By Miguel Torres, Security Programs Manager

Slides:



Advertisements
Similar presentations
McMaster Universitys Moveable Assets Policy Property Protection.
Advertisements

C-TPAT SECURITY AWARENESS TRAINING
Secure Your Store Understand the measures used in securing a retail store.
Welcome to Telect’s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation.
Protecting the Public, Astronauts and Pilots, the NASA Workforce, and High-Value Equipment and Property Mission Success Starts With Safety “September 11th.
OVERCOMING CHALLENGES IN EMERGENCY MANAGEMENT NAWIC May 2013.
UNIT PHYSICAL SECURITY PLAN
F ACILITY S ECURITY Presented by: Dela Williams. 2.
FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates.
1 Introduction to Security Chapter 15 Institutional Security.
Family Dollar Stores Distribution Center Front Royal Virginia New Hire Security Orientation.
Business Risks How much of a risk are you willing to take? Going out on a limb.
Section 34.2 Handling Business Risks
In-depth look at ISACS Stockpile Management: Weapons Photo: MAG.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Physical Security John Schwertfeger Security Manager Duane Arnold Energy Center.
10/27/20111 Initial Security Indoctrination DoD. 10/27/20112 The protection of Government assets, people and property, both classified and controlled.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Security & Loss Prevention: An Introduction
Session 3 – Information Security Policies
Chapter 17 Commercial Security. Commercial Enterprises  The following rely on private security:  Financial institutions.  Office buildings.  Public.
1 Perimeter Security System. 2 Performance Objectives 1. List the four key duty posts of the Perimeter Security System. 2. Explain the purpose of perimeter.
Agenda  Introduce key concepts in information security from the practitioner’s viewpoint.  Discuss identifying and prioritizing information assets through.
General Awareness Training
FSMA and Supply Chain Security Andrew Wynter MSc, CPP, PSP, PFSO. Compliance and Investigations Manager GIA Grace Kennedy.
A Secure Frontline September 25, 2003
Perimeter Security Conner Finlay & Alex Getty. Overview Definitions Household o Concerns o Countermeasures Office Buildings o Concerns o Countermeasures.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
Chapter 15 Industrial Security. Loss Specific to Industry  Industrial losses frequently include:  Tools.  Materials.  Supplies.  Products.  Pallets.
INITIAL OSHA & DOT TRAINING MODULE 10 Security. INITIAL OSHA & DOT TRAINING Module 10 – Security Introduction The Transportation Security Administration.
RISK MANAGEMENT. RISK IS INEVITABLE  From your research of local businesses, what Risk was unavoidable and why?  Speculative Vs. Pure Risk  Speculative=
PANTHER SECURITY AND PRIVATE INVESTIGATION Security is degree of protection against danger, damage, loss and crime.
Port Security Safeguarding ISPS Drills & Exercises Workshop
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
1 Introduction to Security Chapter 14 Securing the Infrastructure.
Chapter 18 Institutional Security. Special Security Institutions  Hospitals and other health care facilities.  Educational institutions.  Libraries.
Security Challenges Facing Seaport Operations Day 1 - Module 3.
Hazardous Materials Company Anti-Terrorism Tips. Overview This presentation is designed to inform companies of the appropriate steps that should be taken.
Chapter 8 Preventing Losses from Criminal Actions.
Chapter 6 Enhancing Security Through Procedural Controls.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Physical (Environmental) Security
1 Washington State Critical Infrastructure Program “No security, No infrastructure” Infrastructure Protection Office Emergency Management Division Washington.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY
Hayes/Ninemeier: Foundations of Lodging Management. (C) 2006 Pearson Education, Upper Saddle River, NJ All Rights Reserved. Safety and Security.
Security Awareness Training. What is security awareness training? Security awareness training is an overview of how to be more diligent in the use, management,
Appropriate record of compliance with customs requirements Satisfactory system of managing commercial and, where appropriate, transport.
10. Security and Physical Protection Basic Concepts
LMZ Retail: Asset Protection through Robbery Prevention Nate Toon Unit 7 Project CJ 180 Prof. Bashore.
Warehousing and Storage Principles Session 12 – Security Day 6 / PM.
Protecting Houses of Worship Security Plan Development Considerations Glenn Moore Protective Security Advisor – Oklahoma District National Protection and.
WELCOME TO NASA AMES RESEARCH CENTER. Protective Services Office Presented by: Kenneth M. Silverman Chief of Security Building 15, Room hour dispatch:
With the ARNG’s vital role in providing support for homeland defense and the war on terrorism, the nature and types of threats against us have become.
Physical and Technological Security
Disaster and Emergency Management
NETW4005 COMPUTER SECURITY A
Joint Force Headquarters-Michigan CCIRs and PIRs
Joint Force Headquarters-Michigan CCIRs and PIRs
Initial Security Indoctrination
A Holistic Approach to School Security
Federal Protective Service
Physical Security.
Part 1 Security Action Plan Template.
FACILITY TARGET HARDENING
Presentation transcript:

