award because
of their willingness to provide invaluable in-
A 26-year-old security officer
put to the Business Advisory Council and for
working at a FedEx Ground dis-
their commitment to the Republican Party. n
tribution center in Beltsville, Md.,
was fatally shot while working at
the guardhouse at the entrance to a

DECEMBER/JANUARY 2007 • SECURITYEXECUTIVE.ORG


7
nAsCo Update

NASCO Conducts Federal Protective Service


ON TASK

Working Group
NASCO hosted the first meeting of its Federal from law enforcement, police or special officers
funcTions should drive
Protective Service (FPS) Working Group to begin that have additional powers, roles and responsi-
a task analysis process for security guards/officers bilities. The industry has long preferred the term reQuiremenTs. This group
that reaches across federal and commercial mar- officer based on the negative connotations of the can help idenTify funcTions,
kets, as well as industries and applications, to set a term guard. To differentiate the two terms, the
Tasks and skill seTs ThaT musT
basic guideline for security functionality. group discussed that perhaps a difference can be
highlighted between guards and officers based on be supporTed by Training.
The process includes identifying basic functions “meeting minimal defined standards” as outlined
and tasks, assigning criticality and validating by federal agencies, departments, state and local The group identified five functions as the basic
training to improve operations. The three pri- municipalities. tasks of the majority of security officers, as well
mary goals of the group are to: as seven basic training areas that are subject to
1. Define security guard or officer; The group established the following working additional considerations:
2. Identify security functions and tasks; and definition of private security officer and will
3. Validate these for contract and training continue to review and refine the definition based Security Officers’ Tasks
requirements. on feedback, further research and validation: 1. Access control
2. Visitor processing
“Functions should drive requirements,” says A security officer is a natural person assigned 3. Screening
Fred Muccino, Guard Force Operations Branch, to safeguard persons and property, and reduce 4. Patrol and response
Security and Law Enforcement Division, inspec- vulnerability and risk of theft and loss. Secu- 5. Control center integration
tor, FPS. “This group can help identify functions, rity officers meet minimal defined standards
tasks and skill sets that must be supported by and are members of a security system. Training Areas
training.” 1. Access control
The group reviewed several existing definitions The “security system” consists of other counter- 2. Security patrol
of security guard and/or officer under Muccino’s measures to reduce and mitigate risk that can be 3. Defensive and control procedures
premise that a “guard is a guard is a guard” focus- categorized into seven primary systems: 4. Emergency procedures
ing on establishing a basic set of tasks and skills 1. Surveillance 5. Communications
that can be built upon and supplemented based 2. Barriers 6. Legal aspects
on assignments. 3. Alarms 7. Report writing
4. Access control
The discussion also tried to differentiate between 5. Communications The NASCO FPS Working Group will meet
the terms “guard” and “officer.” Many federal 6. Screening quarterly and communicate regularly to discuss
policies, procedures and documentation refer to 7. Security force and refine these initial findings, including deter-
private security “guards” to differentiate them mining criticality of the identified functions and
tasks, validation and training. n

MEmbers of the NASCO FPS Working Group

bud blount LYNN OLIVER MARK porterfield JEFF Roehm dennis roberts
wackenhut American security AlliedBarton American security SecTek, inc.
services, INc. programs, inc. programs, inc.

Not pictured:
Chair, Shawn Jacquard, The Wackenhut corporation; chris mashburn, international RAM Associates; Fred Muccino, FPS

DECEMBER/JANUARY 2007 • SECURITYEXECUTIVE.ORG


8
GETTING INVOLVED

NASCO Representatives Participate


in Industry Leadership Events
Woertz regarding the importance of govern-
joseph ricci

gail simonton
ment-industry cooperation to improve safety
and security worldwide.

