Country Risks Influence Security Levels

Aon Interactive Country Risk Map_2014

Source: http://www.riskmap.aon.co.uk/

Being exposed to different countries with varying risk levels, I’ developed a keen sense of the proper security layers that should be implemented. The most often asked question by company executives is as follows: Why are more resources invested in essentially identical business operations in different geographical locations?

The short answer is this, a country’s risk level is a fundamental external catalyst which added to the risk analysis enables decision making on the proper security layers to implement in the protection of people, assets and the well-being of all stakeholders. A number of different strategies are intertwined forming an effective protective fabric.  For instance, depending on your business activities (considering the difference between transporting valuables and commodities which require different mitigation strategies) in terms of duty of care for a broader geographical spectrum, few resources are allocated to staff protection in Alberta, Canada where the country risk level for violent criminal activities is relatively low, as opposed to Cairo, Egypt where political instability may trigger violent criminal acts (also considering the absence of or overreaction by state authorities), thus requiring more resources to assure the integrity of staff for on-going business operations. Even more resources would need to be invested if the risk levels reach a climax forcing business operations to be either temporarily or permanently interrupted.

Think of it as the layers and various fabrics that should be worn to protect yourself against the climatic elements. For instance, you’d be ill advised to don a heavy wool sweater or goose down jacket to the hot desert climate of Cairo for a business trip; just the same as you would not be fitted in a fashionable light linen shirt for a similar trip to Alberta at the height of the winter season. If traveling back and forth between these regions, care would be taken to wear the right clothing based on the prevailing climate. Equal permutations should be considered when tailoring the proper security strategies for these regions respectably and as mentioned before, based on your particular business operation.

 

Natural Disasters: Stay Ready!

I’m not a climate researcher, I only know enough to make informed decisions. But, even I would be derelict to brush aside clear evidence that our climate has shown consistent signs of dramatic change. I think back to my early years in the Caribbean, back in the 80’s when major hurricanes, flooding and other natural disasters occurred on rare occasions. I recently spent a few years there and in that time span I witnessed more natural disasters than all others my parents, grandparents, uncles and similar wise elders have seen over their long lives in the region.

In fact, I’ve observed the same trends around the globe. Since last year massive snowstorms in the United States, floods in Australia, record drought in China and Russia (leading to massive wildfires) have put people’s lives at peril, as well as threaten our global food supply.

Since climate conditions don’t show any signs of improving over the coming decade and the global community don’t seem to agree on clear goals for tackling its effect, we as individuals should take the logical best option; which is learning as much as we can about the risks we face and preparing for unpredictable situations. With that in mind I would preface a number of preparedness tips by sharing information from cutting edge studies on root causes for the wild weather gyrations we’ve been experiencing.

Climate Tipping Points: (Source: guardian.co.uk)

Scientists know from the geological record that the Earth’s climate can change rapidly. They have identified a number of potential tipping points where relatively small amounts of global warming caused by human activities could cause large changes in climate. Some tipping points, like the losses to the Amazon forests, involve positive feedback loops and could lead to runaway climate change.

Arctic ice cap: The white ice cap is good at reflecting the Sun’s warming light back into space. But when it melts, the dark ocean uncovered absorbs this heat. This leads to more melting, and so on.

Tundra: The high north is warming particularly fast, melting the permafrost that has locked up vast amounts of carbon in soils for thousands of years. Bacteria digesting the unfrozen soils generate methane, a potent greenhouse gas, leading to more warming.

Gas hydrates: Also involving methane, this tipping point involves huge reservoirs of methane frozen on or just below the ocean floor. The methane-water crystals are close to their melting point and highly unstable. A huge release could be triggered by a little warming.

West Antarctic ice sheet: Some scientists think this enormous ice sheet, much of which is below sea level, is vulnerable to small amounts of warming. If it all eventually melted, sea level would rise by six metres.

I’ll introduce a new slogan for this blog, which is “Protect People First”. That said, below are a few tips on protecting yourself when natural disasters strike.