By Miguel Torres, Security Programs Manager DeCA Security 101 By Miguel Torres, Security Programs Manager

What we will cover Authority for DeCA’s Security Program Source of Authority Crime Threats Terrorism Threats Security Basics Issue Hunt

SOURCES OF SECURITY REQUIREMENTS

Authority to Create a Security Program DoD 5105.55, Defense Commissary Agency Established the DeCA as a DoD Agency Delegated authority to the DeCA Director to: Designate Position Sensitivity for each position within the Agency; and Promulgate the necessary security regulations for the protection of property and places under the jurisdiction of the Director, DeCA

DeCA SECURITY PROGRAMS MANAGED BY HS ADMINISTRATIVE SECURITY FORCE PROTECTION LOSS PREVENTION ADMINISTRATIVE SECURITY Antiterrorism (AT) AT Construction Criteria AT Planning AT Training and Exercises AT Resource Application AT Program Reviews Force Protection Condition Measures Risk Management Traveler Security Counter Intelligence (CI) Collect & Analyze Threat Information Disseminate Threat Information Critical Infrastructure Protection (CIP) Infrastructure & Asset Identification Infrastructure & Asset Prioritization CIP Threat Dissemination Chemical, Biological, Radiological, Nuclear, and high yield Explosives (CBRNE) CBRNE Awareness Training Sheltering Plan Food Security/Food Defense Crime Prevention Crime Prevention Through Environmental Design (CPTED) Fraud Prevention Identity Theft Prevention Personal Crime Prevention Physical Security Access Control Bomb Threat Management Closed Circuit Television (CCTV) Intrusion Detection Systems (IDS) Key, Lock & Seal Control Security Lighting Retail Security Antirobbery Procedures Counterfeit Currency Employee Theft Funds Protection Internal Controls Shoplifting Procedures Information Security Access & Dissemination Accountability Classification Management Disposal & Destruction of Classified Emergency Planning Information Security Training Safekeeping & Storage Security Deviations & Compromise Transmission of Classified Material Operations Security (OPSEC) Essential Elements of Critical Information Personnel Security Background Investigations Continual Monitorship Program Contractor Adjudications Foreign Travel Briefings Security Clearances Security Education & Motivation Training   MISCELLANIOUS DeCA Interest Reports (DIReps) Contractor Verification System (CVS)

Why do you kneed to know security? As a Store Director, you are responsible for your store! It protects your people (patrons, employees, etc.)! It protects your inventory! It protects your store’s reputation! It instills confidence in your customers (improves sales)! It protects you from personal liability!

Crime Threats WORKPLACE VIOLENCE Vandalism Murder Arson Kidnapping Rape Assault Product Tampering Vandalism Arson Harassment (Verbal, Stalking, etc.)

Crime Threats Theft (Includes Burglary and Robbery) Merchandise Funds Equipment Supplies Information Identity Time

COMMISSARY TERRORISM THREATS ASSASSINATIONS KIDNAPPING HIJACKING THEFT ROBBERIES CHEMICAL/ BIOLOGICAL BOMBINGS

“There is no better terrorist target than a DoD Dependent School, Exchange or Commissary . . .” BGen. James Dozier November 3, 1983

Commissary Vulnerabilities Robberies, burglaries, product diversions and van hijackings to help finance terrorist operations. (NPA, Philippines 1975 – 1989) Assassination and kidnapping of senior officers or their spouses that may be shopping or otherwise present within a commissary. Random acts of violence such as drive-by shootings and bombings aimed at disrupting the quality of life, inciting fear and publicity. (Ankara Turkey; Ramstein AB, Germany)

Commissary Vulnerabilities, Cont. Intentional contamination of food products with chemical or biological agents. Use of DeCA bound delivery vehicles, shipping containers or other transportation/ shipping mediums to smuggle contraband, weapons, or explosives across international boundaries or onto military installations. (CDC delivery, Turkish Boarder, 1993)

Commissary Vulnerabilities, Cont. As collateral damage resulting from an attack or event on a host installation. Use of DeCA affiliation to gain sponsorship onto otherwise secure military installations for nefarious activities (to commit espionage, crime, terrorism, etc).

