Facility Security Officers can help mitigate theft, vandalism, workplace violence, fraud, and computer attacks. IT can provide a great benefit for identification, analysis, risk assessment operation security and prevention. FSOs and security professionals should continue to study their craft and learn ways to counter evolving threat.
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
FSO Security: Detecting and Preventing Fraud
1. FSO Series
A CL E A R A NCE JOB S SPECI A L R EP OR T
The Need for IT Convergence
by Jeffrey W. Bennett, Industrial Security Professional (ISP), for ClearanceJobs.com
Facility Security Officers (FSO) study their craft and preventing theft. For the internal threat, access can be
controlled by badge or biometrics. These IT capabilities
learn ways to counter evolving threat. Business
can limit access by employee, time of day, and certain
intelligence methods continue to keep up with days of the week. For example, employees that work in
technology to analyze and prevent the internal and the warehouse can access their warehouse doors, but
cannot gain entry to the supply department. Those who
external influences that can ruin the enterprise. have janitorial privileges may only do so during work
hours and not when the business is closed.
Loss Prevention
Other capabilities include closed circuit television (CCTV).
The threats to enterprises include: theft, vandalism, This is a great deterrent and detection device for both
workplace violence, fraud, and computer attacks. the internal and external threat. Current technologies
Through a system of identification, analysis, risk allow the use of tilt/pan/zoom cameras that record and
assessment operation security and prevention, FSOs can store digital data. This data can be entered into a data
help to mitigate those risks. warehouse. Besides employee protection and assistance
roles, this data can be mined to see patterns and
Though FSOs primarily protect classified information, recognize traits of potential perpetrators. For example,
they may be involved in more traditional security a supply bin in a warehouse may suffer shortage at each
disciplines. For example, the costs of theft may affect inventory. The installation of CCTV would provide digital
how the defense contractor charges for products and feedback of whether or not supplies are being stolen and
services and asking the customer to bear the cost of the who is involved.
loss. The way to recover loss is to pass the costs on by
increasing the top line. Raising prices to recuperate loss is Sabotage is a reportable threat according to the
a symptom of theft, but not a cure. National Industrial Security Program Operating Manual
(NISPOM). Sabotage must be reported to the FBI. For
Many companies have invested in security staff internal protection, it can be categorized with workplace
focused on identifying and preventing loss. These violence, criminal trespass activities, and industrial
“loss prevention” jobs are oriented on identifying risky espionage or in conjunction with a theft. Though rare,
behavior, observing others, investigating theft, and costs are heavy and expense may fall on the company
finding methods of reducing risk. In retail, they may or the customer. IT tools are available that provide
be secret shoppers; in transportation they may be automated tracking of inventory and information
monitoring cameras and patrolling as guards, or dressed
in business suits advising in board rooms.
Detecting and Preventing Fraud
Information technology (IT) and lessons from business
intelligence (BI) can be applied to detecting and
2. along business practices. These practices can include provide feedback and evidence for use in analyzing and
campuses, apartments, retail, transportation, factories determining actions to prevent this behavior.
and other industries. For classified information, the IT
tool is the Information Management System (IMS). The
IMS is required by NISPOM and can be used to provide Occupational Fraud
up to date status of classified information from reception Occupational fraud is another risk. Whether an employee
to dissemination or destruction. feels entitled to their fair share, is disgruntled or other
reasons, this crime is costly. When involving classified
information, it can be detrimental to national security.
Workplace Violence This crime can be broken down into three categories:
Employee workplace violence makes huge headlines Asset misappropriation, corruption, and fraudulent
for a very good reason. It is shocking behavior with statement. Examples of asset misappropriation include
the most serious events resulting in multiple deaths. fraudulent invoicing, payroll fraud, and skimming
These incidents lead to law suits, low morale, a bad revenue. Corruption can involve bribery and conduction
reputation for the company and leaves families and business laced with undisclosed conflict of interest.
victims devastated. Not all violence in the workplace end In defense contracting International Traffic in Arms
in death. Whatever the level of crime, innocent people Regulation or Federal Acquisitions Regulation violations
are attacked at the work place. The company has several could also fall under fraudulent activity.
obligations. The first includes the legal responsibility
of the employer to protect and safeguard against
Defense contractors face a level of fraud threat.
preventable harm. This includes all those who work in
or visit the workplace. The second responsibility is to Higher costs can occur at higher employee
handle incidents and investigations, discipline and other positions. For example, managers may not be
processes appropriately. It is as important to respect the
sticking product in their pockets and sneaking
rights of all persons involved throughout the prevention
and investigation processes. out the door. However, falsifying travel reports,
creating false accounts, diverting payment and
Human resources managers in defense contractors may
understand the more serious discriminators that could other crimes are more impacting.
be associated “non-hire” criteria. For example, one
discriminator that would prevent a person from getting Fraud is difficult to detect and many schemes can continue
a job would be a history of violence. A highly accurate for long periods of time before they are detected.
and timely pre-employment screening program is vital. Detection can be accidental, the result of a tip, an audit
Another would be specific questions about performance (internal, external or surprise), hotline or as referred to by
during the interview that might indicate propensity for law enforcement. Focus and discipline could be perceived
violence or not being able to work well with others. as the best means to detect fraud. Paying attention to
patterns, verifying paperwork and checking records is time
Employeesʼ may not be the threat. Nature of customers, consuming, but must be performed.
friends and family members could provide risk to the
work place. These criteria could be identified as well. A sound method of detecting fraud involves the input of
Employees who have abusive partners or spouses and employees. Training employees on fraud and awareness
employees who perform in risky environments such as can help detect it early and reduce costs. Some of this
retail must be considered in the risk analysis and data training is already conducted during security awareness
warehouse input. activities. However, instead of just training cleared
employees, the FSO can help reduce fraud by tailoring
Some additional mitigating factors for employee workplace the security awareness to uncleared employees as well.
violence include traditional security methods. Additional
lighting in darker areas, an armed guard, security
cameras and panic alarms do wonders to give employees
a peace of mind as well as help prevent violent behavior.
Knowing security is in place deters the criminal element.
These security measures could be linked in a network to
3. Training increases morale in many ways and creates a all the above threats. Victims suffer greatly financially
team like atmosphere. and productively.
Information technology (IT) and lessons from business
intelligence (BI) can be applied to detecting and
preventing fraud. Employee and hotline tips are most
effective. Computer links could be set up on corporate
sites to allow employees to report fraud. Some methods
could include survey, direct question and answer, or just a
space for reporting.
The audit, hotlines and tips are effective after or during
the commission of the lengthy fraud period. These are
all reactionary events. What about being proactive?
Many companies have the capability to automate almost
everything. Time sheets, accounting, billing, production
and supply chain records are often on a server. Most
require supervisor approval or at the very least have the There are many existing security methods available to
capability of real time monitoring. This information can help companies take the offense against such attack.
be integrated into a company version of a data warehouse Protection takes the coordination, input and involvement
and be manipulated according to the input rules. Specific of all business units and departments in the organization.
habits of employees can be pulled to look for and address It cannot given to the security department alone to
financial inconsistencies. handle, however such actions should be accountable
to one department. Other aggressive measures include
Access control measures such as card scanners, code password protection, rules on internet use, firewalls and
readers and biometrics are increasingly effective. They internet access blocking. These can be regulated with
leave a trail of employee activity and regardless of the convergence concept. Software already exists to help
position all are required to enter information to gain generate and protect passwords on network and stand
entry. Computer keyboard activity can be limited by alone systems. These help ensure not only that authorized
password protection and all media should go through the users are accessing the systems, but they also provide a
security department before introduction or removal. All of basis for auditing. Information technology can track who
this leaves a data trail. Besides employee protection and used which system to access which information. The user
assistance roles, this data can be mined to see patterns leaves an automatic automated electronic trail.
and recognize traits of potential perpetrators.
Companies should have strong firewall capabilities to
protect information from both leaving and entering the
Cybersecurity enterprise system. These firewalls help prevent hacking,
Computer attacks are a huge risk to all businesses. The high-jacking and malicious viruses. The firewall needs
threat of hackers, malicious viruses, and phishing are to be updated regularly with updates. Most importantly,
just a few serious events of which the FSO should be checking and running analysis identifying the threat is
aware. Data can be destroyed, reputations can be ruined, vital. This identification should track where the threat is
and lives can be stolen. These attacks can cripple an coming from, how often the defenses are probed, what
enterprise and could take months or years to recover. the threat using to probe the defenses is, and what times
Businesses should have IT tools to detect and combat this of day are the threats the strongest. Analysis should
type of threat as soon as possible. identify strengths and weaknesses that the adversary is
trying to exploit. When is the IT asset most vulnerable?
Worms and viruses are quickly destroying years of input.
These threats appear innocently enough in the beginning
and when the right time comes, they activate. Threats
continually knock at the internet portal trying to learn
passwords and the inner most secrets to exploit for
espionage, theft or fun. Unprotected systems perpetuate
4. Are our passwords easy to break? How much intrusion
would it take to stop our operations? DETECT FRAUD BY:
Internet discipline is also vital. An enemy doesnʼt have to • Focus and Discipline
break down defenses to wreak havoc, many times they
• Paying Attention to Patterns
are invited in by unwitting victims. When employees visit
unauthorized websites, download unauthorized software, • Verifying Paperwork
transfer data from a home computer or forward corrupted
• Checking Records
email, they can cause just as much harm. Blocking
websites, allowing only IT personnel to upload software, • Input From Employees
and screening all mobile media or preventing all media • Creating Fraud ʻHotlineʼ
such as CDs and other portable storage devices is crucial
to protecting the enterprise.
Protecting the enterprise with security in depth will solve also continue to keep up with technology to analyze and
many problems. This includes previously mentioned prevent the internal and external influences that can ruin
biometric or card reader access devices, alarms and the enterprise. The threats corporations face include:
CCTV cameras. These are available IT devices that are theft, vandalism, workplace violence, fraud, and computer
popular and effective at monitoring employee movement attacks. The role of security to converge traditional
and activity. Vital risk assessment detail is captured in a physical protection with the capabilities of IT systems
data warehouse to better analyze events and proactively is necessary. Tools of IT can provide a great benefit to
mitigate risks before damage occurs. enterprise as a system of identification, analysis, risk
assessment operation security and prevention, astute
Traditional methods of stove piping or traditional IT managers can mitigate risks. ★ ★ ★
security do not produce effective results. Neither does
segmenting business units. When the one department
handles all internet activity, human resources execute the
Jeffrey W. Bennett, ISP, is a former Army officer, FSO and is
laying off offenders, finance department handle all payroll
an accomplished writer of security books and periodicals.
discrepancies and accounting performs all audits, the
His books include ISP Certification-The Industrial Security
result is a broken chain of incomplete activity.
Professional Exam Manual. He is the owner of Red Bike
Publishing (www.redbikepublishing.com).
The willing participation and information sharing could
be better handled in the form of a committee. Each
respective department can do their day to day activities,
but results can be presented to the entire group to help
detect and determine any one of the threats addressed in
this paper.
FSOs and security professionals should continue to make
it a point to study their craft and learn ways to counter
evolving threat. Business intelligence methods should
4101 NW Urbandale Drive • Urbandale, Iowa 50322 • 1.877.386.3323 • www.clearancejobs.com