If there are only moments to spare, you need to know how to react to everything from an earthquake to a tornado and a flood to hurricane. Study up on the basics so you can be decisive during the destruction:

Hurricane

Heed evacuation orders, first shutting off utilities. If you stay home, turn off gas lines and fill your tub with water. Secure shutters. During the storm, move to an interior room and close all doors.

Flood

If a flash-flood warning is issued, move to higher ground immediately–don’t wait to gather belongings. In any flood, avoid downed power lines and moving water. Six inches of moving water can make a pedestrian fall, while a foot will float most vehicles.

Tornado

Once you hear a storm warning, tune to a weather radio (or similar emergency information source) for tornado alerts. If an alert comes, seek refuge in a basement–either your own or a neighbor’s–or go to an emergency shelter. As a last resort, stay on the lowest floor of your home. If you’re in a car as a tornado approaches, get out and seek shelter indoors. If you’re caught in the open, lie flat in a ditch or depression and cover your head with your hands.

Earthquake

Crawl under a sturdy table and cover your face and head with your arms. Stay away from windows and large bureaus or bookcases that could fall. If you become trapped under debris, cover your mouth with a cloth or shirt, and tap against a pipe or other object to make noise. (Don’t yell for help unless you have to; you risk inhaling dangerous quantities of dust.) If you are able, leave the building once the shaking stops–aftershocks can bring down a structure compromised by the initial quake. Finally, if you’re outside during the quake, steer clear of buildings and utility wires.

Wildfires

Contact your local fire department, health department or forestry office for information on fire laws. Make sure that fire vehicles can get to your home. Plan several escape routes away from your home – by car and by foot. Teach each family member how to use the fire extinguisher (ABC type) and show them where it’s kept.  Keep handy household items that can be-used as fire tools: a rake, axe, handsaw or chainsaw, bucket and shovel

Pandemic

Respiratory illnesses, such as the flu, are spread by coughing, sneezing and unclean hands. Because of this, one of the most important things you can do to stop flu transmission is to wash your hands frequently with soap and warm, clean water for 10-20 seconds. If running water is not available, an alcohol-based hand sanitizer can be used if your hands are not visibly soiled.  Since employees often spend up to eight hours a day in an office, breathing the same air and coming into contact with the same surfaces, the office can be a breeding ground for viruses and bacterial infections to spread. Pay close attention to personal and workplace hygiene.  During a flu outbreak, disinfecting is critical! Give special attention to highly touched environmental surfaces in your work area and office such as desks, keyboard/mouse, phones, printers, doorknobs, light switches, etc.

Last word on natural disaster preparedness: Do not undermine the power of social media as an early warning source of information. I personally use twitter to gather and forward information on risk conditions around the world. My experience has been that I ramp up intake of local and global developing situation faster and more accurately than any other media source. So, whatever your preference for staying connected, learn to harness the power of crowd-sourced information as your own miner’s canary.


Source: http://on.mash.to/ea6F20

 

Bulletproof Apparel

In previous posts I’ve layout my travel security recommendations. They have basically been focused on influencing behavior and modifying habits to gain a more secure posture.  I try not to recommend other self defense tactics because other sources offer plenty of marketing for a variety of gear. Quite frankly 90% of them are not worth your money. Looking at the bazaar of violence going on in some areas of Mexico, Afghanistan, Iraq and elsewhere around the globe got me thinking about one set of gear that at face value may offer real benefits to keep you secure while you visit certain hotspots.

I’m talking about bulletproof apparel. These are innovative products first developed in Colombia, which have gained popularity in Latin America as the level of violence has been reaching unprecedented levels.  When violent shootouts can break out anywhere and anytime, defense against collateral damage may be a worthy investment.

The Truth About Hotel Safes

This information is top security. When you have read it, destroy yourself. – Herbert Marshall McLuhan

Hotel safes entail keeping your valuables protected through your stay at facilities where this convenience is offered.  But the security of the boxes themselves is not completely fool proof, as there are a number of known vulnerabilities. The vulnerabilities range from physical to logical attacks.  Yet many travelers and even hotel staff are awfully unaware about their susceptibility to the schemes.

