Risk and Security LLC

Risk Assessments, Training and More

This content shows Simple View

  • Welcome to RISK & SECURITY (and SAFETY)
  • NEW WORKPLACE VIOLENCE PROGRAMS AND ACTIVE SHOOTER ASSESSMENTS AVAILABLE!
  • IT CAN HAPPEN HERE!
  • RISKAlerts Breaking News
  • Hospitals & CMS
  • Safeguard Facilities
  • White Papers & More Info
  • Caroline’s Blog & White Papers
  • Account

March 2014

Prev Month( 1th ) Next Month( 4th )

Loss of Malaysian Airlines Flight Points Out Airline Security Weaknessess

Posted on March 24, 2014 12:02 pm by Caroline Ramsey-Hamilton Comment

Monday, March 25, 2014.

This morning the Malaysian Government stated that based on all their “new”
calculations, they have concluded that Flight 370 went down in the southern

Indian Ocean.

Has terrorism been counted out for this flight – no.   Until the whole story is known,
it will be impossible for anyone at this point to say that this happened because of pilot
error, mechanical failure, bad weather, or anything else.  However, as we watched
the near continuous news coverage of this ill-fated flight, it was impossible to ignore
the many security weaknesses that were revealed as the drama played out, and
experts proposed possible new theories, even alien abduction!

The airlines around the world, and even the Federal Aviation Administration (FAA),
have always maintained their unique security standards, unlike other industries
which have generally accepted security practices that are used worldwide.  This
standardization of security elements has made it easier for multinational corporations
with offices worldwide, to secure their supply chains, ensure improved safety and
security for their employees, contractors and vendors, and, in my opinion,
contributed to making the world a safer place.

Unfortunately, this uniformity and standardization of security practices is not
mirrored in the airline industry globally, and even blatantly ignored by other
airlines, operating in other countries.

International travelers often see the little sign that says something like: THIS
AIRPORT 
HAS BEEN CLASSIFIED AS UNSAFE.  Of course, because these

airports are often the only airport in the country, they are used anyway.

But the fate of Flight 370 has shocked some security experts by uncovering the
lack of security at a respected airport, generally thought to be safe and secure.

For example, right after 9/11, the FAA moved quickly to security the cockpit of
U.S. planes, and keep them locked and secure during flight.  So it was quite a
surprise to have a young girl smiling and telling CNN how she partied with the
co-pilot in the cockpit during a recent flight.   

“The FAA rule sets new design and performance standards for all current and
future airplanes with 20 or more seats in commercial service and all cargo
airplanes that have cockpit doors. Specifically, the rule:

Requires cockpit doors to remain locked. The door will be designed to prevent
passengers from opening it without the pilot’s permission. An internal locking device
will be designed so that it can only be unlocked from inside the cockpit.

Controls cockpit access privileges. Operators must develop a more stringent
approval process and better identification procedures to ensure proper
identification of a jump seat rider.”

As the tragedy has unfolded day by day,  security experts can see vulnerabilities
in the way security controls are both either not required or are not correctly and
consistently implemented on planes around the world.

The “Tombstone Mentality” of the airline industry and civil aviation organizations now
have the tombstones for 370 individuals, and everyone hopes that even though we
don’t know know exactly why this flight went down, we can all see that there are
weaknesses in international security that need to be addressed in the aftermath of
this tragedy.

 

 

 

  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn

  • Categories:
  • accountability
    Airline Security
    Aviation Security Incident
    Compliance
    Controls
    Flight 370
    Risk
    Risk Assessment & Compliance
  • Tags:
  • Airline Security
    FAA
    Flight 370
    loss o flight 370
    Malaysian airlines
    risk
    risk assessments
    southern Indian ocean search

After Action report on LAX Shooting Recommends Risk Assessments

Posted on March 19, 2014 1:26 pm by Caroline Ramsey-Hamilton Comment

The Los Angeles World Airports (LAWA) released the long-anticipated After
Action Analysis on the LAX Active Shooter Incident in 2013.

The 83-page report was written by an independent consultant who analyzed
all aspects of the Shooting incident and includes a list of “Major Observations
and Recommendations.”   The recommendations are “to provide focus for
LAWA’s efforts toward continuous improvement in it’s security and emergency
preparedness programs.  

These areas were highlighted in the report as “7 priority observations that merit
special consideration.

Recommendation 1.1:  Evolve the LAX Security Program to reflect a more
integrated assessment of security risk and provide for the ongoing development
and management of mitigation measures.

Recommendation 1.2:  Based on the RISK ASSESSMENT and updated security
plan, consider the focus and structure of security functions to determine whether
realignment and integration are needed.

Recommendation 1.3:  With the benefit of recent vulnerability and risk assessments,
take a risk-based approach to evaluating current security programs and explore
intelligent use of technology.”

Once again, doing frequent Security Risk Assessments and managing the security
program and enhancements to follow the recommendations of the Risk Assess-
ment are the first recommendations in the After Action Analysis of an Active
Shooter Incident.

In my experience, in most organizations, Facility Security Risk Assessments are
not conducted correctly, are not reported to senior management, and not used as a
tool to ADJUST AND FOCUS the security program based on RISK.

Why aren’t security risk assessments done more often?  