SCHEDULING
TIME & ATTENDANCE
Professional Services Council (PSC) is a PAYROLL
NASCO Executive Director Joseph Ricci and national trade association for the government
NASCO Director of Government Relations professional and technical services industry COMPLIANCE
and Legal Counsel Gail Simonton recently par-
ticipated in several security and security-related
focused on preserving, improving and
MANAGEMENT
expanding the federal government market.
programs with associations impacting private
security operations, including:
NASCO is an association member and
BENEFITS
regularly participates in meetings with
government leaders such as an upcoming
ADMINISTRATION
U.S. Department January meeting with Jay Cohen, under
of State Overseas secretary for Science & Technology, Depart-
PERFORMANCE
Advisory Council ment of Homeland Security. TRACKING
(OSAC) promotes
security ASIS Private
REAL-TIME REPORTING
cooperation Security
between American Services
24/7 SUPPORT
business and private sector interests worldwide Council
encompassing the 34-member core council, an (PSSC) formed
executive office, more than 100 country councils to facilitate the exchange of best practices to
and more than 3,500 constituent member
Valiant helps more than 60% of
raise the standards and increase productivity of
organizations and 372 associates. The objectives professional security services, as well as to the largest, fastest growing
of the council include establishing continuing increase awareness of their role in protecting national and regional contract
liaison and operational security cooperation with people and property. The PSSC recently
the private sector and provide regular, timely
security companies harness the
conducted Security Force Management, an
interchange of information. The recent 21st educational program focused on screening, speed and power of technology
Annual OSAC Briefing attracted nearly 1,200 training and managing security officers led by to work smarter, more produc-
practitioners and experts with government,
nasco represenTaTives
tively every day!
contract and in-house security attendees.
parTicipaTe in securiTy-
Don’t let others capture the
General Services
relaTed organiZaTions
Administration competitive advantage, contact a
To advocaTe and serve (GSA) Industry Valiant Workforce Management
The besT inTeresTs of The Government Council
Solutions representative today!
(IGC) is a working
conTracT securiTy indusTry.
partnership and
information-sharing group concerned with
private security leaders and focused on global evolving issues related to the GSA Schedule
resiliency with presentations by government and other contracting vehicles. This group
officials such as Director of National Intelligence meets quarterly, and recent focuses include the www.valiant.com
Ambassador John Negroponte and business latest contracting developments such as GSA’s 800-521-4555
executives including Fortune 500 Archer Daniels new structure and direction, marketing info@valiant.com
Midland Company CEO and President Patricia >>continues page 10

DECEMBER/JANUARY 2007 • SECURITYEXECUTIVE.ORG


9
nAsCo Update

NASCO to Conduct Strategic GETTING INVOLVED


PLAN AHEAD

Planning Sessions
In an effort to best serve the private “There are many issues impacting the perfor-
NASCO
security industry and meet member
needs, NASCO will be conducting several
mance and value of contract security on a
daily basis,” says NASCO Executive Director
Representatives
strategic planning sessions during early
2007 involving members, non-members,
Joseph Ricci, CAE. “NASCO is trying to
position itself as the advocate and leader of Participate
in Industry
contract security customers (commercial the contract security industry and provide
and federal) and others impacted by private a return on investment to members and the

Leadership, cont.
security. The process will involve telephone private security community.”
interviews, environment scans, research,
focus groups and meetings to determine The strategic plan will provide focus and di-
the future of contract security, its position rection for the 30+ year-old trade association
>>continued from page 9
within private security and NASCO’s direc- in regards to legislative initiatives, member-
tion to best support emerging, evolving ship growth and development, research,
channels, quick payment and new rules allowing
market demands. education and information sharing. n
state and local governments to purchase off the
GSA Schedule for emergency preparation and re-
sponse (Section 833 of the 2007 National Defense
Authorization Act).

International Association of
Chiefs of Police (IACP)
Private Sector Liaison
Council (PSLC) facilitates
NASCO members include:
increased communication
and cooperation between
law enforcement and private security. During
IACP’s Annual Conference, the PSLC submitted a
resolution accepted by the general membership to
coordinate with a 2004 National Policy Summit a
fact-finding meeting regarding the status of recom-
mendations stemming from the National Policy
Summit’s “Building Private Security/Public Policing
Partnerships to Prevent and Respond to Terrorism
and Public Disorder.”

International Association of Security and


Investigative Regulators (IASIR) includes state
and provincial government regulators, private
industry, law enforcement and others interested in
enhancing public safety by promoting professional-
ism in the private security industry through
effective regulation. n

DECEMBER/JANUARY 2007 • SECURITYEXECUTIVE.ORG


10
Interested in Advertising in
Security Executive?

SECURI
AUGUS
T/SEP
TEMBE
R 200
6

EXECUT TY
A PUB

IVE
LI CATIO
N OF T
HE NA
TIO NAL A
SSOC IATION
OF SE
CUR ITY CO
MPA NIES

AS STA
ND ARDS
RISE,
DEMAN
D
FOR T
RAININ
G
SEES
EXPLO
SIVE
GROWT
H.

> STA ALSO


ND ING UP INSIDE

TO BE
COUNT
ED XX
> IN T
HE NE
> LEG WS
ISLATIVE XX
UPDAT
E XX
WWW.S
ECURI
TYEXE
CUTIV
E.ORG

As the official publication


of the National Association
of Security Companies,
Security Executive is
uniquely positioned to bring
our readers content that
they won’t find in other
publications.

To advertise,
contact NASCO at
703.518.1478.
Don’t forget to visit us on the Web
to download the latest rate card
and editorial calendar!

Y 2006
JUNE/JUL

S E CCUURTIITVYE
EXE L ASSOC
IA TION OF
SECURIT
Y COMPA
NI ES

Safe
ONA
THE NATI
A TION OF
A PUBLIC

P ll a
P n gg II TT
a yy ii n
FFERS
TY ACT O
/11, SAFE
AKE OF 9 TORS
IN THE W R INNOVA
NTITERRO
ION TO A
PROTECT

IDE…
ALSO INS
4
IT ON! 1
T…PASS
> PSSSS
NEWS 2
> IN THE
DATE 18
ATIVE UP
> LEGISL

.ORG
ECUTIVE
URITYEX
WWW.SEC

www.SecurityExecutive.org

DECEMBER/JANUARY 2007 • SECURITYEXECUTIVE.ORG


11
FeAtUreD ArtiCLe :: SECURITY, SYSTEMS AND ThE INSIDER ThREAT

TODAY’S AUTOMATED SOCIETY IS GIVING RISE TO A


NEW BREED OF SECURITY PROFESSIONAL.

W R I T T E N B Y E D W A R D J . A P P E L | I L L U S T R AT I O N B Y A N T O N Y P A P A N T O N I O U

A s contract security has dramatically


improved the sophistication
of protection, developments in information
technology and a surge in insider crime have
neW strAtegies
Security teams now include information
technology security specialists who protect the
firms’ systems from all kinds of threats lurking
changed the profession from the inside out as on the Internet and flowing with the e-mails
surely as Sept. 11, 2001 did. and data through the networks. The challenge
of integrating the work of facilities security,
Automation of access control and increased information security, personnel security and
capabilities of CCTV, alarms, detectors, asset protection now must include a thorough
biometrics, radio frequency identification understanding of a company’s virtual, as well
(RFID) and a host of other new gadgets allow as physical, assets. In addition, the emergence
all kinds and sizes of organizations to manage of automated security systems and new types
security with intelligent, integrated systems. Yet of forensic and investigative evidence demand
the crux of prevention, detection, response and broader and deeper training for security
resolution remains in the brains and hands of professionals. Fortunately, the payoff is clear:
the security personnel involved. substantial improvements in the level of
protection and in response to incidents.
Today, much is asked of the men and women
who stand the night watch. They are often The improvements we’re beginning to see from
tasked with protecting hundreds or thousands new technologies and security adaptations
of doors, sensors, fences and buildings. Inside include:
are billions of dollars in assets, not the least of
which are contained in the data and production • Systems that can detect and alert on signs of
capabilities of information and robotic systems possible misbehavior, helping prevent as well
that are networked globally. And the biggest as respond to an incident. For example, the
threats to these are the people who work there. 24/7 IT security system detects suspicious

12
The challenge of integrating
the work of facilities
security, information security,
personnel security and asset
protection now must include
a thorough understanding of
a company’s virtual, as well as
physical, assets.

13
FEATURED ARTICLE :: Security, Systems and the Insider Threat

activity in off-hours computing, activating the integrated security • Systems that analyze events in retrospect and can determine with
management system to inventory people present, capture their certainty what happened and who was involved. Among the
behavior via both digital CCTV recording and digital forensic technologies facilitating these improvements are digital CCTV
keystroke recording, and alerting both IT security personnel and recording, biometric access controls, multi-factor IT systems
physical security guards. Smart cards used for physical and cyber authentication, digital forensics (computer forensic analysis) and
access facilitate knowing who is on the campus. several physical forensic capabilities, including DNA, chemical
analysis, geo-locator devices on cell phones, PDAs, vehicles and
business equipment, RFID and embedded identification and alert
In an era of highly automated business devices on high-value assets. Today, security can find out who did it,
and government operations, the threat where and when — and locate the missing items.

posed by an insider can increase due


A Persistent Threat
to the potential to use computing to
Among the most costly losses to both business and government are
magnify the impact of the crime and to
the few but insidious insiders who steal, commit espionage, embezzle,
hide evidence. sabotage, threaten others and threaten the reputation of their
employers. Unfortunately, insider crime trends have not followed the
major crime statistics, which have dropped in the past decade. Since the
• Systems that measure activities, alerting and responding when those late 1970s, insider crime has risen, yet the metrics are elusive because so
activities exceed established norms. For example, in the “old days,” few businesses and agencies report insider crime statistics.
guards were constantly responding to alarms that malfunctioned, as
well as the comparatively few actual incidents. Based on time of day, The best indicators of insider crime levels come from surveys and the
location, value of assets, length of the anomaly (e.g. alarm condition) FBI’s financial crime reports. Because federally insured financial services
and alert status, if any (e.g. high crime area/threat), the security firms must file suspicious activity reports (SARs), and because the
management system prioritizes alerts, displaying live CCTV and FBI and Secret Service investigate financial crimes, there are reliable
recording events in an integrated file viewable from any computer indicators of insider crime trends. The statistics show that at least one-
with authorization and Internet access. Remote monitors allow third of those convicted annually of crimes against financial services
direction of a live security response to actual incidents, rather than companies are insiders, and often more. Banks and securities firms
false alarms. conduct background investigations on employees, audit their activities,