One of these schemes is surprisingly simple to pull off. It’s favored by international thieves because they can easily obtain a hotel guess’ name and room number (possibly fake ID); while using elements of social engineering, they simply act as a distressed hotel guess locked out of his/her room and save. Hotel security services always ready to assist a customer and unaware of these sophisticated plots, would comply and open room and safe both.

Other attacks go after the digital safes’ electronic panel, cracking the code if given sufficient time.  It is important to look into the safes UL ratings to weight the risk of storing irreplaceable valuable objects.  These attacks are less commons as the skills required to successfully attack new models becomes less common.

The Historical View

Both hotels and safes have a long history, dating back thousands of years. There are some precursors to the modern safes for instance the Egyptians sought to protect their possessions by burying their scrolls deep in the pyramids; the Assyrians buried duplicates of important documents at separate locations and at the height of the Roman Empire Julius Caesar filed his records in strong, iron boxes. Hotel safes came into existence out of similar concerns when innkeepers sought to protect their patron’s belongings from theft. As far back as the eighteen hundreds lodges and inns where known to advertise safes as part of the security amenities offered to potential clients.  One could say that security is one of the intrinsic benefits included in the lodging industries’ offering since their inception. Since the modern concept of hotels has been modeled after the English and Dutch Inn models many the concepts are imbedded in Common Law. Such is the case of the “duty of a hotel to provide safe premises” from which offering hotel safes branches out from.

Today as in the old days hotels offer safes both to minimize liability and for the peace-of-mind and convenience of guest who often bring valuables into their facilities. The truth of the matter is that these safes are only as secure as the procedure used at any given hotel.  That is because many hotels have a backdoor access into the safe in case the guest forgets the code or loses the key. This fact can create a number of vulnerabilities starting with the fact that hotel staff can be easily deceived as stated above, as well as the fact that they can also be tempted into surreptitiously entering a guest room to steal values in the safe they have indirectly been entrusted with.

As a hotel guest you’re left with limited options as to how to protect your valuables.  Some of the best options are ingenious, but required some knowledge of how the thieves would go about trying to rip you off.   What ever your strategy is remember that your best option is prevention.  It means that you should probably limit the irreplaceable, valuable items you bring with you to a hotel. Also check your travel insurance coverage for some valuable items in case they’re stolen. Lastly heed the security advice offered throughout this site.  A hotel safe is a convenient way to store valuables, but remember the adage about placing all your eggs in one basket.

How To Be The Ultimate Security-Aware Road Warrior

By Francisco Mateo

So you’re a venerable road warrior, but have you mastered the art of staying safe and secure during your international travel? If you want to practice security awareness like the pro’s do, always keep in mind that “the best security protocols are based on common sense and real world experience.” Below are few additional tips to get you ready to protect yourself like the pro’s do:

  • Consult the travel security guidance for your destination from your country’s Foreign Service. Generally it is also a good idea to seek advice regarding extreme climate conditions from reputable weather services.
  • Be aware of the financial and labor issues of your chosen airline as this would impact aircraft maintenance.
  • Scan and make two sets of photocopies of all your identity documents and be mindful of their expiration dates: passport, ID card, driver’s license, vaccination certificates, credit cards, Customs papers for imported material (portable PC, camera, satellite phone, etc.) leave one copy at home and take the other with you.
  • Use luggage that is solid and has a reliable combination lock; airport security approved locks are a good investment.
  • You’re destination country has a reputation for luggage theft shrink wrapping it is a good deterrence.
  • If the risk of loosing your bag is high consider buying Travel Insurance; using a secure identity tag on your bags and don’t pack your bag too tightly.
  • Record the content of your luggage with picture or video to serve as documentation in case it’s lost or stolen.
  • If you need to take confidential/valuable documents or objects (diskettes, money, etc.) on your trip, store them in your carry-on luggage.
  • Some countries reserve the right to scan the contents of your laptop and other portable devices; so if you want your information to remain confidential either encrypt it or take a Clean Laptop with you.
  • Keep your id papers, credit cards, money and tickets on you at all times.
  • It’s good practice to keep a set of extra clothing and footwear in your carry-on luggage.
  • Do not leave your luggage unattended at the airport
  • Never trust an unknown person with your luggage.  A stranger can either steal or manipulate your bag.
  • At the hotel, ask for a room between the second and fifth floor, not overlooking the street (for ease of emergency exit and for protection against bombs)
  • Lock the door fully; use the door-chain or other door safety device.
  • Establish the identity of visitors before opening the door
  • Deposit valuables and documents in the room safe
  • Read the safety instructions and check out the evacuation routes
  • Be CAUTIOUS and observant as to who handles and serves you beverages. Be aware that drinks can be laced with substances such as GHB, a drug that is odorless, colorless and tasteless.   It renders the victim euphoric and susceptible to suggestion.
  • Overall, maintain a low profile. Try to avoid looking like a tourist (e.g. consulting a map in public);
  • Always keep your relatives or emergency contacts aware of your travel itinerary and any changes;
  • Keep your contact list up-to-date;
  • Always keep your mobile phone charged and switched on (make sure you bring a charger and possibly an extra battery)

Remember that these tips amount to a simple philosophy called: maintaining “Situational Awareness”. Practiced often enough and they become habit, which is the state of mind all road warriors should seek to sustain.

Travel Security & Weather Statistics, Modeling and Predictions

In light of the Hurricane Season which affects both the Atlantic and Pacific Ocean from June to November, I wanted to share more information I’ve researched on the subject of weather modeling as a tool to augment travel security.  I recently wrote an article, which in part, describes the importance of being aware of trends in weather events that might give rise to disasters.  In recent years these unpredictable, deadly events have been occurring with greater frequency. Our means of prevention are there, but must be harnessed through technology.  Learn how:

Plan Your Summer Travel Using Climate Statistics http://bit.ly/bdA6Q1

Smart Phone Hotel Room Key – A Hack Waiting to Happen?

You know the old bit about how security is about trade-offs (convenience for a bit of your privacy) as soon as I saw this headline alarm bells started to flash about possible exploit of the smart-phone hotel room key option. That’s because data stored in smart-phones has become notoriously unsecured, therefore, in the name of convenience you could potentially be rendering access to hotel room burglars. Any time you hear that new high tech solution has been implemented for your convenience take it with a grain of salt. Time and time again we’ve seen how new software is written and implemented circumventing traditional low-tech solutions that took years (even decades) of security innovations to get to where it is at. I’m not saying that this is not a promising innovation, old hotel room keys have had their issues (personal data stored on magnetic stripe, including credit card info used to create clones), but users must ensure that proper safeguards would be put in place to prevent unauthorized entry  to your hotel room using your stolen data.

Smartphones to be used as hotel room keys:  http://bit.ly/d05r7M

Corporate Security Is a Force for Good

By Francisco Mateo

As a security manager at a major multinational organization, I’ve learned to embrace my profound responsibility to provide assistance in an extremely important mission; that of protecting staff and clients from a growing list of perils. However, convincing people you barely know to accept protection measures, that at face value may appear to run counter to their well-being, is no walk in the park. I can assure you of that, and that is what we must do every day. Yes, it’s a thank-less job, as many of my colleague would affirm; which is why we command pay equal to executives of the same level. At a profound level some of us also aspire to more lofty rewards, mainly knowing that we have direct input into keeping people safe while they travel; work in hostile environments and leverage the supply chain to bring safe products to consumers.  As I stated initially this is a task that gets evermore complex. It is one area of our daily duties that requires our focus and recognition of seemingly unknown threats as well as the know how to device swift countermeasures.

The evidence is plain to see.  Just think back to the tainted milk crisis in China which began in 2008.  After thousands of babies were hospitalized with kidney failure, the Chinese government declared a public health crisis that sparked a global recall of all powder milk products produced in China. The initial response understated the far reaching impact that the use of melamine, a carcinogenic substance, would have on food products.  China is to remain the world’s manufacturing hub, but their lack of controls over the use of dangerous raw materials is bound to continue as long as demand outstrips production output. For that reason consumer product companies have a duty of care to remain vigilant when sourcing raw materials or outsourcing manufacturing of consumer products.  We in the corporate security function can contribute our investigation skills by applying this know how to the due diligence process. We should not accept a third-party manufacturer’s claims of having the capacity to deliver products in time and to our quality specifications at face value. We must dig deeper into their safety records, production methods, compliance with international regulatory standards and even the moral compass that drives the operation to determine the likelihood that sham methods and corner-cutting could lead to tainted products that would put consumer’s health at risk.

