Holistic Security: Remaining Vigilant

2013_Boston_Marathon_aftermath_people

2013 Boston Marathon Aftermath (wikipedia)

“Capitol Police are responding to reports of suspicious packages in the Hart and Russell Senate office buildings and a bomb squad is on the scene. The buildings have not been evacuated, but certain areas of the buildings have been closed.” – Politico, April 17, 2013

The recent terror attack at the Boston Marathon is a stark reminder that the threat to the homeland remains ever-present. While the investigation is in its initial stages and the reason for the attack and number of perpetrators remains unclear, it is clear that businesses and security professionals need to remain vigilant.

Proper training and awareness of company emergency protocols, continuity of operations programs, and corporate security efforts are coming to the forefront of the minds of CSOs and other executives who are tasked with ensuring proper safeguards are implemented.

Part of this equation is ensuring that all employees, from the C-level Executive all the way down to maintenance staff, are reminded to stay alert and report suspicious activity and anything outside the norm to the proper channels.

Elsa Lee, a former U.S. Army Counterintelligence Agent and terrorism expert explains, “Following a security incident, especially the recent tragic terrorist attacks in Boston, it is important that all corporate security officers recognize that their people and company team members are vital assets and partners in maintaining vigilance and security awareness. People are the first line of defense and serve as a critical protective component as well as a reporting mechanism for enhanced situational awareness.”

Underscoring Lee’s observations about individuals being vitally important eyes and ears, the Federal Bureau of Investigation has asked the public for assistance in the ongoing Boston bombing investigation. In an online post the FBI stated, “If you have visual images, video, and/or details regarding the explosions along the Boston Marathon route and elsewhere, e-mail them to boston@ic.fbi.gov. No piece of information or detail is too small.”

While the FBI’s request for information is a reactive tactic, preventative reporting plays a key role in thwarting attacks and disrupting precursor planning for such attacks. Lee, who is also the CEO and founder of Advantage SCI, LLC, a prime defense contractor and a Service-Disabled Veteran-Owned and Woman-Owned Small Business, recommends that CSOs and other security personnel encourage employees to stay alert and report suspicious activity.

Specifically, Lee proposes four main points that should be emphasized during this heightened period of security.

  1. CSOs and corporate security personnel need to formulate aggressive proactive strategies and strong security programs that are well documented, well rehearsed and well coordinated across all sectors — the first responder community, businesses and the public.
  2. CSOs and corporate security personnel need to remind employees that they must be aware of their surroundings and of suspicious people. In recent years, observant citizens have reported suspicious individuals covertly photographing metro railways and trains, as well as other soft targets, in major cities across the nation — from Los Angeles to New York. The perceptive employees and average citizens who report such instances become a vital element, serving as an early warning net, particularly during periods of heightened alert.
  3. Collaboration and cooperation remains key. Everyone needs to work together. Employees need to be sharply attuned to what is happening around them. If they see, feel, or know that something is out of place, out of the norm, or simply strange in that moment of time, they need to act on it.
  4. Suspicious activity should be reported immediately. Terrorist attacks require planning and preparing before they are carried out. It will be difficult to detect and thwart terrorist activities on the day of the attack. If terrorist activities are not discovered in the prepping stages, the best you can hope for is that someone will detect a package or backpack left unattended or placed at the target location on the day of the attack, when civilians are already in danger.

About the author:

Timothy W. Coleman is a security analyst who has co-founded two technology startup firms. He has a Masters of Public and International Affairs in Security and Intelligence Studies and a Masters of Business Administration in Finance.

 

 

 

 

 

Sign up for your free CTOvision Pro trial today for unique insights, exclusive content and special reporting.

CTOvision Pro Special Technology Assessments

We produce special technology reviews continuously updated for CTOvision Pro members. Categories we cover include:

  • Analytical Tools - With a special focus on technologies that can make dramatic positive improvements for enterprise analysts.
  • Big Data - We cover the technologies that help organizations deal with massive quantities of data.
  • Cloud Computing - We curate information on the technologies enabling enterprise use of the cloud.
  • Communications - Advances in communications are revolutionizing how data gets moved.
  • GreenIT - A great and virtuous reason to modernize!
  • Infrastructure  - Modernizing Infrastructure can have dramatic benefits on functionality while reducing operating costs.
  • Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of.
  • Security  -  There are real needs for enhancements to security systems.
  • Visualization  - Connecting computers with humans.
  • Hot Technologies - Firms we believe warrant special attention.

 

Recent Research

What The Enterprise IT Professional Needs To Know About Git and GitHub

3D Printing… At Home?

Tech Firms Seeking To Serve Federal Missions: Here is how to follow the money

Creating The New Cyber Warrior: Eight South Carolina Universities Compete

Mobile Gamers: Fun-Seeking but Fickle

Update from DIA CTO, CIO and Chief Engineer on ICITE and Enterprise Apps

Pew Report: Increasing Technology Use among Seniors

Finding The Elusive Data Scientist In The Federal Space

DoD Public And Private Cloud Mandates: And insights from a deployed communications professional on why it matters

Intel CEO Brian Krzanich and Cloudera CSO Mike Olson on Intel and Cloudera’s Technology Collaboration

Watch For More Product Feature Enhancements for Actifio Following $100M Funding Round

Navy Information Dominance Corps: IT still searching for the right governance model

solid