MONEY LAUNDERING STATISTICS

INDICTMENTS FOR SEIZURES FOR


MONEY LAUNDERING MONEY LAUNDERING

In Billions $
4
900 3.5
3.5
877
867 868
856 3

800 2.5
2.2
2 1.9
Illustration by Jacki Silvan

700 1.5

1 .859

600 0.5
2001 2002 2003 2004 2001 2002 2003 2004

According To Financial Crimes Report To The Public, FBI, May 2005

DECEMBER/JANUARY 2007 • SECURITYEXECUTIVE.ORG


14
often monitor them on the job and employ excellent security, yet the Evolving Technology
percentage of those involved in financial crimes has not substantially
Again, professional security is contributing to the solution. It is
dropped for more than 20 years. Similarly, surveys of many types of
now possible to prevent, detect and respond to computer crimes in
industries by major accounting firms by the Certified Fraud Examiners
progress; to warn users before they push the wrong key, mistakenly or
(who investigate major insider crimes) and the retail industry’s surveys
on purpose; to supplement normal vetting by including background
(where employees steal more than shoplifters) report a persistent threat
investigations on the Internet; and to search proprietary databases for
to all types of businesses from insiders.
indications of prior online misbehavior. These new solutions depend
on automation for immediate response, and on the new breed of
In an era of highly automated business and government operations, security professional who understands the role that systems play in
the threat posed by an insider can increase due to the potential crimes, as well as business functions.
to use computing to magnify the impact of the crime and to hide
evidence. Most businesses and government agencies have not yet
As the tools for securing our increasingly automated work environment
employed systems capable of protecting the employer against the
continue to evolve, it will be possible to improve crime prevention in
trusted insider. Further, most background investigations lack a focus
the pursuit of protecting people, information, assets and reputation.
on candidates’ life online, where especially young people spend more
Understanding evolving trends and utilizing the leading-edge tools to
time than their older predecessors. If a person has developed a habit of
the fullest are the province of today’s security professional. SE
computer systems misuse (e.g. hacking or using computers to commit
offenses), the person’s misdeeds might go undetected in a background
investigation, since most online criminals are not caught today.
Edward J. Appel is senior president and COO of the Joint Council on Information
Age Crime.

Your Resource for Career Connections in Security


Looking for that perfect fit? The National Association of Security
Companies introduces it’s all-new online employment service, the
NASCO Contract Security Career Center - your resource for
career connections in the security industry.

For Employers: This easy-to-use resource is designed to help you


recruit the most qualified professionals in the industry.

For Job Seekers: Whether you’re looking for a new job, or ready to
take the next step in your career, we’ll help you find the opportunity
that’s right for you.
To find a job or fill a position, visit http://careercenter.nasco.org today.

Contract Security Career Center


http://careercenter.nasco.org

DECEMBER/JANUARY 2007 • SECURITYEXECUTIVE.ORG


15
FEATURED
FEATUREDARTICLE
ARTICLE:: ::PROTECT
XXXXXX THE COUNTRY — WHILE PROTECTING YOURSELF

Changes to SAFETY Act application help foster better security.

Protect the
Country
While Protecting Yourself
W ritten by B rian F inc h | I llustration by D uncan W al k er