Another area of concern to which corporate security has been active participant is combating counterfeit products. An off-shoot of the global economic growth, these seedy illicit business practices are the underbelly of globalization.  Aided by improved communications link, cheap transport and flexible (or simply corrupt) customs organizations, counterfeiters have blanketed many major markets with their cheap products. In some areas counterfeit products compete head to head with legitimate brands, eroding market share at fast clips. Beyond the downright theft of intellectual property, we know that counterfeiter’s illicit practices put the public safety and security at risk. Simply put they’re not in the business of delivering safe products to market, neither do they respond to the sovereign need of controlling which products cross national borders as well as paying the tariffs that should go to ensuring consumer safety. Furthermore, profits from counterfeit product sales have been known to go to terrorist organizations in furtherance of their deadly operations all over the world. Here too corporate security has a prime role to play liaising with law enforcement and customs official to disrupt the flow of counterfeit products in the supply chain. We are also educating our internal constituents to adopt unique marking and packaging technology to facilitate awareness among consumers to easily identify knockoff products. In a nutshell we can be the catalyst that makes this entire process come full circle.

Sometimes our advance risk scenario planning would project us into obscure areas, often only discussed in academic circles. Such is the case of bio-hacking, or the tinkering with the basic building blocks of life by many biology students and enthusiast worldwide—using cheap synthetic DNA and lab equipment bought inexpensively on the internet. Five years ago this wasn’t even on our radars, but the advent of cheap technology, the decoding of the genome, disposable lab equipment being bought and sold freely and bit of crowd-sourcing could lead to accidental or intentional development and release of deadly toxins.  In the past biological testing and engineering was conducted in heavily regulated and controlled government and university labs, thus bio-security (Biosecurity denotes policies and procedures designed to prevent the deliberate theft, diversion, or malicious use of high-consequence pathogens and toxins) remained the sole purview of government agencies.  Today with the growing DIY crowd experimenting with DNA from labs at home and other non-regulated facilities, there has been an increase emphasis on tracking this activity in order to keep people with nefarious intent away from these technologies. But there is also a high risk that gone-hoe hobbyists (even with benign purpose in mind) in the process of mixing or swapping genes would create deadly toxins without regards to obvious hazards to themselves and others.  Many of us are responsible for the protection of lab facilities, which is why we should be concerned about both the potential unauthorized removal of equipment and substances to further these independent (clandestine) research activities. Likewise, we should be concerned about the unauthorized used of these lab facilities in the same way. Corporate security should assist setting strict access control systems and procedures to ensure only authorized use of labs and equipment. Beyond this we should be considering sensors that would detect and alert us to the introduction or use of dangerous substances. All in all this is an emerging area of research we should remain aware of.

Some areas of business life have become difficult to manage especially when changes could come as fast as lighting, of course, I’m talking about business travel. To be specific I’m talking about disruption to travel due to natural or man-made disasters. It is often unpredictable and its impact could be widespread. Recently we’ve seen an increase in these Black Swan events, the winter storm and ash clouds in Europe as well as a number of high profile airline employee union strikes come to mind. All these events have in common the fact that hundreds of thousands of travelers were left stranded far from their final destinations. This in effect has also thrown a monkey wrench on company’s ability to make business travel plan on the fly.  Many in the corporate security function already track business traveler destinations as part of our value added service. Besides the jurisprudence that has been chiseled out around the issue of a company’s duty of care to guarantee employee safety while on business travel, there are no set standards of what companies should do. In the absence of such guidelines many practices have been developed. Employee tracking has become invaluable in light of the growing perils. Traveler destination data is often overlaid with open source intelligence to get early warning, which allows the security officer to alert travelers in a potential hot-zone. Furthermore, if the employee travel plans are disrupted due to any of the aforementioned hazards, alternative plans are arranged. If travel crisis strikes, emergency evacuations could be also be arranged. Advances in computing technology have also allowed us to tap quantitative models of both natural and man-made incident data to provide more predictive incident monitoring, which we can use to leverage prevention. In essence, the more we know about a particular destination the best prepared we are to guide travelers whether to go or not.  It is a task we take extremely serious, since a wrong call means that lives could be at stake.