1.  People don’t have the right expertise to do a full risk assessment.

2.  Security managers view Security Risk Assessments are too difficult
     to undertake.

3.  Law enforcement personnel still do not understand the concept of risk 
     assessments and instead, tend to rely on checklists of controls or
     security elements, rather than integrating all the information to
     create a true Risk-Based model for security.

The solution to this problem is to use affordable, easy to use software tools, like
the Risk-Pro Application for Facilties Security Assessment  and their Risk-Pro
Application for Active Shooter Incident to simplify the process of doing more
frequent risk assessments and using them as a management tool to focus
security so it will be able to recommend the security enhancements that are
needed, and not only how MUCH to spend, but actually dictate the order
of necessary controls.

Far from being a boring, intellectual exercise, well done security risk 
assessments can dramatically reduce the possibility of an active shooter
event, and also mitigate the many negative consequences that come
from such disruptive incidents.

 

 

 

  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn

  • Categories:
  • accountability
    Active Shooter
    Active Shooter Assessments
    Active Shooter Training
    Automating Threat Assessments
    Facilities Security
    Hospital Active Shooter
    return on investment
    Risk
    Risk Analysis
    risk assessment
    Risk Assessment & Compliance
    Risk Assumptions
    RiskAlert Incident Report
    Security Model
    Threat Assessment
    Uncategorized
  • Tags:
  • After Action Analysis
    LAWA
    LAX Shooter
    LAX Shooting
    Security Risk Assessment
    threat assessments

Putin Analyzes his Risk on Invading Crimea

Posted on March 3, 2014 9:40 pm by Caroline Ramsey-Hamilton Comment

The invasion of Ukraine’s Crimea region by Putin’s “un-labeled” troops
illustrated two major principles of a Risk Assessment.   

    #1 – Secure your Critical Assets First

It’s not about the citizens of Crimea, not about the Ukraine wheat fields, or
even it’s use as a pipeline pass-through area.  It’s all about the Black Sea
Ports.  These ports 
are absolutely critical to Russia (and also to PUTIN
– the EGO), because they 
are a critical place to ship gas and oil from,
and they also give Russia their 
only access to the Mediterranean,
in case Putin urgently needs a gelato!

The second principle of a risk assessment is

    #2 – Analyze all the Potential Threats

I read a great article over the weekend about how Putin had sized up the
EU and the European bankers, and calculated that the threat of any interruption
of the Russian-European banking relationship was zilch – zero.  Bankers are
not going to reduce their profits by refusing to do business with Putin.

The next potential threat is U.S. retaliation or sanctions.   Putin correctly
calculates that the US didn’t get out of Iraq and almost out of Afghanistan
to immediately send any boots on the ground to Crimea or eastern Ukraine.
We can threaten to curtail his trips to Vegas and Disneyland, but the U.S.
is not going to start a war over this.

Putin did his risk calculation and decided that his chance of getting in any
serious trouble was VERY SMALL and his potential gain was VERY HIGH:

1.  He gets to look like a tough guy again.

2.  He gets lot of media attention from the whole world (doesn’t care what
media writes about him, as long as they spell P*U*T*I*N  correctly and
gets him back on the world stage again.

3.  And, the clincher is that he can pull the troops out anytime he wants,
send them 
back home, and no real harm done.

But I did pay attention in my history class, and I am hoping out loud that
we are not on the precipice of another war!

  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn

  • Categories:
  • accountability
    risk assessment
    Risk Assessment & Compliance
    Risk Assumptions
    RiskAlert
    RiskAlert Incident Report
    Security Awareness
    Security Model
  • Tags:
  • Caroline Ramsey-Hamilton
    Crimea
    invasion
    Putin
    risk assessment
    threats
    Ukraine
    www.caroline-hamilton.com

  • Recent Updates

    • 4 Nurses were Awarded a $ 7.8 Million Dollar Settlement, after they were attacked in 2017 at Northwestern Medicine Delnor Hospital
    • Four (4) Dead in Shooting Rampage at Mercy Hospital, Chicago. Victims included Young Police Officer, an Emergency Room Doctor, a Pharmacist, and the shooter. Witnesses Report Total Chaos as the Doctor’s ex-Fiance Attacked and Killed Her
    • Chicago Hospital Ordered to Pay More than $10 Million Dollars to a Female Doctor and 6 Nurses who Filed a Lawsuit for Two Separate Harassment Incidents Including Being Choked by a Doctor, and Another Doctor who installed a Toilet Cam in the Women’s Locker Room
    • A Hospital Employee at Kadlec Regional Medical Center came back to the hospital on his day off, threatening to kill other employees and himself. Other violent attacks on staff have also occurred recently including choking of a nurse in the ICU!
    • PHYSICIANS WANT TO CHANGE HOW HOSPITALS AND CARE FACILITIES RESPOND TO AN ACTIVE SHOOTER – MASS CASUALTY EVENT
  • Recent Comments

    • Archives

    • Categories

    • Meta

      • Log in
      • Entries feed
      • Comments feed
      • WordPress.org

    ©2025 Risk and Security LLC Entries (RSS) and Comments (RSS)  enough Theme  

    top

    Prev Month( 1th ) Next Month( 4th )