One of the more underreported success stories “anti-terror technology” (which is either a • Database search software.
of the Department of Homeland Security product or a service) may apply for liability • Maintenance services.
(DHS), the Support Anti-Terrorism By protections from the DHS. If the DHS awards • Vulnerability assessment methodologies.
Fostering Effective Technology Act of 2002 the protections of the SAFETY Act to an • Certification programs.
(SAFETY Act) is generating great hope. Given anti-terror product or service, its sellers and • Integration services.
that it provides broad liability protections for customers are protected from liability arising • Training services.
sellers of products or services that help detect, out of terrorist attacks. These protections
defend against or respond to acts of terrorism, include the immediate dismissal of claims Even if the SAFETY Act immunity is
many welcomed the passage of the SAFETY alleging liability arising out of the use of a circumvented (which can happen only
Act. Congress intended these protections to SAFETY Act-approved technology during a if the seller lied or committed willful
be applied as broadly as possible in response terrorist attack. Such protections are awarded misconduct when filing its application),
to concerns that conducting business in the only after DHS conducts a thorough review of other protections are still available, such as
homeland security market segment would the seller’s product or service. a bar on punitive damages and a liability
expose companies to nearly limitless legal cap at the amount of the seller’s insurance.
liability. Essentially, any product or service that has In addition, claims can only be filed in U.S.
an anti-terror application is eligible for federal court.
The process for obtaining SAFETY Act protections under the SAFETY Act. Examples
protections has been a work in progress. of products and services that have been SAFETY Act protections apply regardless
To that end, DHS recently implemented awarded protections under the SAFETY Act of whether the customer is a government or
significant changes to make the SAFETY Act include: private entity. These incentives are designed
process easier and more efficient. • Security guard services. to help ensure that the United States has
• Explosive-sniffing canines. as many tools in its arsenal as possible to
• Chemical and biological detection deter, defend against and defeat terrorist
W h a t i s t h e S A F ETY A c t ? equipment. activities.
Under the SAFETY Act, the seller of an

16
17
FEATURED ARTICLE :: PROTECT THE COUNTRY — WHILE PROTECTING YOURSELF

The SAFETY Act should be of interest to any entity involved in organizations and foreign governments. DHS has also gone to
anti-terror activities because it will significantly increase liability great lengths to provide a better vehicle for requesting an expedited
protections if the seller or customer of anti-terror products or services review. A specific section now addresses this issue, which should
face liability claims arising out of acts of terrorism. By simple virtue of make it easier for applicants to explain what pressing deadlines they
utilizing SAFETY Act-approved products or services, customers will face and why DHS should issue a decision in less time than typically
gain significant liability protections. At the same time, they will enjoy required. In that vein, DHS has also reduced the potential review
the level of comfort associated with knowing that that the DHS has time from 150 to 120 days.
thoroughly vetted the items. Finally, utilizing SAFETY Act-protected
technologies and services could significantly limit the amount of While there are many other changes in the final rule and application
terrorism coverage a customer has to obtain, thereby limiting its kit, it is sufficient to note that DHS has gone a long way to address
concerns about the availability of terrorism insurance. many of the concerns applicants expressed.

F i n al Rul e a n d R e v i s e d A ppl i ca t i o n K i t B r o ad e r U s e
DHS recently released both the final rule governing the SAFETY Act Security professionals everywhere have a unique opportunity to take
and a revised application kit. The documents contain several very- advantage to the benefits the SAFETY Act offers, particularly those
welcomed new developments. The following are especially noteworthy: included in the final rule and revised application kit.

• Pre-Qualification of Procurements: Since the SAFETY Act was Increase utilization of the SAFETY Act inside and outside of the
enacted, potential applicants have been searching for ways to federal government.
better ensure a guarantee that if they submit a bid on a particular Homeland security as a mission is not the sole responsibility of
procurement, they will obtain SAFETY Act coverage. Under the DHS. Numerous other members of the federal family play a vital
final rule, customers now have a way to help ensure that potential role in defending the nation from terrorist threats. As such, security
vendors will, in fact, receive SAFETY Act coverage. The new professionals across the board should work with DHS to encourage
“Pre-Qualification Designation Notice” process gives agencies a the use of SAFETY Act-approved products by private sector partners.
method to submit their potential procurement to DHS for review. This could take the form, for instance, of the USDA encouraging
If DHS finds that the potential procurement merits SAFETY Act companies to use SAFETY Act-certified companies to perform security
approval, vendors who are ultimately chosen to provide the specified services in order to help reduce the risk of agro-terrorism. Similarly, a
technology will essentially be guaranteed SAFETY Act approval. stadium manager could work with DHS to have its security operations
That process should help bring forward more potential vendors, approved under the SAFETY Act or seek to use SAFETY Act-certified
increasing choice and the potential that the proper technology will intrusion detection companies for providing access control. Every
be deployed. entity should work actively with DHS to increase the utilization of the
SAFETY Act.
• Developmental Testing & Evaluation (DT&E) Designations: In
the development phase of any technology, it is quite normal for an One vehicle in particular that should promote the use of the SAFETY
unfinished or unproven product to be field tested or deployed in Act outside of DHS is the National Infrastructure Protection Plan
limited circumstances. In the context of anti-terror technologies, (NIPP). The NIPP explicitly encourages use of SAFETY Act-approved
such deployments can be extremely problematic given that terrorist products to protect critical infrastructure and key resources. Given that
activity could realistically occur during the deployment. SAFETY the NIPP is the DHS blueprint for not only protecting the nation’s
Act protections would obviously be ideal to limit liability, but the critical infrastructure but also partnering with other federal, state and
interim final rule did not contemplate offering protections for such local agencies as well as the private sector to do so, it only makes sense
deployments. The final rule addresses those concerns by creating a to use that vehicle to help promote the SAFETY Act.
heretofore unavailable liability protection method. The SAFETY Act
protections offered under a DT&E Designation lasts for no more
Submit “creative” applications to DHS.
than 36 months and applies only to limited deployments. While a
Too often, companies mistakenly think that the SAFETY Act is
DT&E Designation is more limited than full SAFETY Act approval,
intended only for cutting-edge widgets. Potential applicants sometimes
it provides a measure of liability protection that otherwise was not
shy away from submitting applications for things like engineering
available.
services or even existing technology solutions for fear of being rejected
by DHS.
• Changes to the Application Kit: The new version of the SAFETY
Act application kit addresses criticisms that the application
Such fears are unwarranted. DHS has repeatedly made clear that
process is confusing and overly burdensome. First and foremost,
it welcomes any application so long as the technology or service in
DHS has drastically toned down the “pre-application” section
question can help combat terrorism in some fashion. Applicants
of the kit. Applicants no longer have to fill out a confusing form
should feel free to think creatively and should strongly consider filing
that previously often resulted in grand misconceptions about a
an application for any product or service they offer or utilize to fight
particular technology. DHS has also added a section directly asking
terrorism. Just reviewing the list of approved products and services
what entities have been procuring the technology in question.
reveals that DHS is willing to offer SAFETY Act protections to a wide
Importantly, that section includes categories for commercial
range of products and services.

DECEMBER/JANUARY 2007 • SECURITYEXECUTIVE.ORG


18
Importantly, companies that provide their own security services 3. Have patience in the drafting process. Because the SAFETY Act
internally should seriously consider filing a SAFETY Act application. application process can be complicated, applicants should plan
DHS is willing to consider applications for services the company itself to devote a reasonable amount of time for drafting and reviewing
utilizes. Thus, owners of critical infrastructure or even something as applications. An ill-prepared application likely will not be approved.
routine as an amusement park that offers its own security services can
obtain SAFETY Act protections, and they should seriously consider 4. Explain yourself in the application. The application must contain
doing so. persuasive support that justifies SAFETY Act protection. DHS must
understand your product or service and how it works in order to
award approval.
How to Proceed
Though at first blush daunting, the SAFETY Act process can easily be
5. Use outside help as needed. There are many potential pitfalls and
manageable, and the potential benefits of pursuing an application are
blind spots in the SAFETY Act application process. Experts can
enormous. In return for dedicating some time and resources upfront, a
assist in drafting and filing applications, and the costs associated
company can have access to an extremely powerful legal defense should
with using them will be more than justified when your product or
it ever face a potentially ruinous terror-related liability claim.
services receives SAFETY Act approval.

In order to determine whether the SAFETY Act is right for you and
While it has had some challenges, the SAFETY Act program is one
your company, here are a few simple steps to follow:
of the best offerings available from DHS. On the whole, DHS has
put a great deal of effort into the program and companies should be
1. Review what you have to offer. Check to see if your product or lining up to take advantage of the benefits it offers. The opportunity to
service is ready for approval. If you pick a product or service that receive liability immunity rarely comes along, and so companies should
is too early in its development, it likely will not be ready for the pursue it with all proper energy. SE
SAFETY Act process.

2. Carefully determine what you want to apply for. Think carefully Brian Finch (finchb@dicksteinshapiro.com) is head of the Homeland Security Practice
Group at the law firm Dickstein Shapiro, LLP, in Washington, D.C. He has helped
about what items to include in a SAFETY Act application. Putting a wide range of companies obtain SAFETY Act protections and is also an Inaugural
too many dissimilar products or services in one application may lead Senior Fellow at the George Washington University Homeland Security Policy
to a denial of your application. Institute.