FOR OFFICIAL USE ONLY

Mitigating Threats Anticipate the threat. Plan for the threat. Construct/Renovate for the threat. Crime prevention through environmental design (CPTED) DoD Minimum Antiterrorism Standards for Buildings Train/Exercise for the threat.

Physical Security Basics PURPOSE.  Physical security is primarily directed at the prevention of losses resulting from forced or unauthorized entry. The degree of protection required varies depending upon location, structural design of the facility, value of commissary resources, and periods when the premises are unmanned or unguarded.

“Security-in-Depth”

Fort Anywhere

Off Base “Civilian” Police

Fence line

Gate Guards

Law Enforcement/MP Patrols

Security Patrols

Military Working Dogs

With All that Security, Why Do We Have Losses?

The Insider Threat

Personnel Security Program

Personnel Security Program Because you never quite know who your going to get!

DeCA Security Programs Personnel Security Your first opportunity to protect your accountability from employee theft! If they stole at their last employer, what makes you think they won’t steal from you??

Background Investigations National Agency Check with Inquiries (NACI) MINIMUM investigation for ALL Civil Service Employees working within DoD. Criminal History Check FBI Fingerprint Check Credit Check Reference/Former Employer/Education Checks

~85% of all losses are due to theft ~48% is cased by employees and other store workers ~33% is caused by shoplifters

According to the National Crime Prevention Institute: 10% of store workers & patrons will never steal regardless of the temptation. $

10% of employees and patrons will steal without regard for the security controls in place.

The key to good security is knowing that: 80% of store workers & patrons will not steal from you unless: They think they wont get caught. They rationalize that “DeCA owes them.” They “need” the money/merchandise. They feel they’re being treated unfairly. They perceive “Everyone's doing it.”

How does theft happen? Lax internal controls. Feeling of “It can’t happen to me!” Bypassing internal controls for “convenience.” Theft is a crime of opportunity!

DeCA Physical Security Programs Include Shoplifting Prevention Security Lighting Physical Security Access Control Anti-Robbery CCTV Funds Protection Internal Security Key & Lock Control Commissary

Physical Security Accessible Openings Access Control Protective Lighting Opening and Closing Procedures Vendor Stocker Control Vendor Control Visitor Control Contractor Control Key, Lock and Seal Control Cargo Vehicles

ACCESSIBLE OPENINGS.  An accessible opening is any window, door, vent, etc., which could be used to gain entry into a facility.

Physical Security Element Access Control Problems Identified Doors left open and unmonitored Badges not used/controlled Badges not secured ID’s issued to unauthorized Persons Alarmed door IDS warning signs not used

External Entrance Doors Intent – All entrance/exit to a Commissary Facility is monitored and controlled. After hours, Commissary Employee MUST authorize/monitor entry/exit of ALL! Double-Cylinder Locking Device Panic Hardware on designated fire exits Intrusion Detection System

Panic Hardware

Element Problems Identified Internal Security Problems Identified Personal Property Backup storage area Processing areas Food & drink not controlled Grazing Sweethearting Spot-checks

Physical Security Element Key & Lock Control Problems Identified Keys passed from person to person Keys left in locks Supervisors key left unsecured Padlocks left with hasp open Security hardware easily removed with wrench or screwdriver

Some strategies to reduce losses Keep high pilferage items in “Sensitive Storage.” Keep the backup storage are “clean.” Locate high pilferage items in the store in an area in which they can be “seen.” Look for vulnerabilities. Understand why people steal. Spot check receivers. Be concerned.

Issue Hunt

Sensitive Storage Area Sales Floor

Twist on key rings defeats purpose of Electronic Key boxes

Pin Number Entry Easily Compromised

Keys left unsecured in door

Call me or any of our security specialist if you need help!

Contact Information Miguel Torres Cell Phone 210 382 0893 Fax 210 221 4680 DSN 471 4680 DeCA WEST Security Back Up Staff Mr. Tony Taylor Office 916 569 4829 Mr. James Grant Office 916 569 4820