From Antiquity to the Contemporary periods, works of art make up an important part of our shared human experience. The sum trust of our humanities, elegantly displayed in museums, galleries and private collections the world over. But in our modern times it is not this human genius that is in vogue. No, what we’ve experienced is the opposite, the dark side of our humanity that only sees value, summed up in monetary profits, when they lay eyes on the greatest work of arts known to human kind.  The trend in art theft is truly appalling. Art thieves have become more brazen in their hits, striking in broad daylight. In the past we’ve witnessed certain sophistication in the schemes employed by art thieves. Today, they’ve mostly exploited holes in museums and art gallery’s physical security array. A quick cost/benefit analysis comparing the value of paintings and other work of arts versus the security measures available at the time of the thefts would reveal the pyrrhic victory of the latter. Yes, it is true that many of the endowments that financially anchor these institutions have been reeling, with lower contributions due to the global financial crisis.  It’s likely that many essential services have been scaled back in cost cutting measures. Security practitioners can play a decisive role here, volunteering time and contributing our know how by conducting risk assessment (Analyzing foot-traffic flow data, behavioral analysis, contractor and employee screening, etc.) to determine vulnerabilities and recommending security countermeasures that can be delivered at lower cost. The same “lean security” principles applied to corporate security operations can add tremendous value to keeping art works safe and sound for all to enjoy.

As we look over the horizon, the perils would continue to get more complex. A recent commentator put it this way “”we are living in a world of cascading and intertwined threats…” in reference to the way risk is compounded and overlaps, paving the way to catastrophic failures. Whether man-made or natural, our risk scenarios are evolving, thus it is time for trained professionals to step up to plate and help organized solutions for the good of our society. In the age of corporate social responsibility, we security practitioners within major industries should be doing more to contribute our knowledge and leveraging resources to make our societies more resilient to shocks.

Book Review: Executive’s Guide to Personal Security

This book is a bit dated, but overall a good read for the lay person. It serves as a primer for important incidents that have impacted personal security for executives and tourist engaged in international travel earlier this decade. I found the awareness section to be a bit technical making reference to the technique as a skill cultivated mostly by cops and security guards. A bit disappointing since having the ability to be situation aware is the single most important thing a traveler should focus on to make sensible security decisions. That should be clear to the lay person reading any Personal/Travel Security advice book.

Read Page Samples Here: Executive’s Guide to Personal Security

The Name Of the Game is “Situation Awareness”

By Francisco Mateo

 I recently engaged on an interesting discussion on a social network group. The topic happens to be the security precautions, or the lack there of, some very rich VIP’s should take when staying at luxury hotels.  I thought I share this comment with you as we’re all guilty of “false sense of security creep” at one time or another:   

“My assessment of the situation based on reports would basically focus on the fact that the perp created an affinity with the victim along ethnic lines by speaking to them in Spanish; this made the victims lower their guards in a false sense of trust. When the perp later returns to allegedly fix the AC, their guards were all the way down. Against all judgment and when all kinds of bells should’ve went off they opened the door allowing the perp to consummate the well planned robbery.”

 I do not want to focus on the fact that a luxury hotel facilities as this one have a duty to provide proper levels of security to their customers as that would open up another can of worms, but the fact remains that a VIP is viable to lower his/her guards on account that such luxuries surroundings ought to have their security squared away.  For the most part that is true, but their defenses are no match for clever swindlers who planned with ample anticipation.  

Being rich, or perceived as rich, adds a level of risk to your profile during travel http://bit.ly/abvs0q