Approved Product List for Homeland Security


Accenture LLP: Biometric Identification Systems and GE InVision, Inc.: CTX™, EntryScan3 and Research International, Inc.: ASAP II™, Smart
Project (IDENT) Support Services EntryScan3-e, Itemiser2 & Itemiser3 Air Sampler System (SASS) 2000 Plus™; RAPTOR™
Alluviam, LLC: HazMasterG3® Hach Ultra Analytics: BioLert™/ Bioni™ Reveal Imaging Technologies, Inc.: Reveal
CT-80 Explosive Detection System (EDS)
Applera Corp.: Infectious Disease Identification HDR Security Operations, Inc.: HDR Security
System Services–Planning; HDR Security Services–Design SafeView, Inc.: Scout™ Systems
Asset Protection & Security Services, LP: Idaho Technology Inc.: RAZOR SAIC: Vehicle and Cargo Inspection System
Guards
International Business Machines Securitas Holdings, Inc.: Security Services
BAE Systems Information & Electronic Corporation: Risk Assessment Platform, First Siemens Logistics and Assembly Systems,
Systems Integration, Inc.: Infrared Responder Interoperability Solution
Inc.: Checked Baggage Inspection System
Imaging System (IRIS) Cameras, Matador™ Infrared
IPC International Corp.: Security Services
Countermeasure (IRCM) System Siemens Maintenance Services, LLC:
ITT Industries, Inc.: Night Vision Technologies, Maintenance and Repair Services
BioPort Corporation: BioThrax®
Force Protection Team
Smiths Detection, Inc.: HI-SCAN Conventional
BlastGard® International, Inc.: BlastWrap®
Kellogg Brown & Root Services, Inc.: Cabinet X-Ray, Sentinel II™, Hi-SCAN 7555i
and BlastGard® Mitigating Trash Receptacles
Enhanced Filtration Unit System
Strategic Diagnostics Inc.: Microtox®
The Boeing Company: Technology Evaluation and
Language Analysis Systems, Inc.:
Design Services, Visual Security Operations Console Systems Corporation: Systems Engineering,
NameClassifer™
(VSOC) Sentinel, Anti-Terrorism Integrated Logistics Design and Integration Services; Biological Detection
Support Management Services (AT-ILS) Lockheed Martin: Specialized Security Training System
Services; Systems Engineering and Integration Services
Bruker Daltonics NBC Detection Corp.: Thermo Electron Corporation: EGIS, EGIS II,
(SEIS) for the Fixed and Mobile Defender™ Systems;
Rapid Alarm and Identification Device-Manual and EGIS III Systems
Systems Engineering and Integration Services for the
Cangene: Vaccinia Immune Globulin Intravenous Integrated Electronic Security Command/ Control/ Triple Canopy: Security Assessment Services
(Human) (VIG) Communications System, AN6400 Checked Baggage
Scanner, Marine Traffic Management System, Risk
Turner Construction Co: Checked Baggage
CEIA USA Ltd.: Security Metal Detection Equipment Screening System Services (CBSS Services)
Assessment Platform
Cepheid: GeneXpert® Unisys: Registered Traveler Solution
Michael Stapleton Associates: SmartTech
Composite Structural Design, L.L.C.: CSD System and Explosion Detection Services URS Corporation: Threat and Vulnerability
Tractor-Trailer Truck Crash Barrier (TTTCB), B123 Assessment Services
MitiTech, LLC: Safetydrape™
E-Z-EM, Inc.: Reactive Skin Decontamination Lotion Verified Identity Pass Inc.: Verified Identity
Northrop Grumman Space and Mission
Pass (Verified ID)
FedEx Custom Critical, Inc.: Strategic National OptiMetrics, Inc.: Automated Decision Aid System
Stockpile Transportation and Distribution for Hazardous Incident (ADASHI) First Response™ York International Corp.: Solution Air Handler
General Dynamics Armament and Prepared Response, Inc.: Rapid Responder The Wackenhut Corporation: Consulting and
Technical Products, Inc.: Joint Biological Point Risk Management Services, Security Services
Rapiscan Systems, Inc.: Metal Detection Systems;
Detection System
Conventional X-ray systems Washington Group International, Inc.:
General Electric Company, GE Container Inspection Services
Infrastructure, Inc., GE Security, Inc.,

DECEMBER/JANUARY 2007 • SECURITYEXECUTIVE.ORG


19
Legislative Update

S U M M A R Y A N D W H AT I T M E A N S TO N A S C O M E M B E R S NASCO’S VIEW B I L L STAT U S

Proposes to allow the use of rifles and shotguns by trained security/armored car guards where the risk
DE 24, 61

Hearing scheduled
of terrorist activity is high. Delaware Board of Examiners of Private Investigators and Private Security for Jan. 25, 2007 at
Agencies will hold hearing on Jan. 25, 2007 at 10 a.m. 10 a.m.
SuppoRtive
GAC 509-3-.02, -.12

Hearing held on Dec. 7, 2006 on proposed changes to board’s rules concerning company license
holder’s replacement, unarmed guards and watchmen, continuing education. Changes were approved Public hearing
as proposed. Amendments to GAC 509-3-.02, -.12 authorize 180-day grace period (on request) for on proposed rule
replacing company’s qualified license holder, increase training requirement for all security officers changes conducted by
to 24 hours of classroom instruction, require registered security officers to have eight hours of board Dec. 7, 2006;
continuing education for renewal, subject armed security officers to additional firearms training and changes approved as
increase investigative personnel training. SuppoRtive proposed.
MT 24.182.401

Proposed changes
Proposed amendments to Administrative Rules of Montana include adding a branch office licensing
July 6, 2006;
fee of $25, clarifies fingerprint check fees as pass-through of state and FBI fees, and provides changes
adopted Nov. 23,
for firearms instructors, types of firearms, annual requalification.
2006
SuppoRtive
NASCO meetings with legislative leadership continue to raise awareness of the private security sales
NJ A.B. 4901

tax’s negative impact on public safety through resulting cuts in service to accommodate unbudgeted Approved
cost increases. Additional meeting are being scheduled with other key players in the FY 2008 New P.L.2006, c.44,
Jersey budget process. Meanwhile, the Coalition Against Security Tax has attracted members from the on July 8, 2006.
ranks of NASCO members’ clients and several business-oriented associations.
NOT
SUPPORTIVE
nasco has retained counsel to help repeal the sales tax on security services. we have
formed coalition against security Tax (casT) for opponents to the new tax. To join
casT, contact gail simonton at gsimonton@nasco.org.
9 NYCRR 6027.4

Proposed amendments to 9 NYCRR 6027.4 would revise the topics and hours of instruction Comment period
per topic for the 16-hour security guard on-the-job training course. Proposal would add incident closed on Dec. 15,
command system (two hours) and terrorism-related topics (four hours). Training on the existing 2006. Status of
mandated topics would be adjusted from nine to six hours, so total hours of the course will remain changes unavailable
16 hours. at press time.
SuppoRtive
OAR 259-060-0010

Introduced in the
Proposed changes to rules relating to eight-hour basic classroom instruction, written examination, House Sept. 25,
four-hour assessment module, annual/biennial refresher courses, professional certification and in- 2006 and referred
structor certification. Establishes procedures for accreditation of private security training programs. to Judiciary
Committee.
SuppoRtive

A bill to provide for the protection of health and safety during certain disasters. Would involve coor-
Introduced
dination among Departments of Health and Human Services, Homeland Security and Environmen-
Dec. 5, 2006;
US H.R. 6347

tal Protection Agency. Bill must be reintroduced before being considered in new Congress. Because
referred to Energy
it defines “participating responder,” NASCO will contact bill sponsor to discuss impact on NASCO
and Commerce
members. Sponsor Rep. Barton (R-Texas), is current chairman of the House Energy and Commerce
Committee
Committee.

A bill to direct the secretary of Homeland Security to provide for enhanced security of chemical
facilities and for other purposes. Calls for secretary of Homeland Security to establish risk-based per-
formance standards for security of certain chemical facilities; would also require vulnerability assess-
ments and development and implementation of site security plans for chemical facilities. Homeland Introduced
Security would issue regulations within six months of passage. If inspection of a facility resulted in Dec. 5, 2006;
finding of noncompliance, owner or operator would receive written notice and opportunity to correct referred to Energy
problems. Failure to satisfy notification requirements could result in order for facility to cease opera- and Commerce
US H.R. 6348

tion until compliant. Bill must be reintroduced before being considered in new Congress. NASCO Committee
will contact bill sponsor to determine likelihood of reintroduction and note NASCO’s interest in
proposal. Sponsor Rep. Barton (R-Texas), is current chairman of the House Energy and Commerce
Committee.

All information is accurate as of press time.

DECEMBER/JANUARY 2007 • SECURITYEXECUTIVE.ORG


20
Uniform Precision
Our customized, uniform solutions
support your security objectives
Visit www.unitexdirect.com to purchase and view a complete line
of professional uniforms to convey your officer’s authority instantly.

Extensive inventory for immediate deliveries



Full line of security uniforms, police equipment
and ballistic armor

Personal and prompt attention to each order

Online ordering and private customized e-commerce
stores on request by client

Custom uniform programs

“Unitex Direct’s execution, inventory management and


high quality service are a great help to our organization.”
— President, SecurAmerica, a nationwide contract security firm

For the complete SecurAmerica Case Study and other examples of Unitex Direct’s
customer-focused uniform solutions, visit www.unitexdirect.com.

Responsive, attentive and swift


order fulfillment — Unitex Direct.

Since 1992 — The Best Value and Service in the Industr y

800.682.1606 ext. 230 • www.unitexdirect.c o m


nowhere vs. everywhere

                                         —             
           ’                                           
         —                                      „ ƒ    
’—   ’

         —                    “           —      
    ’   —   ’
              

 ’ † ˆ ˆ ’ €  ‚ ’ ˆ € ˆ … ñ   ’           ’  

               —        ®                             —
               ¦    —          ®                          

Você também pode gostar