Showing posts with label Risk Assessment. Show all posts
Showing posts with label Risk Assessment. Show all posts

Thursday, October 1, 2020

WORSHIP SURVEILLANCE DETECTION

WORSHIP SURVEILLANCE DETECTION

India has one place of worship for every 400 people, more than the countrywide spread of educational and medical institutions put together. And it does not seem that the pattern is going to change soon.
We often come and go from our Houses of Worship (HOW) with very little thought about who may be watching our activities. If we have implemented basic security precautions, we are probably comfortable in our setting. Security and worship can be successfully blended for those who worship in your facility. No house of worship (HOW), whether a church, mosque, temple, or synagogue is exempt from crime, whether committed by an internal member, a stranger, or as a random act of terrorism. On 5th September 2018 District Magistrate Srinagar, Dr Syed Abid Rasheed Shah, has ordered for installation of CCTV cameras in and around all prominent shrines, mosques and temples in the district.


Terrorists often gather significant pieces of information from open sources such as Google Maps and social media post­ings. They collect a lot of data about their target of interest and eventually they will conduct physical surveillance. After collecting initial data about the HOW, the terrorists will begin to survey the location, trying to determine the best time and mode of attack. Terrorists may look for a soft target that will bring instant publicity and maximize impact. A soft target can be a facility that doesn’t lock its doors or provide any type of security. Finding no resistance to their surveillance, they quickly realize there will be little or no threats to their safety, allowing them easy access in and out of the building. Depending on their plan of attack, they may send more skilled members to collect additional information by conducting surveillance inside and outside of the facility.
Risk Assessment
How do you know if someone is watching your facility? First, as a member it is always important that you are aware of who is in the parking lot. Be aware of any cars with people sitting in them that are in close proximity to your facility.
Now we need to find out risk factor in terrorists’ eyes.
Red Zones:
Terrorists seek locations to position themselves in what are referred to as red zones. These zones will normally meet the following three requirements:
1)  View of the target. Terrorists want to observe vulner­abilities so they need a good view. They will note the times of services. They will note how many people are there at any given time, seeking the opportunity to kill the maximum number possible with as little effort as possible. They will observe who comes and goes from the facility and will note the established patterns of behavior.
2)  Cover and concealment. Terrorists need to be able to apply cover and concealment tactics. While they are viewing the intended target, they do not wish to be observed by you.
3)  Safety and Exit. Terrorists do not want to be appre­hended and thus seek a safe exit which provides a quick exit, should their presence be observed.

Green Zones
As you are entering and exiting from your HOW, it is important that you are observant of suspicious activities.
Following are a few suspicious activities you might observe around your facility:
• Someone taking notes or photos who stops abruptly when approached
• Someone pointing at the target or casually looking around
• Circling the block repeatedly in a taxi or vehicle.
• Car, van, or truck parked nearby with occupants taking notes or photos.
• Circling the block repeatedly in a taxi or vehicle.
• Drawings or maps observed in a vacant car, van, or truck.
• Interest in security systems/someone enters and asks about the security system
• Someone glancing away or appearing to be nervous when approached.
• Someone enters the facility claiming to be looking for someone, and they appear overly interested in the physical layout of the building


The above listed activities may or may not indicate that your location is under surveillance. However, if observed, they should be noted and reported immediately. Another consideration as terrorist activities increase is that if law enforcement personnel are able to observe those conducting surveillance, it could result in lives being saved by collecting and sharing intelligence information. Otherwise, terrorists may move onto the next facility, which could result in many casualties. Regardless, the decision to question those conducting hostile surveillance or conduct additional surveil­lance must be made by law enforcement or a trained security team member.
Securing Worship
This part I divided into three (3) sections:
• Interior security
• Exterior security
• Procedural and/or best practices

• Interior security by
1.   Access Control:
Controlling and limiting access is one of the most important steps that can be taken to improve security. Some Worship staff and worshippers will not be comfortable with restricting access.

• Establish policies to maintain access control
• Limit access to childcare, business offices, cash counting area, and media rooms.
• Always install the latest patches and updates when prompted. This mitigates many hacking programs that rely on outdated vulnerabilities in your software. Set your computer to auto install updates.
• Doors and windows should be secured when the building is vacant.
• Limit points of access. When opening your facility, consider the event, the number of people, and the location of the event. Limit access by only opening doors that are close to the area being used. Do not open every door.
•  Establish checkpoints based on need--and staff accordingly. A checkpoint is an entry where all people and things are screened based upon the security plan for the current threat environment.
•  Keys for critical areas and master keys must be especially controlled.

2.   Burglar Alarm:
• Establish policies to maintain burglar alarm system.
• Ensure an alarm system covers access points and key areas where expensive items are housed.
• Use a reliable monitoring vendor and ensure contact information remains current.
• Develop a policy that addresses response to alarms.
• Install panic alarms at public reception areas where employees can initiate emergency procedures when suspicious persons approach and request access.

3.   Fire Alarm:
•  Ensure adequate addressable fire alarm coverage. The local fire department can help with determining what is needed for your facility.
• Develop a policy that addresses response to alarms.

4.   CCTV System:
Camera coverage should be considered for critical areas (such as areas with children, the business office, the clergy’s office, etc.) and access points. They can also be focused around items that are most likely to be stolen. For places of worship with little capital to spend, a camera with audio that can be monitored from a cell phone may be purchased for about $250 - $2500.

•  A Camera system can also serve as an alarm system by using video analytics and integrating with access control systems.
• Cameras should capture every door and point of entry. Additionally, cameras should be in the infant care rooms, daycare rooms, and areas where children play/eat/etc.
• If cameras are installed in daycare centers, inform parents and caretakers that you would be storing digital data of their children.
• Always install the latest patches and updates when prompted. This mitigates many hacking programs that rely on outdated vulnerabilities in your software. Set your computer to auto install updates.

Considering that places of worship are often targets of attacks, crime, and other losses, it is our belief that by auditing CCTV video footage as a standard operating procedure, and delivering a new powerful signage that states ‘WE CHECK CCTV EVERYDAY', far more benefits will accrue to them.

5.   Doors:
• Ideally doors should be wood or steel with a solid frame.
• Hinge pins should be located on the interior of door, or capped, if on the outside to prevent easy removal.

6.   Windows:
• Ensure that windows are secured prior to closing and latches are in working order.
• If windows are opened for air circulation, only open windows that are monitored and/or located where
people cannot climb through.

Exterior Security
Exterior security controls encourage us to think about how best to secure the perimeter of the church, parking lots, playground areas, and mass drop-off areas. Research says most violent crimes at faith-based organizations, more than 70% of the acts occurred outside the building on ministry grounds or parking lots.
• Consider enhancing perimeter security by adding a decorative fence—whether aluminium, board, stone, brick and/or multiple combinations thereof.
• Secure points of entry when no events are taking place. If your facility has back entrances and parking lots, these should be locked off.
• Remove potential fire hazards, such as trash and debris. Keep dumpsters in a locked dumpster pad.
• Consider vehicle barriers and/or bollards for vulnerable entries, special events, or in case of a terrorist threat when stand-off distance is required for vehicles. Barriers can be as simple as strategic parking of staff vehicles or as complex as a built-in place.
• Identify exterior hiding places, equipment vulnerabilities, utilities entries/shutoffs, fire department connections and hydrants. Check them for signs of activity before any event.
• Lights should be placed on all doors and windows. Motion detector lights should be considered for doors and windows. Ensure all lights are in working order.
• Lights should be on from dust to dawn. Consider lights with solar panels as this may reduce the cost of the energy.
• Larger facilities may need an officer to direct traffic. This will ensure timely entry and parking. The officer(s) can patrol the parking lots during the services. This task can also be completed by members of your “security team.” Outfit them in high-visibility vests and radios.
• Camera coverage is recommended for the exterior of the facility. Every area from the entrances to the parking lots should be covered. Some cameras only record when motion is detected, others record 24-7. Cameras can be monitored from the inside by your security team members and remotely on hand held devices as needed or based upon analytics,
• "Cameras never lie". But, how will a user ever know, unless he 'sees' what the camera 'saw'. Do audit own CCTV video footage as a standard operating procedure, for them to achieve optimal benefits from CCTV video, which includes (a) crime, fraud and loss prevention (b) faster solving of crime (c) risk mitigation (d) compliance issues and continuous improvement and so on.
• Appoint a “security leader” to oversee the development and implementation of the security plan. Schedule regular meetings to review procedures and incidents.
• Develop a “Welcoming Committee” of individuals and/or ushers who are trained in security detection and emergency responses.
• Conduct evacuation drills with staff and volunteers. Attend firearms training if your committee recommends that individuals are armed during services and special events.

