Global Security Glossary – S –


Sabotage: the willful and malicious disruption of the normal processes and functions of an organization.

Safe haven: secure areas within the interior of the facility. A safe haven should be designed such that it requires more time to penetrate by a terrorist attack than it takes for the response force to reach the protected area to rescue the occupants.

Salami technique: a white collar fraud scheme in which small amounts of money, frequently less than a dollar in each instance, are diverted from many separate accounts and credited to an account controlled by the perpetrator, usually with the help of a computer. The salami technique is similar to the lapping technique in which small amounts are debited from many accounts and then later credited back to give the appearance of correct balances when in fact the perpetrator is continuously removing funds from the system.

Scenario analysis: is a systematic method of studying and articulating probable future events that may affect the organization or its operating environment. It may, for instance, be used to: forecast trends in an industry; identify probable Competitor strategies; evaluate the effect of emerging technologies; assess a potential merger, acquisition, or alliance. It is a useful, long-term and highly objective analytical technique whose timing may not always be accurate. Scenario analysis is also known as Alternative outcomes analysis or ‘What if?’ analysis.

Secondary deviance theory: a theory which holds that societal reactions to deviant behavior encourage the individual to develop a deviant lifestyle or career, and concomitant self-concept. In this theory, a person publicly labeled as a deviant for some initial behavior will begin to adopt other deviant behavior or a role based on it as a means of defense to the problems created by society’s reaction.

Security: the condition of being protected against hazards, threats, risks, or loss. Note 1: In the general sense, security is a concept similar to safety. The distinction between the two is an added emphasis on being protected from dangers that originate from outside. Note 2: The term “security” means that something not only is secure but that it has been secured.

Security risk: the potential that a given threat will exploit vulnerabilities to cause loss or damage to an asset.

Security survey: a thorough physical examination of a facility and its systems and procedures, conducted to assess the current level of security, locate deficiencies, and gauge the degree of protection needed. any of several methodological approaches for assessing a system’s vulnerability to loss or disruption by examining the separate criticalities of its components. A system is typically an organization, facility, or process. A survey/audit includes a thorough physical examination of a facility and its systems and procedures, conducted to assess the current level of security, locate deficiencies, and gauge the degree of protection needed. Also called security audit.

Self-defense: the protection of oneself or one’s property from unlawful injury or the immediate risk of unlawful injury; the justification for an act which would otherwise constitute an offense on the ground that the person who committed it reasonably believed that the act was necessary to protect self or property from immediate danger.

Sensitive compartmented information: information and materials that require special controls for restricted handling within compartmented intelligence systems and for which compartmentation is established.

Service Mark: a name, phrase, or other device used to identify and distinguish the services of a certain provider. Service marks identify and afford protection to intangible things such as services, as distinguished from the protection already provided for marks affixed to tangible things such as goods and products.

Shell company: a corporation without assets such as those established by white-collar criminals in bond swindles, money-laundering operations, mutual-fund schemes, and internal business fraud. A common practice is for a company employee, such as a purchasing agent, to use letterhead stationery, printed invoices, and similar documentation to create a fictitious vendor. The employee will authorize payments to be remitted to a postal box address under his control.

Shelter-in-Place: The process of securing and protecting people and assets in the general area in which a crisis occurs.

Shorthand Texting: the abbreviation of popular words and strings of words used in emails, text messages and in social media networks.  There are more than 2000 such abbreviations so far.  A working knowledge of shorthand text-speak is necessary to decode messages during relevant inquiries or investigations. 

Short weighing: a form of theft that occurs in the packaging stages of production. A producer, for example, might fill containers 90 percent of their capacity and charge retailers for the entire amount.

Smart Container: Container equipped with built-in internal sensors for security. A Smart Container may include a navigation and routing guidance system, satellite location, secure the box origin to destination and radio frequency identification

Smart Power: It means using all the levers of influence-diplomatic, economic, military, legal, political and cultural- to get what you want .

