SlideShare a Scribd company logo
1 of 4
Download to read offline
FSO Series
A CL E A R A NCE JOB S SPECI A L R EP OR T




The Need for IT Convergence
by Jeffrey W. Bennett, Industrial Security Professional (ISP), for ClearanceJobs.com




Facility Security Officers (FSO) study their craft and                      preventing theft. For the internal threat, access can be
                                                                          controlled by badge or biometrics. These IT capabilities
learn ways to counter evolving threat. Business
                                                                          can limit access by employee, time of day, and certain
intelligence methods continue to keep up with                             days of the week. For example, employees that work in
technology to analyze and prevent the internal and                        the warehouse can access their warehouse doors, but
                                                                          cannot gain entry to the supply department. Those who
external influences that can ruin the enterprise.                          have janitorial privileges may only do so during work
                                                                          hours and not when the business is closed.

Loss Prevention
                                                                          Other capabilities include closed circuit television (CCTV).
The threats to enterprises include: theft, vandalism,                     This is a great deterrent and detection device for both
workplace violence, fraud, and computer attacks.                          the internal and external threat. Current technologies
Through a system of identification, analysis, risk                         allow the use of tilt/pan/zoom cameras that record and
assessment operation security and prevention, FSOs can                    store digital data. This data can be entered into a data
help to mitigate those risks.                                             warehouse. Besides employee protection and assistance
                                                                          roles, this data can be mined to see patterns and
Though FSOs primarily protect classified information,                      recognize traits of potential perpetrators. For example,
they may be involved in more traditional security                         a supply bin in a warehouse may suffer shortage at each
disciplines. For example, the costs of theft may affect                    inventory. The installation of CCTV would provide digital
how the defense contractor charges for products and                       feedback of whether or not supplies are being stolen and
services and asking the customer to bear the cost of the                  who is involved.
loss. The way to recover loss is to pass the costs on by
increasing the top line. Raising prices to recuperate loss is             Sabotage is a reportable threat according to the
a symptom of theft, but not a cure.                                       National Industrial Security Program Operating Manual
                                                                          (NISPOM). Sabotage must be reported to the FBI. For
Many companies have invested in security staff                             internal protection, it can be categorized with workplace
focused on identifying and preventing loss. These                         violence, criminal trespass activities, and industrial
“loss prevention” jobs are oriented on identifying risky                  espionage or in conjunction with a theft. Though rare,
behavior, observing others, investigating theft, and                      costs are heavy and expense may fall on the company
finding methods of reducing risk. In retail, they may                      or the customer. IT tools are available that provide
be secret shoppers; in transportation they may be                         automated tracking of inventory and information
monitoring cameras and patrolling as guards, or dressed
in business suits advising in board rooms.



Detecting and Preventing Fraud
Information technology (IT) and lessons from business
intelligence (BI) can be applied to detecting and
along business practices. These practices can include        provide feedback and evidence for use in analyzing and
campuses, apartments, retail, transportation, factories      determining actions to prevent this behavior.
and other industries. For classified information, the IT
tool is the Information Management System (IMS). The
IMS is required by NISPOM and can be used to provide         Occupational Fraud
up to date status of classified information from reception    Occupational fraud is another risk. Whether an employee
to dissemination or destruction.                             feels entitled to their fair share, is disgruntled or other
                                                             reasons, this crime is costly. When involving classified
                                                             information, it can be detrimental to national security.
Workplace Violence                                           This crime can be broken down into three categories:
Employee workplace violence makes huge headlines             Asset misappropriation, corruption, and fraudulent
for a very good reason. It is shocking behavior with         statement. Examples of asset misappropriation include
the most serious events resulting in multiple deaths.        fraudulent invoicing, payroll fraud, and skimming
These incidents lead to law suits, low morale, a bad         revenue. Corruption can involve bribery and conduction
reputation for the company and leaves families and           business laced with undisclosed conflict of interest.
victims devastated. Not all violence in the workplace end    In defense contracting International Traffic in Arms
in death. Whatever the level of crime, innocent people       Regulation or Federal Acquisitions Regulation violations
are attacked at the work place. The company has several      could also fall under fraudulent activity.
obligations. The first includes the legal responsibility
of the employer to protect and safeguard against
                                                             Defense contractors face a level of fraud threat.
preventable harm. This includes all those who work in
or visit the workplace. The second responsibility is to      Higher costs can occur at higher employee
handle incidents and investigations, discipline and other    positions. For example, managers may not be
processes appropriately. It is as important to respect the
                                                             sticking product in their pockets and sneaking
rights of all persons involved throughout the prevention
and investigation processes.                                 out the door. However, falsifying travel reports,
                                                             creating false accounts, diverting payment and
Human resources managers in defense contractors may
understand the more serious discriminators that could        other crimes are more impacting.
be associated “non-hire” criteria. For example, one
discriminator that would prevent a person from getting       Fraud is difficult to detect and many schemes can continue
a job would be a history of violence. A highly accurate      for long periods of time before they are detected.
and timely pre-employment screening program is vital.        Detection can be accidental, the result of a tip, an audit
Another would be specific questions about performance         (internal, external or surprise), hotline or as referred to by
during the interview that might indicate propensity for      law enforcement. Focus and discipline could be perceived
violence or not being able to work well with others.         as the best means to detect fraud. Paying attention to
                                                             patterns, verifying paperwork and checking records is time
Employeesʼ may not be the threat. Nature of customers,       consuming, but must be performed.
friends and family members could provide risk to the
work place. These criteria could be identified as well.       A sound method of detecting fraud involves the input of
Employees who have abusive partners or spouses and           employees. Training employees on fraud and awareness
employees who perform in risky environments such as          can help detect it early and reduce costs. Some of this
retail must be considered in the risk analysis and data      training is already conducted during security awareness
warehouse input.                                             activities. However, instead of just training cleared
                                                             employees, the FSO can help reduce fraud by tailoring
Some additional mitigating factors for employee workplace    the security awareness to uncleared employees as well.
violence include traditional security methods. Additional
lighting in darker areas, an armed guard, security
cameras and panic alarms do wonders to give employees
a peace of mind as well as help prevent violent behavior.
Knowing security is in place deters the criminal element.
These security measures could be linked in a network to
Training increases morale in many ways and creates a          all the above threats. Victims suffer greatly financially
team like atmosphere.                                         and productively.


Information technology (IT) and lessons from business
intelligence (BI) can be applied to detecting and
preventing fraud. Employee and hotline tips are most
effective. Computer links could be set up on corporate
sites to allow employees to report fraud. Some methods
could include survey, direct question and answer, or just a
space for reporting.


The audit, hotlines and tips are effective after or during
the commission of the lengthy fraud period. These are
all reactionary events. What about being proactive?
Many companies have the capability to automate almost
everything. Time sheets, accounting, billing, production
and supply chain records are often on a server. Most
require supervisor approval or at the very least have the     There are many existing security methods available to
capability of real time monitoring. This information can      help companies take the offense against such attack.
be integrated into a company version of a data warehouse      Protection takes the coordination, input and involvement
and be manipulated according to the input rules. Specific      of all business units and departments in the organization.
habits of employees can be pulled to look for and address     It cannot given to the security department alone to
financial inconsistencies.                                     handle, however such actions should be accountable
                                                              to one department. Other aggressive measures include
Access control measures such as card scanners, code           password protection, rules on internet use, firewalls and
readers and biometrics are increasingly effective. They        internet access blocking. These can be regulated with
leave a trail of employee activity and regardless of          the convergence concept. Software already exists to help
position all are required to enter information to gain        generate and protect passwords on network and stand
entry. Computer keyboard activity can be limited by           alone systems. These help ensure not only that authorized
password protection and all media should go through the       users are accessing the systems, but they also provide a
security department before introduction or removal. All of    basis for auditing. Information technology can track who
this leaves a data trail. Besides employee protection and     used which system to access which information. The user
assistance roles, this data can be mined to see patterns      leaves an automatic automated electronic trail.
and recognize traits of potential perpetrators.
                                                              Companies should have strong firewall capabilities to
                                                              protect information from both leaving and entering the
Cybersecurity                                                 enterprise system. These firewalls help prevent hacking,
Computer attacks are a huge risk to all businesses. The       high-jacking and malicious viruses. The firewall needs
threat of hackers, malicious viruses, and phishing are        to be updated regularly with updates. Most importantly,
just a few serious events of which the FSO should be          checking and running analysis identifying the threat is
aware. Data can be destroyed, reputations can be ruined,      vital. This identification should track where the threat is
and lives can be stolen. These attacks can cripple an         coming from, how often the defenses are probed, what
enterprise and could take months or years to recover.         the threat using to probe the defenses is, and what times
Businesses should have IT tools to detect and combat this     of day are the threats the strongest. Analysis should
type of threat as soon as possible.                           identify strengths and weaknesses that the adversary is
                                                              trying to exploit. When is the IT asset most vulnerable?
Worms and viruses are quickly destroying years of input.
These threats appear innocently enough in the beginning
and when the right time comes, they activate. Threats
continually knock at the internet portal trying to learn
passwords and the inner most secrets to exploit for
espionage, theft or fun. Unprotected systems perpetuate
Are our passwords easy to break? How much intrusion
would it take to stop our operations?                                                 DETECT FRAUD BY:

Internet discipline is also vital. An enemy doesnʼt have to                          • Focus and Discipline
break down defenses to wreak havoc, many times they
                                                                                     • Paying Attention to Patterns
are invited in by unwitting victims. When employees visit
unauthorized websites, download unauthorized software,                               • Verifying Paperwork
transfer data from a home computer or forward corrupted
                                                                                     • Checking Records
email, they can cause just as much harm. Blocking
websites, allowing only IT personnel to upload software,                             • Input From Employees
and screening all mobile media or preventing all media                               • Creating Fraud ʻHotlineʼ
such as CDs and other portable storage devices is crucial
to protecting the enterprise.


Protecting the enterprise with security in depth will solve                       also continue to keep up with technology to analyze and
many problems. This includes previously mentioned                                 prevent the internal and external influences that can ruin
biometric or card reader access devices, alarms and                               the enterprise. The threats corporations face include:
CCTV cameras. These are available IT devices that are                             theft, vandalism, workplace violence, fraud, and computer
popular and effective at monitoring employee movement                              attacks. The role of security to converge traditional
and activity. Vital risk assessment detail is captured in a                       physical protection with the capabilities of IT systems
data warehouse to better analyze events and proactively                           is necessary. Tools of IT can provide a great benefit to
mitigate risks before damage occurs.                                              enterprise as a system of identification, analysis, risk
                                                                                  assessment operation security and prevention, astute
Traditional methods of stove piping or traditional IT                             managers can mitigate risks. ★ ★ ★
security do not produce effective results. Neither does
segmenting business units. When the one department
handles all internet activity, human resources execute the
                                                                                  Jeffrey W. Bennett, ISP, is a former Army officer, FSO and is
laying off offenders, finance department handle all payroll
                                                                                  an accomplished writer of security books and periodicals.
discrepancies and accounting performs all audits, the
                                                                                  His books include ISP Certification-The Industrial Security
result is a broken chain of incomplete activity.
                                                                                  Professional Exam Manual. He is the owner of Red Bike
                                                                                  Publishing (www.redbikepublishing.com).
The willing participation and information sharing could
be better handled in the form of a committee. Each
respective department can do their day to day activities,
but results can be presented to the entire group to help
detect and determine any one of the threats addressed in
this paper.


FSOs and security professionals should continue to make
it a point to study their craft and learn ways to counter
evolving threat. Business intelligence methods should




4101 NW Urbandale Drive • Urbandale, Iowa 50322 • 1.877.386.3323 • www.clearancejobs.com

More Related Content

More from ClearanceJobs

ClearanceJobs: Reaching Veterans, Wounded Warriors and Targeted Disabilities
ClearanceJobs: Reaching Veterans, Wounded Warriors and Targeted DisabilitiesClearanceJobs: Reaching Veterans, Wounded Warriors and Targeted Disabilities
ClearanceJobs: Reaching Veterans, Wounded Warriors and Targeted DisabilitiesClearanceJobs
 
The Cleared Network: Recruiting and Networking with Cleared Professionals
The Cleared Network: Recruiting and Networking with Cleared ProfessionalsThe Cleared Network: Recruiting and Networking with Cleared Professionals
The Cleared Network: Recruiting and Networking with Cleared ProfessionalsClearanceJobs
 
Government Contractor vs Government Employment
Government Contractor vs Government EmploymentGovernment Contractor vs Government Employment
Government Contractor vs Government EmploymentClearanceJobs
 
BRAC 2005 - 2011 (Base Realignment and Closure)
BRAC 2005 - 2011 (Base Realignment and Closure)BRAC 2005 - 2011 (Base Realignment and Closure)
BRAC 2005 - 2011 (Base Realignment and Closure)ClearanceJobs
 
Security Clearance Information
Security Clearance InformationSecurity Clearance Information
Security Clearance InformationClearanceJobs
 
FSO Training: Preparing for Business Growth
FSO Training: Preparing for Business GrowthFSO Training: Preparing for Business Growth
FSO Training: Preparing for Business GrowthClearanceJobs
 
Security Clearance Jobs in Tampa, St. Petersburg, Orlando, and Huntsville
Security Clearance Jobs in Tampa, St. Petersburg, Orlando, and HuntsvilleSecurity Clearance Jobs in Tampa, St. Petersburg, Orlando, and Huntsville
Security Clearance Jobs in Tampa, St. Petersburg, Orlando, and HuntsvilleClearanceJobs
 
Security Clearance Jobs in Phoenix, Tucson, Colorado Springs, Dallas and Fort...
Security Clearance Jobs in Phoenix, Tucson, Colorado Springs, Dallas and Fort...Security Clearance Jobs in Phoenix, Tucson, Colorado Springs, Dallas and Fort...
Security Clearance Jobs in Phoenix, Tucson, Colorado Springs, Dallas and Fort...ClearanceJobs
 

More from ClearanceJobs (8)

ClearanceJobs: Reaching Veterans, Wounded Warriors and Targeted Disabilities
ClearanceJobs: Reaching Veterans, Wounded Warriors and Targeted DisabilitiesClearanceJobs: Reaching Veterans, Wounded Warriors and Targeted Disabilities
ClearanceJobs: Reaching Veterans, Wounded Warriors and Targeted Disabilities
 
The Cleared Network: Recruiting and Networking with Cleared Professionals
The Cleared Network: Recruiting and Networking with Cleared ProfessionalsThe Cleared Network: Recruiting and Networking with Cleared Professionals
The Cleared Network: Recruiting and Networking with Cleared Professionals
 
Government Contractor vs Government Employment
Government Contractor vs Government EmploymentGovernment Contractor vs Government Employment
Government Contractor vs Government Employment
 
BRAC 2005 - 2011 (Base Realignment and Closure)
BRAC 2005 - 2011 (Base Realignment and Closure)BRAC 2005 - 2011 (Base Realignment and Closure)
BRAC 2005 - 2011 (Base Realignment and Closure)
 
Security Clearance Information
Security Clearance InformationSecurity Clearance Information
Security Clearance Information
 
FSO Training: Preparing for Business Growth
FSO Training: Preparing for Business GrowthFSO Training: Preparing for Business Growth
FSO Training: Preparing for Business Growth
 
Security Clearance Jobs in Tampa, St. Petersburg, Orlando, and Huntsville
Security Clearance Jobs in Tampa, St. Petersburg, Orlando, and HuntsvilleSecurity Clearance Jobs in Tampa, St. Petersburg, Orlando, and Huntsville
Security Clearance Jobs in Tampa, St. Petersburg, Orlando, and Huntsville
 
Security Clearance Jobs in Phoenix, Tucson, Colorado Springs, Dallas and Fort...
Security Clearance Jobs in Phoenix, Tucson, Colorado Springs, Dallas and Fort...Security Clearance Jobs in Phoenix, Tucson, Colorado Springs, Dallas and Fort...
Security Clearance Jobs in Phoenix, Tucson, Colorado Springs, Dallas and Fort...
 

Recently uploaded

VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiVIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...Suhani Kapoor
 
Employee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchEmployee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchSoham Mondal
 
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...Suhani Kapoor
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...Suhani Kapoor
 
Résumé (2 pager - 12 ft standard syntax)
Résumé (2 pager -  12 ft standard syntax)Résumé (2 pager -  12 ft standard syntax)
Résumé (2 pager - 12 ft standard syntax)Soham Mondal
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxGry Tina Tinde
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证obuhobo
 
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Madekojalkojal131
 
Final Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipFinal Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipSoham Mondal
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineBruce Bennett
 
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...poojakaurpk09
 
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceanilsa9823
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...gurkirankumar98700
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...shivangimorya083
 
Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectPriyanshuRawat56
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Suhani Kapoor
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubaikojalkojal131
 

Recently uploaded (20)

VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiVIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
 
Employee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchEmployee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India Research
 
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
 
Résumé (2 pager - 12 ft standard syntax)
Résumé (2 pager -  12 ft standard syntax)Résumé (2 pager -  12 ft standard syntax)
Résumé (2 pager - 12 ft standard syntax)
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptx
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
 
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Booking
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
 
Final Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipFinal Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management Internship
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
 
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
 
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
 
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
 
Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effect
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
 

FSO Security: Detecting and Preventing Fraud

  • 1. FSO Series A CL E A R A NCE JOB S SPECI A L R EP OR T The Need for IT Convergence by Jeffrey W. Bennett, Industrial Security Professional (ISP), for ClearanceJobs.com Facility Security Officers (FSO) study their craft and preventing theft. For the internal threat, access can be controlled by badge or biometrics. These IT capabilities learn ways to counter evolving threat. Business can limit access by employee, time of day, and certain intelligence methods continue to keep up with days of the week. For example, employees that work in technology to analyze and prevent the internal and the warehouse can access their warehouse doors, but cannot gain entry to the supply department. Those who external influences that can ruin the enterprise. have janitorial privileges may only do so during work hours and not when the business is closed. Loss Prevention Other capabilities include closed circuit television (CCTV). The threats to enterprises include: theft, vandalism, This is a great deterrent and detection device for both workplace violence, fraud, and computer attacks. the internal and external threat. Current technologies Through a system of identification, analysis, risk allow the use of tilt/pan/zoom cameras that record and assessment operation security and prevention, FSOs can store digital data. This data can be entered into a data help to mitigate those risks. warehouse. Besides employee protection and assistance roles, this data can be mined to see patterns and Though FSOs primarily protect classified information, recognize traits of potential perpetrators. For example, they may be involved in more traditional security a supply bin in a warehouse may suffer shortage at each disciplines. For example, the costs of theft may affect inventory. The installation of CCTV would provide digital how the defense contractor charges for products and feedback of whether or not supplies are being stolen and services and asking the customer to bear the cost of the who is involved. loss. The way to recover loss is to pass the costs on by increasing the top line. Raising prices to recuperate loss is Sabotage is a reportable threat according to the a symptom of theft, but not a cure. National Industrial Security Program Operating Manual (NISPOM). Sabotage must be reported to the FBI. For Many companies have invested in security staff internal protection, it can be categorized with workplace focused on identifying and preventing loss. These violence, criminal trespass activities, and industrial “loss prevention” jobs are oriented on identifying risky espionage or in conjunction with a theft. Though rare, behavior, observing others, investigating theft, and costs are heavy and expense may fall on the company finding methods of reducing risk. In retail, they may or the customer. IT tools are available that provide be secret shoppers; in transportation they may be automated tracking of inventory and information monitoring cameras and patrolling as guards, or dressed in business suits advising in board rooms. Detecting and Preventing Fraud Information technology (IT) and lessons from business intelligence (BI) can be applied to detecting and
  • 2. along business practices. These practices can include provide feedback and evidence for use in analyzing and campuses, apartments, retail, transportation, factories determining actions to prevent this behavior. and other industries. For classified information, the IT tool is the Information Management System (IMS). The IMS is required by NISPOM and can be used to provide Occupational Fraud up to date status of classified information from reception Occupational fraud is another risk. Whether an employee to dissemination or destruction. feels entitled to their fair share, is disgruntled or other reasons, this crime is costly. When involving classified information, it can be detrimental to national security. Workplace Violence This crime can be broken down into three categories: Employee workplace violence makes huge headlines Asset misappropriation, corruption, and fraudulent for a very good reason. It is shocking behavior with statement. Examples of asset misappropriation include the most serious events resulting in multiple deaths. fraudulent invoicing, payroll fraud, and skimming These incidents lead to law suits, low morale, a bad revenue. Corruption can involve bribery and conduction reputation for the company and leaves families and business laced with undisclosed conflict of interest. victims devastated. Not all violence in the workplace end In defense contracting International Traffic in Arms in death. Whatever the level of crime, innocent people Regulation or Federal Acquisitions Regulation violations are attacked at the work place. The company has several could also fall under fraudulent activity. obligations. The first includes the legal responsibility of the employer to protect and safeguard against Defense contractors face a level of fraud threat. preventable harm. This includes all those who work in or visit the workplace. The second responsibility is to Higher costs can occur at higher employee handle incidents and investigations, discipline and other positions. For example, managers may not be processes appropriately. It is as important to respect the sticking product in their pockets and sneaking rights of all persons involved throughout the prevention and investigation processes. out the door. However, falsifying travel reports, creating false accounts, diverting payment and Human resources managers in defense contractors may understand the more serious discriminators that could other crimes are more impacting. be associated “non-hire” criteria. For example, one discriminator that would prevent a person from getting Fraud is difficult to detect and many schemes can continue a job would be a history of violence. A highly accurate for long periods of time before they are detected. and timely pre-employment screening program is vital. Detection can be accidental, the result of a tip, an audit Another would be specific questions about performance (internal, external or surprise), hotline or as referred to by during the interview that might indicate propensity for law enforcement. Focus and discipline could be perceived violence or not being able to work well with others. as the best means to detect fraud. Paying attention to patterns, verifying paperwork and checking records is time Employeesʼ may not be the threat. Nature of customers, consuming, but must be performed. friends and family members could provide risk to the work place. These criteria could be identified as well. A sound method of detecting fraud involves the input of Employees who have abusive partners or spouses and employees. Training employees on fraud and awareness employees who perform in risky environments such as can help detect it early and reduce costs. Some of this retail must be considered in the risk analysis and data training is already conducted during security awareness warehouse input. activities. However, instead of just training cleared employees, the FSO can help reduce fraud by tailoring Some additional mitigating factors for employee workplace the security awareness to uncleared employees as well. violence include traditional security methods. Additional lighting in darker areas, an armed guard, security cameras and panic alarms do wonders to give employees a peace of mind as well as help prevent violent behavior. Knowing security is in place deters the criminal element. These security measures could be linked in a network to
  • 3. Training increases morale in many ways and creates a all the above threats. Victims suffer greatly financially team like atmosphere. and productively. Information technology (IT) and lessons from business intelligence (BI) can be applied to detecting and preventing fraud. Employee and hotline tips are most effective. Computer links could be set up on corporate sites to allow employees to report fraud. Some methods could include survey, direct question and answer, or just a space for reporting. The audit, hotlines and tips are effective after or during the commission of the lengthy fraud period. These are all reactionary events. What about being proactive? Many companies have the capability to automate almost everything. Time sheets, accounting, billing, production and supply chain records are often on a server. Most require supervisor approval or at the very least have the There are many existing security methods available to capability of real time monitoring. This information can help companies take the offense against such attack. be integrated into a company version of a data warehouse Protection takes the coordination, input and involvement and be manipulated according to the input rules. Specific of all business units and departments in the organization. habits of employees can be pulled to look for and address It cannot given to the security department alone to financial inconsistencies. handle, however such actions should be accountable to one department. Other aggressive measures include Access control measures such as card scanners, code password protection, rules on internet use, firewalls and readers and biometrics are increasingly effective. They internet access blocking. These can be regulated with leave a trail of employee activity and regardless of the convergence concept. Software already exists to help position all are required to enter information to gain generate and protect passwords on network and stand entry. Computer keyboard activity can be limited by alone systems. These help ensure not only that authorized password protection and all media should go through the users are accessing the systems, but they also provide a security department before introduction or removal. All of basis for auditing. Information technology can track who this leaves a data trail. Besides employee protection and used which system to access which information. The user assistance roles, this data can be mined to see patterns leaves an automatic automated electronic trail. and recognize traits of potential perpetrators. Companies should have strong firewall capabilities to protect information from both leaving and entering the Cybersecurity enterprise system. These firewalls help prevent hacking, Computer attacks are a huge risk to all businesses. The high-jacking and malicious viruses. The firewall needs threat of hackers, malicious viruses, and phishing are to be updated regularly with updates. Most importantly, just a few serious events of which the FSO should be checking and running analysis identifying the threat is aware. Data can be destroyed, reputations can be ruined, vital. This identification should track where the threat is and lives can be stolen. These attacks can cripple an coming from, how often the defenses are probed, what enterprise and could take months or years to recover. the threat using to probe the defenses is, and what times Businesses should have IT tools to detect and combat this of day are the threats the strongest. Analysis should type of threat as soon as possible. identify strengths and weaknesses that the adversary is trying to exploit. When is the IT asset most vulnerable? Worms and viruses are quickly destroying years of input. These threats appear innocently enough in the beginning and when the right time comes, they activate. Threats continually knock at the internet portal trying to learn passwords and the inner most secrets to exploit for espionage, theft or fun. Unprotected systems perpetuate
  • 4. Are our passwords easy to break? How much intrusion would it take to stop our operations? DETECT FRAUD BY: Internet discipline is also vital. An enemy doesnʼt have to • Focus and Discipline break down defenses to wreak havoc, many times they • Paying Attention to Patterns are invited in by unwitting victims. When employees visit unauthorized websites, download unauthorized software, • Verifying Paperwork transfer data from a home computer or forward corrupted • Checking Records email, they can cause just as much harm. Blocking websites, allowing only IT personnel to upload software, • Input From Employees and screening all mobile media or preventing all media • Creating Fraud ʻHotlineʼ such as CDs and other portable storage devices is crucial to protecting the enterprise. Protecting the enterprise with security in depth will solve also continue to keep up with technology to analyze and many problems. This includes previously mentioned prevent the internal and external influences that can ruin biometric or card reader access devices, alarms and the enterprise. The threats corporations face include: CCTV cameras. These are available IT devices that are theft, vandalism, workplace violence, fraud, and computer popular and effective at monitoring employee movement attacks. The role of security to converge traditional and activity. Vital risk assessment detail is captured in a physical protection with the capabilities of IT systems data warehouse to better analyze events and proactively is necessary. Tools of IT can provide a great benefit to mitigate risks before damage occurs. enterprise as a system of identification, analysis, risk assessment operation security and prevention, astute Traditional methods of stove piping or traditional IT managers can mitigate risks. ★ ★ ★ security do not produce effective results. Neither does segmenting business units. When the one department handles all internet activity, human resources execute the Jeffrey W. Bennett, ISP, is a former Army officer, FSO and is laying off offenders, finance department handle all payroll an accomplished writer of security books and periodicals. discrepancies and accounting performs all audits, the His books include ISP Certification-The Industrial Security result is a broken chain of incomplete activity. Professional Exam Manual. He is the owner of Red Bike Publishing (www.redbikepublishing.com). The willing participation and information sharing could be better handled in the form of a committee. Each respective department can do their day to day activities, but results can be presented to the entire group to help detect and determine any one of the threats addressed in this paper. FSOs and security professionals should continue to make it a point to study their craft and learn ways to counter evolving threat. Business intelligence methods should 4101 NW Urbandale Drive • Urbandale, Iowa 50322 • 1.877.386.3323 • www.clearancejobs.com