"Considering that places of Worship are often targets of attacks, crime, and other losses, 'COM-SUR', the world's only CCTV video footage auditing, smart backup, and standardized intelligent reporting software is available for free to all places of Worship world-over, as part of our corporate social responsibility.

Places of Worship will need to take care of the hardware, installation, training, and so on; which can easily be carried out by their system integrators, who will need to be approved and trained by us. Besides a registration and training fee, a small consulting and administration fee will be charged by COM-SUR from the system integrator".

Resources:
Crime Prevention for Houses of Worship, 2nd edition, by Paula L. Ratliff. Published by AISIS International, 2015.
https://www.ifsec.events/india/visit/news-and-updates/com-sur-will-be-integrated-ai-ml-technologies-offer-holistic-solutions
https://timesofindia.indiatimes.com/city/agra/kasganj-cctv-cameras-to-be-set-up-at-worship-places-in-sensitive-areas/articleshow/62823320.cms
https://www.newindianexpress.com/cities/bengaluru/2019/apr/26/police-top-brass-meets-heads-of-places-of-worship-malls-1969148.html
https://defendry.com/4-ways-to-improve-security-at-your-place-of-worship/


Sunday, September 1, 2019

System integrator role in SSA Business

System integrator role in SSA Business

Yam, you know SSA is stands for Security Safety Automation (SSA Integrate). A security systems integrator by definition specializes in bringing together subsystems into a whole and ensuring that those subsystems function together. When the goal is physical security, those subsystems might be Video surveillance, Access control, Intrusion, FDA or Emergency notification, BAS, computer networks and more. Some security suppliers have established business simply on the procurement and installation of systems predefined by others. More fully developed are considered ‘design-build’ integrators. However the most capable security integrator is a full service provider capable of supporting your operations in every phase of the security system lifecycle:
1.   Security risk or needs assessments,
2.   System engineering and design for the major technologies,
3.   Broad access to the leading product lines,
4.   Custom engineering when required,
5.   Alternate investment options,
6.   Procurement, staging, installation, commissioning and training,
7.   Full lifecycle service and maintenance,
8.   System functional and technology upgrades.

A client who selects an integrator fully capable in all the above can then take advantage of his unique perspective on what are the key ingredients for successful development of a physical security program that is supportive of a healthy enterprise.
Working with a full service security provider also reinforces quality. Consider why this is so. If, for instance, the integrator offers long term service and maintenance for the system he installs, then both the service provider and the customer are motivated that the design should be solid and the installation of high quality. And if the integrator can offer attractive long term financing, even operational leases, then he again has a further stake in the caliber of the security provided.
System integration is defined in engineering as the process of bringing together the component sub-systems into one system (an aggregation of subsystems cooperating so that the system is able to deliver the overarching functionality) and ensuring that the subsystems function together as a system, and in information technology as the process of linking together different computing systems and software applications physically or functionally, to act as a coordinated whole.
System Integrators in the automation industry typically provide the product and application experience in implementing complex automation solutions. Often, System Integrators are aligned with automation vendors, joining their various System Integrator programs for access to development products, resources and technical support. System integrators are tightly linked to their accounts and often are viewed as the engineering departments for small manufacturers, handling their automation system installation, commissioning and long term maintenance.

Are there tangible ways that we see interoperability trending in the industry?
There is certainly movement toward standard-compliant products but it is slow. I attribute this mainly due to engineers reusing portions of old or outdated specs along with their lack of knowledge of the current product offerings. IP cameras will help move the standards along since more and more clients are aware of megapixel technology and it forces the engineers to become more current.

Where do you see underserved or untapped opportunities for security systems integrators to provide integration and automation expertise?
Video and access technology have the potential to be integrated well beyond the traditional Big Brother stereotype applications. One example is warehouse distribution and processing applications where repetitive tasks performed incorrectly can slow production or cause injuries. Video analytics could be modified to monitor physical movement and monitor improper technique that could lead to injuries.
These videos could initiate notifications to HR and management staff to alert them to potential problems before they occur. Access to machines and forklifts could be controlled through HR records. Integrating the access system to training and safety certifications could help reduce unqualified employees from accessing and enabling critical operational systems. Security could monitor the traditional video footage, HR could assemble incident reports tagged with the video and management could build and expand training programs with real world examples.

Another area of potential growth is the smart building. A fully integrated structure including security, lighting, HVAC and building controls that provides a return on investment along with the ability to remotely manage a site.

How can a locally-based or small regional company have successes in enterprise-level organizations?
Local companies can have a distinct advantage over the national integrators. First, the small or regional company must be technically advanced and focused on cutting-edge technology so they can provide a value to an enterprise-level client. They must also network with similar dealers with related product lines so they can establish an installation network throughout North America or the regions they are required to service. They can also become an agent for the enterprise client and coordinate all installations and manage that system for that client. Compare that level of service to the big integrators. Yes, they have a handful of talented individuals that truly get the big picture and these men and women travel the country and the world implementing systems. But once the job is completed, they’re off to the next one and you may never see them again.

How can smaller integrators differentiate to better compete?
A commitment to service is the local integrators greatest strength. Through continuing education of its technical staff and building working relationships with clients, a local integrator can react quickly and see the big picture of their customers’ needs and requests. As the IT department begins to dominate the physical security industry the local integrator can help be a bridge between the security professionals and the sometimes frustrating “smartest man in the room” syndrome of the IT staff . Most integrators have a great respect for the current and former local and national law enforcement professionals we work with every day. Their knowledge of where and why a camera is placed and how to implement the concentric rings of security, lighting control and placement is invaluable. The human element of security beyond pure technology is something that some IT professionals do not always grasp. Integrators can successful bridging that gap when they strive to clearly communicate with both departments.
What is the Solution Development Process With a Full Service Systems Integrator?

Risk Assessment. Your integrator should be able to assist or guide you in this first step toward development of a security solution. The industry standard for this is the ASIS 7-step general security risk assessment guideline. The guideline defines a process which starts with identification of assets and risk events and ends with a solution cost benefit analysis. Properly done the end product is not only the security you want and need but a documented rationale for the investment.

Financial OptionsSimilar to many internal enterprise processes the best electronic security solution is sometimes planned to be phased-in over time to give the client the best possible security function progressively. Nonetheless a full service integrator enables you to tailor acquisition of enhanced security in a manner which meets your needs. As an example, reasonably priced capital leases can push the cash flow impact of security into outer years. Due to current accelerated tax depreciation in effect these leases can in some instances reduce the net cost below that of an outright purchase. If a full service integrator has the internal resources – service fleet, repair department, stocked inventory, etc. – to maintain their installed systems they may also offer and administer operational lease programs to the security solutions they provide. These leases differ from capital leases in that ownership of the physical security equipment is retained by the service provider yet the site installation and its sustained operability is available as a monthly service fee.

Design. The functional design should clearly define for the end user the extent of the solution’s protection. It may involve multiple technologies for the most effective solution. Minimizing the burden placed on general staff to maintain security and respond to emergencies should typically be a demonstrable objective.
Value driven component selection may require a number of different supplier sources. Exterior components will be weatherproof, interior components will be vandal and wear resistant as needed. System operation will be well protected from the dangers of tampering, surges, electrical strikes, etc. as well as single points of failure if possible. A good design will not dead-end the customer but position the delivered security solution for adaptation to meet anticipated future needs. Good designs may even enhance as well as protect enterprise and site operations.
Installation & Commissioning. The installation should conform to and even exceed state and federal regulations and guidelines and be performed by licensed personnel as required. The installation should be safe for all onsite, reflect excellent workmanship and conduct should be courteous and respectful to all involved. System configuration should be performed by individuals with good system knowledge. The end user training should be complete enough to address at least typical daily tasks and provide them the resources they need to reinforce the training and administer further if required. This is most likely provided by a resource positioned to be a partner in meeting your security needs.
System Maintenance and Service. The overarching goal is to maintain the operability of your security solution with the same effectiveness experienced as it was commissioned. But electronics degrade and fail and sites often continuously require system tweaks as they grow. A good service program will make available to you certified service personnel as well as standard and emergency response times you can depend on. The best providers will often maintain stock for repair and loan and even have in house bench repair capability for rapid, cost effective turn around. And if you have outgrown your security systems or they are generally showing their age a good provider can offer mid-life upgrades and/or ‘system refreshes’ which progressively secure your operations and people.

Enterprise Security is Not A Commodity.
Why is enterprise physical electronic security more than just a commodity to be procured? Because the security risks are multiple, varied and changing. Some which occur infrequently are the most potentially damaging. An outside perspective developed from meeting a variety of client needs can help prioritize. The current solution state of the art is technical, multidisciplinary and rapidly evolving. There is not a consumer protected design-bid-build process which guarantees success. Only a subset of security industry service providers are equipped and positioned to reliably assist you from needs development through to system maintenance.

Trust on your selective System Integrator or Solution Service Provider.
System Integrator who really work in different system with different brand system, they are know who or which OEM  has good service support. No one integrator is wise for all product. System Integrator surve customer. OEM will not provide service.


Tips to choose Best System Integrator in India
·         Choose a systems integrator who has a list of successful projects with appreciation letter from customer. Check references, talk to their clients and take reviews. Find out for how long they have been in the field.
·         System Integrator should have long-term relationship and close ties with the leading OEMs. These relationships allow an integrator to keep up to date on new technologies, get the best prices, and provide you with the most complete support network available. The best integrators focus on customer needs and build solutions using best of breed technologies. They should have a broad range of products they have worked with and enough staff to handle different areas of the project.
·         The integrator should prove that they understood your requirements. Take Quote from multiple System Integrators. Be especially careful if you get lower price than expected or that others have quoted. Make sure the system integrator doesn’t over commit during negotiations.
·         System Integrator should have specialized expertise and that can be applied to create an architecture that ensures security, flexibility, and scalability to meet your IT service availability demands. Focus on their knowledge, techniques and skills. Make sure they have full knowledge of system engineering, as well as sufficient experience to handle your project.
·         If you don’t have in-house expertise for making the integrator selection, consider hiring a third-party technical consultant to establish selection criteria and/or participate in the review process. Get involved at the zero level in the planning, simulation, detailed layout, software handling techniques and maintenance requirements as much as you possibly can in order to get the biggest possible benefits. In this point our Writer can help, you may connect with this article writer.
·         Keep up-to-date milestone records during the course of the project. If you have to replace an integrator, refer to the specification and decide on a fair settlement covering payment for all completed deliverables. System Integrator should have a knowledge transfer process in place. This ensures you have the time and resources necessary to ensure your team understands the work product and can continue on – independently and successfully.
·         Look for an integrator that listens to your needs, communicates well, and provides customized solutions for your business.
·         Select an integrator that has a large, experienced engineering core with a holistic understanding of your entire ELV ecosystem. This will facilitate better design, deployment and support.

·         System Integrator 2/3 team member should have Membership their own technology field like: ASIS International, SIA (SECURITY INDUSTRY ASSOCIATION), FSAI, National Safety Council.


For a Free Consultation Call: +919903280406
Please find below my details.