Shrinkage: a decrease in inventory; loss of volume or bulk. Shrinkage is an accounting term usually applied to a decrease in inventory value by reason of employee pilferage, shoplifting, bookkeeping or production errors, waste, and other common occurrences in business which reduce inventories before sale.

Signature security service: a service designed to provide continuous responsibility for the custody of shipments in transit, so named because a signature and tally are required from each person handling the shipment at each stage of its transit from point of origin to destination.

Span of Control:a management principle which holds that a supervisor can be effective in handling from 3 to 6 subordinates. Studies support an assertion that as the number of subordinates increases arithmetically, the number of possible interpersonal interactions increases geometrically.

Stockholm syndrome: sympathy or compassion expressed by a hostage victim on behalf of the abductor, so called because of its appearance in hostages who were held inside a bank vault in Stockholm.

Strategic Intelligence (SI): pertains to the collection, processing, analysis, and dissemination of intelligence that is required for forming policy and military plans at the national and international level.

Strategic Business Intelligence Process:

– Validate the investment in the implementation of a Strategic Business Intelligence Process via a business case.

– Implement a Strategic Business Intelligence Process including:

·     Establish meaningful key performance indicators and understand cause and effect linkages between key performance indicators (e.g. leading indicators affecting lagging indicators, balancing or reinforcing loops).

·     Establish strategic objectives and activities (e.g. establish a plan, interventions).

·     Measure and collect performance relevant information (e.g. data warehouse).

·     Communicate the facts (e.g. alerts, dashboards, broadcasting agents).

·     Perform analyses (e.g. OLAP, data mining).

·     Communicate the results of the analyses (e.g. E-Mail, meetings, dashboards), and reduce the time to strategy execution (minimizing the total time span from strategy definition to strategy execution).

·     Align decision making with the strategic objectives (optimizing transparency of objectives, degree of fulfillment, effect of past business interventions on goal achievement, predictions about future trends and their effect on goal achievement).

Subculture of violence: a way of life attributed to large sectors of the lower social classes. In it there is much dependence on force or the threat of force to establish identity and gain status. The subculture of violence may lead to criminality as a method of problem-solving.

Subject matter expertise: competencies, experiences, and advanced working knowledge of contemporary tradecraft, practices, and applications related to the topic of interest.

Supply Chain: a linked set of resources and processes that begins with the acquisition of raw material and extends through the delivery of products or services to the end user across the modes of transport. The supply chain may include suppliers, vendors, manufacturing facilities, logistics providers, internal distribution centers, distributors, wholesalers, and other entities that lead to the end user.

SWOT analysis: is the evaluation of available Information concerning the Business environment in order to identify internal strengths and weaknesses, and external Threats and Opportunities. SWOT analysis is also known as Situational analysis and, when applied to competitors, as Competitor profiling.

Syndicate: in criminal investigation, an ongoing, coordinated conspiracy, characterized by hierarchy and division of labor, and involving a relatively large number of criminals. The syndicate or organized crime is in partial or total control of numerous illegal activities, such as usury, gambling, prostitution, pornography, drug traffic, extortion, and hijacking. It also controls many legal enterprises, such as restaurants and trucking firms, which are frequently used to conceal the sources of illegally obtained money and to accomplish other criminal purposes.

2 Responses to “Global Security Glossary – S –”

  1. Five-fingered discounts? Not in the US « Security Beyond Borders™ Says:

    […] to 2009. The downward trend is credited to an increased spending to reduce the amount and scope of shrinkage.  This is of extreme importance to all shoppers since retails pass losses sustained do to retail […]

  2. Observations on Competitive Intelligence in Latin America « Security Beyond Borders™ Says:

    […] (KM) along with CI have converged into an overarching tool called Strategic Intelligence (SI), which leverages the synergies among these component pieces of the internal and external […]

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: