Monday, November 29, 2010

Government employment overall was little changed in October

The number of unemployed persons, at 14.8 million, was little changed in October. The unemployment
rate remained at 9.6 percent and has been essentially unchanged since May. (See table A-1.)
Among the major worker groups, the unemployment rate for adult men (9.7 percent), adult women
(8.1 percent), teenagers (27.1 percent), whites (8.8 percent), blacks (15.7 percent), and Hispanics (12.6
percent) showed little change in October. The jobless rate for Asians was 7.1 percent, not seasonally
adjusted. (See tables A-1, A-2, and A-3.)
- 2 -
The number of long-term unemployed (those jobless for 27 weeks and over) was about unchanged over
the month at 6.2 million. In October, 41.8 percent of unemployed persons had been jobless for 27 weeks
or more. (See table A-12.)
Both the civilian labor force participation rate, at 64.5 percent, and the employment-population
ratio, at 58.3 percent, edged down over the month. (See table A-1.)
The number of persons employed part time for economic reasons (sometimes referred to as involuntary
part-time workers) fell by 318,000 over the month to 9.2 million, partially offsetting large increases
in the prior 2 months. These individuals were working part time because their hours had been cut back
or because they were unable to find a full-time job. (See table A-8.)
About 2.6 million persons were marginally attached to the labor force in October, up from 2.4 million
a year earlier. (The data are not seasonally adjusted.) These individuals were not in the labor force,
wanted and were available for work, and had looked for a job sometime in the prior 12 months. They
were not counted as unemployed because they had not searched for work in the 4 weeks preceding the
survey. (See table A-16.)
Among the marginally attached, there were 1.2 million discouraged workers in October, an increase of
411,000 from a year earlier. (The data are not seasonally adjusted.) Discouraged workers are persons not
currently looking for work because they believe no jobs are available for them. The remaining 1.4 million
persons marginally attached to the labor force had not searched for work in the 4 weeks preceding
the survey for reasons such as school attendance or family responsibilities. (See table A-16.)
Establishment Survey Data
Total nonfarm payroll employment increased by 151,000 in October, reflecting job gains in mining
and a number of service-providing industries. Private-sector payroll employment rose by 159,000
over the month; since December 2009, employment in the private sector has risen by 1.1 million.
(See table B-1.)
Within professional and business services, employment in temporary help services continued to
increase in October, with a gain of 35,000. Temporary help services has added 451,000 jobs since a
recent low in September 2009. Employment in computer systems design and related services increased
by 8,000 in October and has risen by 53,000 since a recent low in June 2009.
Health care continued to add jobs in October (+24,000). The gain was in line with the average increase
over the prior 12 months (+20,000).
Retail trade employment rose by 28,000 in October, including increases in automobile dealers (+6,000)
and in electronics and appliance stores (+5,000). After reaching a trough in December 2009, employment
in retail trade has expanded by 128,000.
Within leisure and hospitality, a job loss in arts, entertainment, and recreation (-26,000) in October
offset a gain in food services and drinking places employment (+24,000). The food services industry
has added 143,000 jobs since a recent low in December 2009.
Mining employment continued to trend up (+8,000) over the month. Since a recent low in October
2009, mining has added 88,000 jobs.
- 3 -
Employment in manufacturing changed little in October (-7,000) and, on net, has essentially been flat
since May. The industry had added 134,000 jobs during the first 5 months of this year.
Elsewhere in the private sector, employment in construction, wholesale trade, transportation, information,
and financial activities showed little change in October.
Government employment overall was little changed in October. Employment in local government, excluding
education, decreased by 14,000 over the month and has fallen by 123,000 over the past 12
months. The number of temporary decennial census workers fell by 5,000 in October. After peaking at
564,000 in May, there were only about 1,000 temporary decennial census workers remaining on Federal
payrolls in October.
The average workweek for all employees on private nonfarm payrolls increased by 0.1 hour in October
to 34.3 hours. The manufacturing workweek for all employees also increased by 0.1 hour, to 40.3 hours,
while factory overtime was unchanged at 3.0 hours. The average workweek for production and nonsupervisory.

Saturday, November 27, 2010

Notice for Private Security of UAE


                                All things which exist in the earth are not fully secure in every time. We cannot think, what will happen in few moments so man are now alert from these harmful activity. This thinking gives birth of security. Security is the type of work done by guard called security guard. Who protects people, property, information and some special things is in his duty. Likewise today there are many necessary for security in private life and other ordinary life. Many countries are very aware from this thinking so we can give an illustration of private security guard of UAE. We know these countries have their own idea but I want to tell something about Private Security Guard about UAE. I hope you will get some new things from my small idea presented in following articles.
                   Notice for Private Security of UAE
The UAE and its 7 emirates are Abu Dhabi, Sharjah, Umm Al Quain, Fujeriah, Dubai, Ajman, Ras Al khaimah. You are in a Muslim culture that mixes with cultures from around the world. The main role of private security in UAE is prevention. Companies and guards work together to make contacts are met. Immigration law states that you must have a proper visa. Labour law states that you must have a work permit.
                             The PSBD which is unit of Abu Dhabi police is responsible for security licensing and standards. Security companies must be licensed and are responsible for ensuring employees have proper licenes, permites and equipment. Security guards are responsible for making sure they have a current license and that uniforms are worn properly. Security guards must say who they are when asked by someone. They must comply with direction from PSBD inspectors. Security guards have a responsibility to their employers and the public. You will be successful if you provide a good service to clients and the public.
                             Private Security is about protection with a focus on prevention. They protect people, property and information. Private Security can be offered on contact or as in-house security. Private Security is not just guard services, but also the range of other activities. Security can be provided for manmade and natural hazards. There are many methods and tools to provide protection, for both people and property. Site orders are used to give guidance to security guards about requirements at a site.

Roles and Responsibilities of the Security Guard

Notebooks are important things or tools for the security guards. It should be completed in the same way every time. Notebook should b kept when full. Corrections should always be made in a notebook in the proper way. A professional is a person with skills and attitude to do their job the best way possible. Always try and understand how you can be the best guard. Understanding public relations is important to you and your company. Ethics is knowing between good and bad, right and wrong, recognizing moral duties and obligation. Having ethics is a part of professionalism. Causes of misconduct include peer pressure, opportunity, rationalization and frustration. Good teamwork is working together towards a common goal. Remember the importance of good teamwork. Teamwork can happen whether you are working in a group or alone. Remember the 4 ‘C’s of teamwork, collaboration, cooperation, creativity and clarity. Security guards can be judged as to how they wear their uniform, how they behave, their posture and conduct. Ensure that your uniform is always in good repair. And see your supervisor if you need something replaced.
Security guards are expected to remain aware of their surroundings. The key of awareness is knowledge. Problem solving depends on good awareness. Good security awareness prevents crime. Security guards can play a role in crime prevention by being aware, making suggestions, being visible, talking to people, sharing information and writing good notes and reports. Observation skills allow us to gather information that is useful, understand what we have seen and use that information as need. One of the basic roles of security guard is to observe and report. Part of the role of security guard is to asses an event and decides whether it is routine and requires action. Not all observation need to be shared, only those which have an impact on the security of your client or customers. Observation skill can be reactive or proactive. Take notes as soon as possible after event.
Reports are the guard’s way of passing on information. Reports are generally either administrative or operational. Good reports are factual, accurate, objective, complete, concise, clear, correct and well organized. Reports are read by many different people so reports should have an introduction, what the incident was about and a brief summary about incident at the end. A good narrative has an introduction, a body and a summary. Use headings when necessary. Remember 5 ‘W’s and the ‘H’ when writing a report. They are who, what, where, why, whom and Why. Avoid slang and bad language in a report.
An incident scene is any place where an event requiring investigation has occurred, where or not it is a crime. There are three important considerations for security guards in attending an incident scene. They are maintaining scene security, handling evidence, dealing with witnesses. Evidence is use to determine facts, recreate events and identify people or things related to an incident. There are three types of evidence verbal, documentary and real. Evidence should be treated very carefully and not contaminated. It is important to maintain continuity of evidence. Evidence found is a security guard should be documented. Witness to an incident should be identified and if possible, encouraged to wait for police. Witness statement should be recorded in your notebook, with all their contact information. And any worksite can be hazardous. There are 4 considerations is preventing work site accidents :a)know your work site, b)take control of your work site, c)wear and use safety equipment, d)report and document hazards. Hazards to look for are physical hazards, machine hazards, biological hazards and material handling hazards. Always know your work site.
Communicating effectively is very important skill a security guard to have. Effective communication is skill to being able to give someone the right message in the right way to ensure that it is understood as intended. Good communication can be set up by being present and through talking clearly, presenting the right message, speaking confidently and listening. Security guards should not become the centre of attention. Good listening is as important as good speaking; it includes focusing on what is being said, watching the speaker, asking questions and being sympathetic. Things that can break down communication include cultural differences, stereotyping or prejudice, jumping to conclusions, lack of clarity and differences in language. Dealing with difficult people is part of job of being a security guard. There is no single correct answer when trying to dealing with a negative contact. Try to prevent a situation from happening by being willing to help, explain when necessary and not making assumptions about customers. You can turn a situation around by acting professionally, being confident in your work and trying to solve problems before they become bigger.

UAE Law and Legal Authority System

Private security supports the role of the police by making sure it is a safe society. Police forces have many roles in each Emirate it is important for private security to work together with the police. The police should be called when there is an emergency. If the police come to your work site officially, you should obtain information from them for your report. A crime can involve doing something’s against the law or fating to do something the law requires. Shari’ a (Islamic law) is the basis for law in the UAE. Statute or penal law is part of the penal code of the UAE. A crime has legal, moral and material elements. Customary law can also be used to decide disputes law can be either criminal civil law involves disagreements between people or commercial interests. Criminal law can be made up of felonies, misdemeanors, or contraventions. Landlord, tenant disputes are part of civil law and guards guarding property come across this a lot. Punishment in court cusses usually depend on the kind of offence, the seriousness of the offence and the kind of law the offence breaches. Security guards appearing in court should be on time, be prepared and should act professionally. When questioned in court, guards ensure they understand what they are being ask and should always give truthful answers, even if the answer is “I don’t know”. When giving testimony in court guards should always follow the instructions of the judge.
An arrest is a detention according to and under the authority of law. The authority for police and citizen power or arrest is in the penal code. Police have a regular process for their actions at a crime scene and when arresting a person. A person has been arrested when they have been detained against their will; a person can only be arrested when there is evidence a crime has been committed. If a person suspected of a crime refuses to cooperate, they must either be arrested or released. There are four duties required by a security guard if they arrest a person. They are: Identify yourself; tell them the person they are under arrest; tell them are now in custody or if necessary restrain them. If a security guards arrests a person, they must call the police immediately. Police are allowed to search and arrested person and take certain items they find off of them and put in safe keeping. Security guards should make sure they are aware of their company policy on searching arrested persons. Searches should only be conducted if there is suspicion an arrested person has a weapon. If any item is seized as a search, it should be given to the police. The use of force is a difficult decision for a security guard at that time make a note of the points and discuss with your instructor. Not all use of force is illegal. Security guard must be able to justify using force and that force used was reasonable, necessary and not excessive.

Private Security Business Department

DEFINITIONS

The following words and phrases shall bear the meanings assigned to
them as stated below wherever they occur in this Order unless the context
otherwise denotes:
State: United Arab Emirates.
Emirate: any Emirate in the UAE.
Ministry: Ministry of Interior.
Minister: Minister of Interior.
Law: Private Security Companies, Law.
Order: Executive order for Private Security Companies, Law.
Police G.H.Q: Police General Headquarters or Department in each
Emirate.
Competent Authority: the Department or Section that has the authority
to deal with, supervise and follow up Security Companies business, be it in
the Ministry or any Police G.H.Q.
Concerned Party: Licensing Authorities in the Emirate concerned.
Training Course: Security Training program that is approved by the
Ministry.
Definitions
2
Private Security Business Department
Cash-in-transit Vehicle: the vehicle intended for transporting money,
valuables or negotiable bonds ,the specifications and type of which are
identical to those specified by the Order.
Cash Center: buildings used for receiving, counting, putting and keeping
cash money or valuables.
Cash-in-transit Guard: Security guard, who renders, administers or
supervises the service of transporting money, valuables or negotiable
bonds.
Armed Guarding: the existence of a police guard of the Police G.H.Q or
the Competent Authority.
Cash-in-transit Service: the service rendered by the Company through
the duties that the Money-transporting Guard performs.
Study Completion Certificate: the certificate issued by the Training
Institute.
Crew: the guards working in the Cash-in-transit Vehicle.
Test: the test set by the Competent Authority or the Training Institute.
Explosive: any explosive material as per the meaning stated in Firearms,
Ammunitions & Explosives Law.
Firearm: any firearm as per the meaning stated in Firearms, Ammunition
& Explosives Law.
3
Private Security Business Department
Inspector: any person assigned as an inspector by the Competent
Authority and has the authorities of following up, inspecting and monitoring
as specified by this Order.
Training Experience: having a provable level of experience in the field of
delivery, teaching and training once the Competent Authority judges that
there is enough experience to give the approved training.
Security License: the license issued to the Company by the Competent
Authority.
Individual License: the license issued to the Company employees by the
Competent Authority Infringement: any deed committed by the Company
or person that infringes the rules of this Order.
Basic Qualification: the training given to the Company staff to provide
them with a general idea about the work of a Security Guard in the State
and details of their job roles prior to their starting off to do the job they
are entrusted with.
Shackles/Means of putting shackles: any device or means that can
shackle person including handcuffs
Staff: the Competent Authority staff.
Company/Security Company: a security company or institution or
any government body that renders security service alone or with other
activities.
4
Private Security Business Department
Security Employee: the person that is employed or assigned in the
company and performs some private security task.
Security Guard: includes all security guards with all their categories as
stated in the Order who perform, convey, or inspect one or more of the
following activities either with formal uniform or casual clothes on:
A: Watching people, property or information
B: protecting people or property from damage or any other illegal
activity
C: controlling the access to the companies protected
D: preventing the stealing or exploitation of goods, money or any
other valuables.
E: retaining persons who are suspected of committing theft or
exploitation of any goods or money or any other valuables
F: rendering the service of responding to security alarm
G: maintaining order and safety during sport activities, concerts
or any other public events.
Security Trainer: the person who teaches, instructs, trains or gives
specific lessons in an approved course
Security Service: the service rendered by the Company
Security Zone: it includes but is not limited to police departments,
competent police G.H.Q, Central Bank, other banks or any other security
zone as specified by the Competent Authority
5
Private Security Business Department
Legal Respite: all the days determined in the Order shall be counted as if
they were successive; thus they shall include weekends and holidays.
Training Institute: a security training institute, school or center that is
approved and licensed by the Competent Authority
Weapon/Weapons: firearms, explosives, chemical sprayers, or any other
harmful substances or the police truncheon or short stick or any other
thing that is made or intended to be used as a weapon
Work Permit: work permit issued by the Ministry of Labor in the United
Arab Emirates
Contractor: the person, authority, company or establishment that concludes
a Security Service contract with the Company

Thursday, November 25, 2010

Passenger Screening Progress

After more than a decade, two aborted programs, and a false start, the U.S. Transportation Security Administration (TSA) has begun the transition to its Secure Flight internal passenger prescreening program. The change is expected to reduce the nagging inconvenience of false positives, in which innocent travelers are flagged because their names are the same as or similar to one on the national terrorist watch list. Experts, however, say that the critical security risk of false negatives will remain due to the ease with which terrorists could fraudulently obtain legitimately issued government identification.

Passenger prescreening began in the late 1990s with the Computer Assisted Passenger Prescreening System (CAPPS), which assigned passengers a risk score based largely on the extent of their personal business data history—drawing on items such as credit data and frequent flyer program enrollment.

Aviation security consultant Douglas R. Laird Sr., who helped develop CAPPS while head of security at Northwest Airlines, is frank about the program’s greatest shortcoming: an 80-year-old grandmother flying for the first time might receive a high risk score. Laird, however, also points out that nine of the 19 9-11 hijackers were selected by CAPPS for secondary screening, which amounted to inspection of their checked bags for explosives.

Soon after 9-11, the new TSA rolled out CAPPS II, which set the framework for passenger prescreening through this year. Under that program, the TSA provided airlines two subsets of the national terrorist watch list daily, one a “no-fly” list, the other “selectees” who are subject to secondary screening before being permitted to board.

CAPPS II’s greatest shortcoming was its reliance on names as identifiers. That led to the much-publicized problem of false positives, whereby travelers were subject to secondary screening or denied the right to board flights because they had the same name as a person on the terrorist watch list.

A related problem is similar-name matching. A passenger might purchase his ticket under the name Robert Smith at a time when that day’s TSA lists included the name R. A. Smith. Decisions about similar-name matching fell to the judgment of individual airlines, sometimes in consultation with federal authorities. The delays created by that process at check-in quickly became a critical concern to the airlines.

On the recommendation of the 9/11 Commission, the Intelligence Reform and Terrorism Prevention Act of 2004 mandated that TSA assume responsibility for vetting air travelers against watch lists internally. Secure Flight, unveiled that same year, called for airlines to provide passenger names to the TSA, which would vet the names internally and send the results back to airlines. The program, however, stalled for five years as TSA worked to satisfy conditions set forth by Congress.

TSA originally proposed that airlines submit only passengers’ names, and do so no later than 24 hours prior to departure. Under the agency’s final rule for the program, however, airlines must provide each passenger’s name, date of birth, gender, and if available, the ticketholder’s itinerary and tracking data concerning travel records. Information must be provided 72 hours prior to departure, or as soon as possible for travelers who buy tickets after that point.

Collection of data beyond the traveler’s name serves to reduce the incidence of false positives and reduce confusion due to similar-name matching. According to Cathleen Berrick of the U.S. Government Accountability Office (GAO), the decision software will consider similar name matches and incorporate its determination into a passenger’s risk score.

The score thresholds for selectee and no-fly determination fall to the discretion of TSA, which must balance security against the strain secondary screening places on airlines trying to get passengers into their seats, GAO reports. (See related article in the September “Intelligence” department, titled “Streamlining Air Passenger Security Screening.”)

TSA began Secure Flight’s rollout in March with a requirement that passengers purchase tickets for domestic flights under the name that appears on the government-issued ID they will use to check in. In August, TSA began requiring date of birth and gender. At the end of this month, U.S. carriers must provide the same information for international flights. By the end of 2010, prescreening for U.S.-bound international flights, which is administered by U.S. Customs and Border Protection using passports as identity documents, will be folded into Secure Flight, according to TSA.

While these measures may reduce false positives, the threat of false negatives remains, experts say. A would-be terrorist could obtain legitimate government-issued identification through fraudulent means or could use another individual’s ID and boarding pass.

With 2005’s REAL ID Act, lawmakers sought to mitigate that risk by setting minimum standards for state-issued drivers’ licenses that could be used to board commercial airline flights. REAL ID’s unfunded mandate, however, led to a revolt in which 19 states passed laws either dissenting from the measure or rejecting its implementation altogether. After the REAL ID deadline of December 31, 2009, residents of “revolt” states won’t be able to use their driver’s license as an ID for the purposes of commercial air travel; they will need a qualifying ID, such as a passport or passport card.

A pending bill, the PASS ID Act, would extend compliance deadlines; it also originally included language that would prohibit airlines from denying boarding to passengers who did not hold compliant drivers’ licenses. An amended version of the bill leaves the matter at the discretion of the secretary of the Department of Homeland Security, TSA’s parent agency. But it’s unclear whether the bill will pass.

Former Bush Administration Assistant Secretary of Homeland Security for Policy Stewart Baker told Security Management that getting a legitimate, government-issued ID through fraudulent means is still “the most obvious way to defeat our security system.”


Laird, has a slightly different view. He says that REAL ID or no REAL ID, aviation security comes down to reinforced cockpit doors and robust screening of passengers and their bags. “I just don’t trust names,” he says. “I think the most important thing is denying the person getting on the plane an opportunity to commit sabotage.”

The Price of Afghan Security

A recent United States congressional investigation confirmed unsettling reports that subcontractors, which are providing the U.S. Army with critical trucking support for remote combat outposts in Afghanistan, have paid massive amounts of cash to tribal warlords in return for local armed guard escorts and safe passage through their territories.

It may never be known where all of the security payoffs made under the Host Nation Trucking (HNT) contract ended up. Terms such as the “the Taliban” and “insurgents” and “warlords” are used by different people to describe the same entities in Afghanistan. Yet one snippet from HNT meeting minutes, included in the House committee’s report, provides an idea of the problem’s scale. There, a participant raised the issue of how to “stop funding the insurgency [with] what is estimated at 1.6 - 2 million dollars per week.”

Why would an insurgency seek to profit from the resupply of its enemy? “They’ve found a method to raise revenue while making life difficult for the international forces,” says Vanda Felbab-Brown, an expert on Afghanistan’s illicit economies and a foreign policy fellow at the Brookings Institution in Washington, D.C. “They’re quite realistic about not being able to disrupt all the traffic, so why not make money from it?”

Experts agree on the root causes of the problem along Afghanistan’s highways: a military coalition unable to hold territory across the country’s expanse, which is about the size of Texas, and unprecedented reliance on contractors because they are affordable, nimble, and a step removed from direct political accountability.

The potential problems of contracting are exacerbated by the use of subcontractors. Investigators found that a skeleton HNT oversight staff housed at a U.S. base in the country had neither the personnel nor the means to oversee what was going on “outside the wire.” The program’s prime contractors were little more than brokers who subcontracted out actual operations with only one effective condition for satisfaction of the contract: delivery.

U.S. Department of Defense (DoD) rules forbid use of private security contractors (PSCs) in situations where enemy contact is likely, and they limit PSCs to weapons that are no more powerful than standard U.S.-issue rifles and pistols. Congressional investigators found the Army “grossly out of compliance” with these regulations. Investigators found that the local guards assigned to subcontracted convoys frequently brandished rocket-propelled grenades and launchers, while the Associated Press has reported that local guards often take pot shots as convoys pass villages, further alienating the Afghan population from the coalition war effort.

The revelations set in motion an effort by the U.S. military to investigate conditions along U.S. supply chains in Afghanistan, modify procurement processes and contract language, and oversee compliance with both contracts and DoD regulations regarding the use of PSCs.

To that end, the Pentagon has established two new units: Task Force 2010 and, more recently, Task Force SPOTLIGHT to handle subcontracting and private-security issues, respectively. U.S. forces expect “tangible results” from the Task Force 2010 effort this month, such as improved contract procedures, regulations, and direct oversight, U.S. Air Force Captain Joel Harper, a spokesman for the International Security Assistance Force Afghanistan, told Security Management.

Beyond ensuring transparency in contracting and restricting the activity of PSCs, Felbab-Brown says the military can either directly escort supply convoys with overwhelming force or keep paying off local leaders, which she says is to some extent “an inevitable part of war.”

Yet even the best-case outcome of an undesirable situation—security payoffs staying in the hands of regional militias versus getting to the Taliban or al Qaeda—runs contrary to the U.S. counterinsurgency (COIN) strategy that bore fruit in Iraq and is being tested again in Afghanistan. COIN frames counterinsurgency as a competition between insurgents and a country’s government for legitimacy in the eyes of the populace.

Similarly, a secure outcome in which power and the perception of legitimacy are enjoyed by tribes instead of the central government is contrary to the goals of the U.S.-led coalition. Felbab-Brown warns against viewing militia leaders that are pro-government and pro-President Hamid Karzai at any given time as devoted proponents of an Afghanistan led by an enduring central government. They are simply working the system for their own strategic and financial gain, she notes.

Felbab-Brown offers options based on the U.S.-led coalition’s endgame. If the coalition abandons the goal of a strong, sustainable Afghan government and hopes only to contain the Taliban’s control of territory, it could continue doing business with warlords and achieve that end, she says. But she warns that such a compromise is unlikely to result in long-term stability in the country.

She offers a cautionary tale about co-opting tribal militias: During its 10-year war in Afghanistan, the former Soviet Union co-opted and armed tribal militias in its own fight against Mujahideen insurgents. After the Soviets left in 1989, those tribes turned against one another amid ongoing civil war to settle scores old and new. Amid the chaos, the Taliban emerged to power by the late 1990s, primarily, Felbab-Brown says, because they were able to provide security

U.A.E. Scrutinizes Residents for Iran Ties

The United Arab Emirates, a neighbor and trading partner with Iran, is taking a closer look at government workers and foreign residents due to concerns about possible infiltration by Iranian agents, according to The Wall Street Journal.

A directive reviewed by the WSJ indicated that since May, the U.A.E’s internal security service has been empowered to approve or reject all new appointments, promotions and assignments in all government ministries and agencies. Previously only sensitive posts required security clearances, the newspaper reported.

Some civil service workers—both Emirati citizens and expatriates—have been reassigned or stripped of responsibilities, and some private sector workers suspected of ties to Iranian-linked groups like Hezbollah, a Shiite militant group in Lebanon, have lost their jobs, according to the WSJ.

A government official told the newspaper that the possibility of Iranian-linked sleeper cells sabotaging critical sectors such as energy, banking and transportation is a “significant” security concern. A government spokesman, however, said that the May directive was not a response to a specific Iranian threat but was a part of continuing efforts to improve national security.

The WSJ report comes just days before the proposed 123 civil nuclear agreement between the United States and the U.A.E. is expected to come into force. Named for a section of the Atomic Energy Act, a 123 agreement creates the legal framework for American companies to transfer nuclear equipment or materials to foreign countries for civil or peaceful purposes. The U.A.E. agreement, which Emirati officials have aggressively pursued, will likely make the federation of emirates the first Arab country in the Persian Gulf to develop a nuclear power sector.

As reported in our October issue (see “Nuclear Energy Agreement Raises Concerns”), lawmakers at a House Committee on Foreign Affairs hearing in July expressed concerns about introducing nuclear technology into a volatile region, especially given the U.A.E.’s close trading relationship with Iran and questions about the country’s commitment to strengthening export controls to prevent illicit goods from passing through its ports.

At a Senate hearing this month, senators echoed the concerns about the U.A.E.’s relationship with Iran, but, like their colleagues in the House, praised the agreement for “requiring rigorous international inspections and a strict ban on enrichment and reprocessing technology,” according to Abu Dhabi-based English-language newspaper, The National.

The U.A.E. 123 agreement was backed by the Bush Administration and is also supported by the Obama Administration. It will come into force this month unless Congress takes action against it.

How to Secure Sensitive Data

Various laws and regulations, plus good business practice, make it imperative for businesses to protect sensitive data, such as a customer’s Social Security number. But achieving that objective can be difficult.

One challenge has been that many organizations don’t know where their most sensitive data resides within the network. Another is that once an employee accesses data, there are relatively few existing solutions to prevent that employee from sending it through unsecured e-mail or downloading it onto an unprotected USB stick, making it easy to steal or lose.
But one solution, called data loss prevention (DLP), is gaining

acceptance. DLP’s precise definition can vary slightly. In the past, some saw it mainly as technology that scanned for sensitive data across an organization, including in servers, file sharing programs, desktops, and laptops. Others saw it primarily as a solution that could block or automatically encrypt information. Increasingly, though, it’s seen as a combination of the above—and then some.

In the past few years, the products have gotten better at detecting content. Most solutions have traditionally scanned for personally identifiable information (PII), which refers to data such as Social Security numbers, credit card numbers, driver’s license numbers, and birth dates. Newer algorithms are generating fewer false positives and enabling companies to search for ever-expanding types of data. They can spot language referring to subjects such as intellectual property, racism, or sexual harassment, for example.

Customers can set DLP products to search for data based on regulations or laws. At least one vendor, RSA, the security unit of Hopkinton, Massachusetts-based EMC Corp., lets customers scan for California driver’s license information.

DLP can be seen as a more sophisticated, next-generation version of Enterprise Digital Rights Management (EDRM). The latter typically involves a common file server. Individual employees can “lock” documents or applications, usually with a user name and password. But the reliance on employees to take that extra step has been one of EDRM’s chief weaknesses, says Scott Crawford, a research director at the IT consulting firm Enterprise Management Associates (EMA) of Boulder, Colorado. Some vendors are considering coupling the two solutions, providing EDRM with automation and a more centralized administration.

Vendors are also increasingly bundling endpoint protection into their broader DLP suite solutions. Such technology can keep employees from copying sensitive data onto removable media.

Aside from DLP, another relatively common business use for scanning technology is for purposes of e-discovery, related to legal matters. Another use is for life-cycle management, which frequently involves shifting data among locations, often into storage.

Most DLP customers have been mid- and large-sized companies. But small organizations are starting to look at the technology, says Crawford.

Among the sectors taking this approach are healthcare and financial services. The solutions are also becoming more popular in educational institutions, which typically hold large amounts of sensitive student data.

Following is a look at how two companies phased in different DLP solutions. Their experiences illustrate what is entailed in adopting this approach

Protecting the Nation From a Distance

Since the 9/11 attacks, the Department of Homeland Security (DHS) has focused considerable effort and resources on identifying and combating security threats prior to reaching U.S. shores. The U.S. Customs and Border Protection (CBP) accomplishes this in three ways – screening cargo at its port of origin, screening people at their airport of departure, and biometrically screening people upon arrival in the U.S. These programs allow the United States to address potential threats at their source. These programs also save the U.S. government millions of dollars in inspectional costs as well as saving companies millions of dollars in costs associated with transportation, storage, and fines. Depending on the nature of the business, the entire security operation could be affected by these programs, and understanding how they work is the key to realizing some of the potential benefits inherent in them.

Cargo Screening

The Container Security Initiative (CSI) was established shortly after the September 11, 2001, attacks on the United States by the CBP’s predecessor. CSI is designed to allow U.S. officials to identify high-risk shipments prior to their departure from a foreign port of entry and partner with customs officials at those foreign ports to examine those shipments and pursue intelligence generated by such examinations. According to CBP, 86 percent of all containerized cargo headed to the U.S. is prescreened prior to arrival on U.S. shores. Currently, CSI officers are posted in over fifty-eight foreign ports and eventually will include Halifax, Canada; Buenos Aires, Argentina; Bremerhaven, Germany; Piraeus, Greece; Hong Kong, China; and Dubai, UAE.

There are various requirements and responsibilities established for countries that agree to participate in the CSI program. These requirements were recently converted into federal law via section 205 of the Security & Accountability for Every Port Act of 2006 (SAFE Port Act). Customs officials must be able to inspect cargo “originating, transiting, exiting, or being transshipped” through the country. Examination equipment such as X-ray machines and radiation detectors must be available for such inspections. The Customs organization in the host country must share shipping data and intelligence with CBP, establish programs to ensure integrity of its processes, and must also assess and address port security vulnerabilities. The relationships established between CSI staff and their host counterparts are vital to maintaining the security of both the host country and the United States.

In addition to the numerous security benefits conferred on the United States by such a program, host countries are presented with several advantages as part of their participation in the CSI program. The information and intelligence sharing advantages realized from the United States importing an astronomical volume of goods from around the world are one benefit. Furthermore, should there be a terrorist attack, CSI ports, by virtue of the port security assessments mandated for participation in the program, would continue moving shipments to the United States while a non-participating port likely would not. CSI examinations significantly decrease wait-time for freight upon arrival in the U.S. because it has already been reviewed by CBP officials. Section 205(j) of the SAFE Ports Act authorizes DHS to "treat cargo loaded in a foreign seaport designated under the Container Security Initiative as presenting a lesser risk.”

In a similar vein, CBP also established the Secure Freight Initiative (SFI).The initiative was established by section 231 of the SAFE Port Act of 2006. It is a joint initiative between DHS, the State Department, and the Department of Energy. Current SFI ports include Hong Kong,China; Southampton, United Kingdom; Busan, South Korea; Salalah, Oman;and Karachi, Pakistan.

SFI requires shippers to provide CBP with ten specific data elements relating to their shipments 24 hours in advance of the shipment being loaded for transport to the U.S. As with CSI, shipments bound for the U.S. will be scanned using nonintrusive and radiation-detecting equipment. The scanning requirements, in the case of SFI, are actually statutory in nature, as described in Section 231 of the SAFE Port Act of 2006. The radiation-detection equipment mentioned here is also part of the Megaports Initiative, run by the U.S. Department of Energy. Any problems or issues resulting from inspection with those devices will either be resolved locally by the host country through physical inspection or CBP will advise the shipper not to load the shipment.

Technology involved in the cargo scanning includes Radiation Portal Monitors, which measure the radiation emitted by a container against the natural background radiation. If the measurement suggests the presence of radioactive material, an alert is generated. If an alert is identified, a hand-held scanner called a Radiation Isotope Identification Device is used to try to identify the radioactive material. Large-scale X-ray or gamma ray scanning equipment is used to image whole containers at a time, decreasing the need for manual inspection of an entire container, which could take hours to offload and re-load. Advanced upgrades to these technologies are planned in the near future.

SFI is described by CBP officials not as a replacement for the Container Security Initiative, but an enhancement of it. SFI responsibilities are carried out by existing CSI teams. The focus of SFI, however, is the data transmission and timing. The 24-hour window mandated by SFI allows both the host country and CBP personnel more time to evaluate incoming shipping data and target potential threats, thus enabling those threats to be resolved at a distance rather than on U.S. shores. Consider the scenario of a dirty bomb detonated at a U.S. seaport. The ship doesn’t have to be tied to the dock – it doesn’t even have to be in the harbor. To detonate such a device at the entrance to a U.S. port would have a devastating effect on both the U.S. economy and a substantial portion of the U.S. population. These programs are designed to mitigate the likelihood of such a scenario.

The CSI and SFI programs impact private security professionals in a variety of ways. A security professional involved, for example, in port security operations will likely have to adjust operations based on situations initiated by the operations of the CSI or SFI programs. Containers denied boarding would need to be either stored or removed from the premises. Containers deemed a radiological risk could result in emergency plans being activated for the vessel, seaport, or surrounding areas. Information may need to be obtained, confirmed, verified, or reported by security personnel regarding shipments, the container holding the shipment, the vehicle that brought the container into the port, the individual operating the vehicle, the individual loading the shipment, or the vessel the shipment is being loaded onto.

The information sharing encouraged by these programs may require the security professional to form new relationships or reinvigorate old relationships with government officials involved in these programs. The value of these types of networking relationships cannot be understated: to effectively work with government officials in furthering the aims of these programs may lead to other opportunities for shared training, operations, even a position with the government. Illicit activity encountered in a CSI/SFI-denied shipment may attach criminal or civil liability in either the host country or the United States that a security professional may have to investigate or report on. Security staff, in addition, may be called up on to secure the container in question until it can be relocated, removed, or even seized by authorities.

Dubai as a potential target of terrorism

Dubai, the second largest of the United Arab Emirates and one of the fastest-growing, has been designated a potential target for extremists by several Western governments. Britain's Foreign and Commonwealth Office warns of the risks of travel to the country based on its central location in the Persian Gulf, the nearby hostilities of the Iraq war, and regional anti-Western sentiment.

Other Western countries have issued similar warnings. Foreigners are advised to be vigilant when visiting public places including hotels, restaurants, shopping malls, and entertainment spots where expatriates congregate.

But the booming emirate's central city, with its a la Las Vegas neon lights running along wide desert boulevards, does not give any hint of danger on the ground, and security experts who live and work there see little risk.

"The Emirates are stable enough, well-run enough, well-enough policed, economically prosperous enough, and have competent enough security services to not be an attractive target and not to have the conditions within their own society that foster extremism and terrorism," says James Blount, the general manager of the Middle East region for the London-based Control Risks consultancy.

Local security experts say Dubai has been unfairly tarred by the same terrorism brush that smears places like Yemen and Saudi Arabia. "If you look at those travel warnings in more detail - those from the Australian, U.S., and French embassies, for example - it's actually just a renewal of the generic threat around the region as a whole," says Paul Mercer, operations manager for the Middle East Crisis and Security Consulting wing of Control Risks.

Other experts say terrorists will not target Dubai because they might hurt their own money laundering operations, which benefit from the emirate's position as a hub for finance, commerce, and international tourism.

"I don't think any terrorist organization will conduct any huge operation in Dubai or in the UAE, because it's just like shooting yourself in the foot," says Rabih Fayad, intelligence manager for the Middle East and Africa for International SOS. Money laundering is facilitated by the UAE's status as a major financial center, light regulation of informal banking, and the country's use as a transshipment point for drugs from Southwest Asia.

Politically, Fayad says Dubai does not incite the fury of extremists because it is not viewed as a 'pro-Western Muppet' like nearby Saudi Arabia. "The ruling family is not known to say yes all the time" to Western wishes, he says. Case in point, Dubai refused to allow Western coalition troops to use its facilities during Desert Storm.

And whereas the heavy Western presence in Dubai would seem to make it a juicy target for terrorists, security analysts say the opposite is true based on a lack of indigenous dissent and the high standard of living enjoyed by all.

Dubai is unusual in that its population of 1.3 million people consists mainly of expatriates. The majority hails from South Asia and Southeast Asia, while the bars, restaurants, and offices teem with more than 100,000 Britons and other Westerners.

The relative minority of nationals enjoy a per capita income among the highest in the world. "There is no large section of disenfranchised indigenous people here," says James Le Mesurier, an advisor for Olive Group, a global security risk and management company headquartered locally.

The risk of a terrorist attack is also mitigated by the security measures the emirate has implemented at its borders. In addition, the government has begun shoring up its military, with help from the West. "There is a lot of spending here by the Brits and by the Americans with regard to the UAE armed forces and lots of training," says Stuart Adam, regional security advisor for International SOS in the Middle East and Africa.

Security experts praise the UAE's installation of biometric technology and its overall tight security at ports of entry. "They've got a forward-thinking approach toward the use of technology," says Le Mesurier.

While they are more sanguine than Western governments, the region's security officials do not rule out risk entirely. "When you drive around, you don't think about it, because Dubai doesn't make you feel like you are in the Middle East. It feels benign," says Adam. But, when asked if an attack will come, he responds: "One day it probably will."

Relocating for that Perfect Job in UAE

The UAE is a great place for adventurous and skilled people to relocate to for work. The UAE has an ever-growing economy that supplies great job opportunities to those who qualify. If you are a skilled worker
, you will find big corporations willing to give you highly competitive contracts with great benefits. Moving to the UAE for your ideal job is a great way to further your career
while increasing your income at the same time. Before you take the plunge, here are a few things to consider when relocating to the UAE.

Secure a Job
Before you move to the UAE, you will want to make sure you have a secure job offer. It is not advisable to visit hoping that you'll find job opportunities while you're there. Instead, take the time to research jobs online, visit employment agencies and look into the corporations that interest you. It's important to secure a job first so that you can focus on other aspects of your big move. By having a contract before you go, you will also be able to secure a visa from your company to live and work in the UAE.

Relocating Your Family
If you decide to relocate your entire family, you will need to secure visas for all of them. With a family residence visa you will be able to sponsor your spouse, children or parents to come live with you. Make sure you begin this process well in advance of your move to ensure you and your family meets all the necessary requirements.

Property
Unless your employer has secured housing for you, you will need to look into property to rent. The best way to do this is to start looking after you have arrived in the UAE. Make sure you book yourself into a hotel for a few weeks in order to allow yourself enough time to search for a residence without stressing yourself out. Once you have found your apartment, try to lock yourself into a long lease so that you can avoid any costly future hikes in rent.

Getting Around
For the first couple weeks in the UAE you will likely be reliant on taxis for getting around. However, once you are settled you will want to consider buying or renting a car to help lower your expenses. In order to drive in the UAE, you will need to transfer your current driver's license. To do this, you will need to provide your residence visa, passport, original driver's license and any necessary forms. You will also be required to take an eye exam and pay a fee for the new license.

Relocating to the UAE can be a very exciting experience for you if you make sure to take the necessary steps to secure your job and living situation. Keep in mind that you will be living in a country that is very different from the one you live in now. Make sure you are familiar with the laws and culture in order to avoid any trouble. By being organised and thoughtful, you'll be able to make the most out of living in the UAE and pursuing your dream career.

CCTV Camera for Better Security System

Closed circuit television is commonly known as CCTV. CCTV camera allows us to monitor
and keep track on every activity. We can view and record high-risk areas to prevent theft, control inventory, increase productivity. CCTV allows remote monitoring of parking lots and building exteriors to improve employee safety.
CCTV is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It is different from normal broadcast television in which signal is openly transmitted. CCTV is often used for surveillance in areas that may need monitoring such as banks, airports, major government institutes military installations, and convenience stores. CCTV is generally used for continues monitoring or only as required to monitor a particular event.
Below are some of the applications for CCTV
• Monitoring traffic at traffic junctions
• Keep watch on people at railway stations, airports etc
• Production control in a factory
CCTV applications are endless. Now a days more and more places covered by CCTV surveillance. Now days different types of CCTV cameras are available in market. Below are some of major types of CCTV cameras
• Dome Cameras
• Standard Box Cameras
• Day/Night Cameras
• Hidden Camera
• High Speed Dome Camera
• Wireless Control Camera
The benefits to the installation of CCTV systems are both numerous and practical, and include:
• Reducing potentially insurance premiums upon installation
• Increasing staff productivity
• Identifying criminals
• Monitoring various areas at which you can’t reach
• Deters theft, malicious misbehavior and wreckage
• Constant and consistent surveillance 24 hours a day, every day
CCTV UAE security systems are available for your indoor, outdoor, and even underwater surveillance needs, and one system can be expected to last at least five years. For a small amount of pocket change per day, you can protect your business and know that should anything happen, you can always rely on the evidence from your camera.

Wednesday, November 24, 2010

What's Happening with Dubai?

After several months of suffering numerous criticisms, the United Arab Emirates finally yields to political antagonism. Dubai Ports World has ordered the removal of the facilities from the five ports they have purchased from the United States. Dubai has announced their decision right after the meeting between the Republican representatives in both the house and senate
was concluded. In the private meeting held in the morning, the leaders told Bush that that transaction between the U.S and the United Arab Emirates was destined to fail.

Some business factions said that this mounting paranoia in the U.S Senate could possibly harm future trade investments.This defeat, some warned, may come back and haunt the U.S because it may damage the relationship between both countries. It should be noted that the UAE is an important ally nation of the United States in the Middle East. In an act to save the rapport between the two countries, UAE's Prime Minister Sheikh Mohammed bin Rashid al Maktoum has decided to hand the operations of the P and O Ports North America Inc. to the supervision of the U.S.

Just last February, DP World has announced that they will put their plan to take over the management of six US ports after numerous bombardment of criticisms by several parties. Concerns over the national security of the U.S were voiced out if ever the deal were to take place. It is a well-known fact that the Middle East is home to the terrorist group Al-Queda with some members coming from the United Arab Emirates. Critics who opposed the deal used this as the basis of their opposition, saying that handling the management of the ports to a nation with questionable association to terrorists would compromise national security.

England, along with some officials, defended the deal. They said that paranoia should not be allowed to rule the minds of the people. They added that this is exactly what the terrorists want to happen. Administration officials have repeatedly said that although the management of the ports is going to be handed to the DP World, the national security will still be under the U.S entities' supervision such as the Coast Guard and the Customs of Border Protection.

However, this assurance didn't stop the House to vote in opposition to the deal, and quite overwhelmingly. After reviewing the transaction under the agreed time of 45 days, the House vote resulted in a 62-2 vote against UAE's management of the U.S ports.

According to white house officials, the decision came about after the meeting of the congress and DP World. It has also been said that the senior officials of the administration had no direct involvement in the meeting. Several upper bodies of both governments discussed the issue and worked out a result, which was for the United Arab Emirates-based company to back out. After several weeks of controversy and heated discussions, the conclusion came surprisingly swift. It is still unknown how the company would formalize its departure but DP world would not suffer any substantial economic loss.

Ship Security Services

MUSE PROFESSIONAL GROUP/M.A.P.S specializes in security and protection of all kinds of vessels including yachts, offshore platforms and ships (cargo, large volume of bulk and containerized cargo, specialist ships).
MUSE PROFESSIONAL GROUP/M.A.P.S tasks during passage:
• Advise captains on areas of high risk and recent pirate activity.
• Train crew in anti piracy reactions.
• Carry out on-board lectures, drills and exercises.
• Provide 24-hour watch.
• Provide security communications and security reaction plan for the ship.
MUSE PROFESSIONAL GROUP/M.A.P.S commercial vessel security services
• On-board protection teams who will sail with your vessel or in the areas of assumed or high risk – MUSE PROFESSIONAL GROUP/M.A.P.S can provide either armed or unarmed protection teams to identify the threat, defend and protect your asset. In case of an event these teams can also professionally interact with the shore-based management teams and coalition forces.
• Shipping escort worldwide to guide and protect your asset – MUSE PROFESSIONAL GROUP/M.A.P.S can provide either armed or unarmed escort vessels. All our vessels captains are trained to choose the safest routes for shipping. In case you require an unsafe rout MUSE/M.A.P.S. escort vessels will be useful to your assets as well by high maneuverability, ability to identify the threat, respond to pirate attack and involve shore-based management teams and coalition forces.
• Training programs to train your crew and increase the defenses of the vessel including:
o security awareness;
o anti-piracy;
o ISPS management;
o detection and recognition of firearms, explosive substances and incendiary devices;
o incident rehearsals;
o search technique;
conflict settlement and other.
• Pirate and hijack negotiations – MUSE PROFESSIONAL GROUP/M.A.P.S can provide professional negotiators who successfully handle pirate and hijack negotiations on behalf of shipping and insurance companies.

Yacht Security Services

We realise that the security of VIPs and key executives and their families is of major concern. People owning luxury yachts use military-style technology and trained personnel to fight off potential attackers. The threat of pirates and growing fears that yachts may be their next target have led many owners to apply to the specialized companies that can secure the safety of their vessels. Together with the securing a vessel, MUSE PROFESSIONAL GROUP/M.A.P.S protects the lifestyle of clients, by implementing a combination of regulation, risk assessment, training and the proper use of manpower and technology. The threat should be best avoided and the emphasis is on planning and preparation in order to prevent the event. Applying to MUSE PROFESSIONAL GROUP/M.A.P.S for yachts security services you can be confident in the safety of the owner, captain, crew, guests, and the asset itself.
MUSE PROFESSIONAL GROUP/M.A.P.S can provide highly skilled personnel for overt or covert security duties. Our services include:
• VIP protection;
• advanced parties;
• security escorts;
• maritime environment information and reports;
ISPS management;
• piracy protection;
• designing, installation and maintenance of security technology (including CCTV, Passerelle access control, emergency lockdown, electronic locks and perimeter protection).
All related MUSE PROFESSIONAL GROUP/M.A.P.S personnel is highly skilled and is trained in martial arts, threat assessment, protocol, etiquette, etc. And many of them possess special skills including languages, medical, child protection, anti-piracy, etc.
MUSE PROFESSIONAL GROUP/M.A.P.S will provide discreet, confidential security services for vessel-owner, captain and guests alike.
MUSE PROFESSIONAL GROUP/M.A.P.S considers both long and short-term assignments, including a smooth transition and continued service onto dry land if required.

84 Nepalies Send Back to Nepal

A security services company in the United Arab Emirates (UAE) has laid off 84 Nepali security guards on the charge of putting forth demands, something which it claims was against the law.

The employer, the Critical National Information Authority (CNIA) in Abu Dhabi, laid them off and sent them back to Nepal recently.

However, the returnees claimed that their demands were just, as they were aimed at gaining legality for their work, which included bearing heavy arms that only state security guards are allowed to carry.

“We put forth demands such as recognition for our work, which is similar to that of the UAE´s security forces, as we were required to carry heavy arms while duty and remain inside barracks even when off duty,” Arjun Limbu, a returnee, told myrepublica.com.

“But CNIA laid us off, accusing us of involvement in activities against the law of the land.”

The returnees were employed by the company along with more than 500 other Nepalis from as far back as 21 months ago, through the Emirates Gateway Security Service (EGSS) - an UAE-based recruiting agency.

They said that they were forced to carry modern weapons like the M-4 rifle while guarding sensitive establishments such as gas mines, industrial complexes, the CNIA headquarters, arms storage facilities and water storage.

They claimed that only state security personnel are allowed to carry such sophisticated arms. The international training agencies Asian Global Technology and Olive Group had provided arms training to the Nepalis for three months before they joined the company.

The workers had also demanded a pay hike, medical insurance and other benefits from the company. They served as ordinary security guards and were receiving 1,300 Dirham to 1,600 Dirham per month under a three-year contract.

The laid-off workers registered a complaint at the Department of Foreign Employment (DoFE) two weeks back, demanding that the government stop issuing fresh permits for working for the company that handed out the pink slips.

According to DoFE, Ahmed Ali Al Shehhid, general manager of EGSS, wrote to DoFE recently informing that the Nepali security guards were not respecting the law of the land, leaving the company no option but to repatriate them. DoFE has inquired with the Ministry of Foreign Affairs about the legality of deploying workers as a security force and compelling them to carry sophisticated arms just like security personnel.

“We are consulting legal experts about the legality of deploying Nepali workers in security personnel-like roles in a foreign land,” Mohan Krishna Sapkota, director general of DoFE, told myrepublica.com.

Most of the workers employed in the UAE company were defectors or retired personnel from the Nepal Army, the Armed Police Force and the Indian Army.

EM Systems

The following products are compatible with all standard EM Systems. S A Secure can provide any label for any application. Please contact us to discuss Source Tagging as well as custom label design.

Strips for Books
Tail-Tag is a double-sided adhesive strips with tails. The tag is used for paperback books, journals, magazines and some hardcover books.Tyvek™ backing helps to conceal the security strip. Longer tails provide easier, better handling and tails don't stretch.Our most popular library book tag product is the 165mm tail-tag. This ultra slim, double sided adhesive strip is designed to be inserted between the pages of books and journals.Extra-long release-fabric ‘tails’ facilitate the easier insertion of the adhesive strip deep into the gutter, making visual detection by thieves virtually impossible.Our tags comply entirely with long established international defacto standards for EM library security tags, and are entirely compatible with all non-TagitTM systems and tags.The fundamental benefit of EM tail-tags is that they can be switched on and off; i.e. activated and deactivated on an indefinite basis. This makes them ideal for lending library operations where legitimately loaned books have their security tags de-activated at the service counter prior to leaving the library. If you wish to protect ‘reference only’ media, we supply a range of non-deactivatable security tags, ideal for these applications. So, whether you have a lending or ‘reference only’ library, whether you want to protect books, CDs, DVDs or magnetic media etc., TagitTM has a quality solution to meet your needs.

CDs and DVDs

CD/DVD, MM/EM Security Label, composed of a one-part circular label that is applied directly to the CD or DVD. For maximum label detection, two MM security strips are adhered at right angles to the underside of the self-adhesive. This allows for better detection than the typical parallel strip placement. The label can be applied to any CD or DVD with single sided data recording.

Videos & Audio Cassettes

MM strips for Videos and Audiocassettes, as well as a wide variety of security strips to protect VHS and cassette tapes. Finishes include solid black that can be applied to the outside of the case or inside the video flap. A pre-printed "Please Rewind the Tape" message can be printed to disguise the security strip. Strips are applied in a single-step operation and fit above "Title Label" without obscuring the title

Reference only

We can also supply a wide selection of security strips that do not desensitize. These strips are used to secure reference materials that are not to leave the library.

Source Tagging

In the supply chain, source tagging, (the process of applying EAS labels to products or their packaging during the manufacturing process), can play an important part. Many high street chains insist on receiving their manufacturer’s or supplier’s products, pre-tagged and ready to be placed directly onto the shop floor for immediate sale or loan if a library, with the added benefit of faster replacement of dwindling stock.

For the retailer, by placing the onus on the supplier to pre-label their products at source there is the possibility of a double saving:-

Cheaper manual labour costs particularly when using overseas suppliers

Incorporating the cost of tags/tagging within the product/packaging specification.

Tuesday, November 23, 2010

Guards' Powers of Arrest

To make a citizen's arrest, a guard must witness a criminal offence on or in relation to the property which they are authorized to protect (for example breaking and entering or vandalism). They may also make a citizen's arrest if they see someone run from a person who has authority to make an arrest, such as a police officer.
If a guard makes an arrest, they must:
• Identify themselves as a security professional,
• Take physical custody of the person,
• Inform the person that he or she is under arrest,
• Tell the person why they are being arrested,
• Inform the person that he or she has the right to legal advice, and
• Hand the person over to the police as soon after the arrest as possible.
If a guard suspects that a crime was committed and wants to ask questions, they have no power to keep the person on the premises. This means they cannot search someone without the person's permission (informed consent) or unless they have conducted a citizen's arrest. Informed consent means the person who gives permission knows the consequences of their decision. Informed consent can also be a requirement for gaining entry to a private event such as a rock concert or a sporting event.
In the event of a citizen's arrest, a search should be limited to a pat-down for weapons or for evidence that relates to the reason the person was arrested.

Dealing with the Public and Cultural Diversity

Security companies are service businesses and security guards play an important role in delivering a quality service. Providing a service means doing something a customer wants, in a way a customer wants in done. A security guard has 3 customers: a) primary client, b) people who deal with the primary client, c) the public. Client needs and expectations of security include security, assistance, knowledge, problem-solving and a positive attitude. Good customer service by a security guard can make the difference between keeping a security contract and losing it. Exceeding service expectations means being consistent, being positive, remember that image is important and being customer-focused. Providing good customer service dose mot mean letting security standards drop. Customer service includes participating, being patient, being polite, remaining calm and handling complaints appropriately. While on a site, you may be asked to perform tasks which are not directly about security. Understand the six considerations if your customers request that you provide a non-security task and make a note of them and discuss with you instructor. Don’t let a non-security task distract you from providing good security but always consider that it is good customer service if you can safely do so. Security is a service business it must always be balanced against customer service.
The UAE is a culturally diverse country. 85% of residents are expatriate. As a Muslim country, behaviors acceptable elsewhere, such as public drunkenness and swearing in public, are not tolerated. Prejudice is pre judging someone or something because of an internal belief. Discrimination is treating some people different form others on the basis of race, religion, gender, or ethnic background. Stereotyping is an individual behavior that makes assumptions about people or cultures as a group.

Protecting Property

Protection of property and client assets is one of the basic duties of a guard. Perimeter protection can include man-made or natural barriers. Moat property protection is either perimeter, building, space area, or object protection. Windows and doors can have different levels of protection. Access control is controlling the movement of people, vehicles, material and information into and out of a site. There are a number of reasons why access is controlled. Access can be controlled by physical systems, guards, or a combination of both. Guards should be familiar with their site policies regarding access control and be aware of their response to common access control situations. The 2 basic requirements of personnel access are determining identity and determining level of access. Identification shown to by a visitor may not necessarily be in the form of an ID card. Guards may be required to make sure there is a sign-in/sign-out log at their site. In handling unauthorized access, guards should make sure that they know their site policies and remain polite at all times. There are 3 main responsibilities in controlling vehicle access: only authorized vehicles are permitted, prevent unauthorized equipment and material removal and maintain a log of vehicles entering and leaving. Guards should be aware of the approved vehicle identification at their site. Guard should know the height and size limitations of a vehicle access point. Ensure that a vehicle access point is kept clear for approaching emergency vehicles. Searching is part of the role of providing protection. There are 4 main reasons to conduct a protective search, make a note of these and discuss with your instructor. Searches are conducted for items which are dangerous, stolen, or prohibited. Vehicles are generally searched as required by site orders, when they enter a site and when they leave a site. People and packages are generally searched as required by site orders, when they are carrying something that can conceal a stolen item, when they leave a high security area and when they enter an area and could be carrying something dangerous. Know how to use search equipment used at your work site. A person should only be searched as required by your site orders. If a person must be searched, it should only be done by someone of the same gender i.e.: male-male. Always try and gain cooperation when conducting a protective search. You may be required to store personal property or check identification at the same time as conducting a protective search. If you store personal property as a result of a protective search, always give someone a receipt for their property. The goal of security is to identify and prevent problems that affect your client. Patrol is the most common way of identifying problems. Understand the general patrol responsibilities. Make sure you have the correct equipment and that it is working when on site. There are 5 major types of patrol, make a note of them and discuss with your instructor. Never carry any kind of a weapon unless authorize. Plan your action that you would take in an emergency situation.
There are three main types of alarms intrusion, distress and fire alarms. Most alarms have three major parts, a sensor, a control panel, and an enunciator. Alarm monitoring is typically coordinated in one of three way local, central station and remote. Alarm response is usually the responsibility of a security guard on the alarmed premises. The best alarm response is by a guard prepared foe alarms by knowing what to do in advance. All alarms a security guard responds to should be treated as genuine. A control room con function as the emergency operations centre in the event of a large scale emergency or disaster. An intrusion alarm detects a potential attack on something that is being protected. Intrusion alarms should be treated as a warning that someone is trying to commit a crime, whether theft or damage to property. A distress alarm going off indicates trouble or a change in condition, such as a panic alarm or an alarm that signals faulty equipment. CCTV (Closed Circuit Television) can be a very useful tool for a security guard. It can be used in a number of areas where it is more practical than personal surveillance. Guards should be familiar with the common types of CCTV equipment. Guards should be familiar with the recording retention policy at their site if CCTV is used. Information security includes both theft of hardware and software and the use of those for illegal purpose. Understand what you can do to prevent information theft. Familiarize yourself with the available types of computer hardware and software. The key to information security is to know your area and be vigilant. Security guards may be required to direct traffic as part of their duty or in case of an emergency. Traffic accidents in the UAE must be reported to the police. Traffic control by a person is only necessary if the traffic cannot move on its own or for safety. The priorities at an accident scene are life, safety and danger to others. Accident scenes could become crime scenes.