A Secure Frontline September 25, 2003 R. E. Cunningham, SVP, National Marketing Manager HDR Security Operations, Inc.
Security: Freedom from risk or danger. Measures adopted to prevent the commission of crime.
Security Words of Wisdom To paraphrase the ancient Chinese military historian Sun Tzu (350 BC)… “He who tries to defend everything ends up defending nothing.”
Total Anti-US Attacks, 2001
Type of Anti-US Attacks, 2001
Types of Targets Attacked, 2001
Threat Is Not Only International in Nature Domestic Terrorists/Workplace Violence can also be a threat 23 Hate groups operate in Missouri and Kansas alone Oklahoma bombing was Domestic Terrorism Anthrax may have been Domestic
Concentric Circles of Security Security Concepts Concentric Circles of Security Deter Detect Delay Or You Just Document Defense in Depth Concentric Circles of Security
Deter – Detect - Delay Event Time Measured in Minutes Detection Time Lapse Assessment Response Time Detection begins Dispatchdecision Contact begins Physical / Mechanical / Electronic Delays
Deter – Detect - Delay Event Time Measured in Minutes Detection Time Lapse Assessment Response Time Detection begins Dispatch decision Contact begins Physical / Mechanical / Electronic Delays
The Challenge of “Multiple Port/Waterway Players” Port Authority Terminal Operators Stevedors Shipping/Barge Companies Logistics Companies Unions Coast Guard MARAD Customs State DOTS MPOs First Responders DNRs USACE Railroads Trucking Companies Utilities Other Port Tenants Warehousing Assessments Criticality Vulnerability Threat Risk Responsiveness Readiness
Holistic Security Planning Operational Policies and Procedures Physical Electronic Security Enforcement Security Awareness Total Team Effort Management - Authority Coaches - Executives Players – Staff/Tenants
Policies and Procedures The Game Plan Planning Operations Monitoring Reporting Policy and Procedures Standard Operating Procedures (SOP’s) Emergency Operating Procedures (EOP’s) Emergency Response Plans (ERP’s) Mutual Aid Media Management
Enforcement and Security Awareness The Team – Personnel Who Are…… Informed - Threat awareness Trained - Emergency response Empowered – Operations Equipped – The Tools Training Programs Command Operation Awareness
The Tools Physical Security Blast Protection Barriers Glazing Analysis Material Material Analysis Structural Analysis Progressive Collapse Facility Hardening Barriers Passive Active Ballistically Resistive Materials Vault/Safehaven Design Crime Prevention through Environmental Design (CPTED) Illumination Engineering Hardware Key Control/Management Locking Systems Physical Security Multiple User Access Control?
The Tools Electronic Security Intrusion Detection Access Control Situation Annunciation Closed Circuit Video Equipment (CCVE) Intrusion Detection Perimeter Security Intrusion Protection Access Control Biometric Cypher Card Personal Identification Number (PIN) Communications Data Communications Intercommunications Telecommunications Radio Frequency Access Denial Systems Screening Chemical Biological Nuclear Radiological Explosive Weapons Heartbeat Electronic Article Surveillance
The Tools Data Security Employee Data Access Controls Data Networks Telecommunications CATV/MATV Infrastructure Copper Fiber Optic Wireless Firewalls Document Storage Backups Data Power
The Tools Exercises are Key Performance Penetration (Black Hat) Real Time Response Routine System Testing
For further questions or discussion on this topic please contact Q&A For further questions or discussion on this topic please contact R. E. Cunningham rcunning@hdrinc.com