Вы находитесь на странице: 1из 28

www. secu reroi.

com

SECURE

december 2005 • issue two

Perfect
Practice
In order to provide significant value and return on
investment (ROI) for the pre-employment screening
program, proper policies and diligent management
must be in place.
SecureROi n December 2005 3
inside…
features
15 Perfect Practice
In order to provide significant value and return on
investment (ROI) for the pre-employment screening
program, proper policies and diligent management must be
in place.
DECEMBER 2005 By David Saddler
V o l u me I , N u mber I I

Dave Saddler
publisheR
19 Channeling ROi
EDITORIAL As the Security Director for Comcast Cable
Communications, Midwest Division, Ron Hnilica
DAVE SADDLER
has learned the importance of demonstrating ROI.
EDITOR
By Ron Hnilica
JOE RICCI

22
Managing Editor

Susan Clark BluePRints of Success


Managing Editor
A term often used in law enforcement is force
ART & DESIGN multiplication. It refers to the ability, mostly through
technology, for officers to stretch resources, be in more
Jacki Silvan
places than one and have a positive impact on the
Art Director ability to protect and serve.
KIM WITT By David Saddler
marketing assistant

ADVERTISInG
Dave Saddler
publisheR
newsflash 6
301.613.0740 No Consensus on FEMA Focus
dave@secureroi.com Animal ID Fights Agroterrorism
DHS Awards More Than $15M
Efforts to Tighten Borders Continue
Published six times a year. Executive
offices at 12154 Damestown Road,

10 techrules
#615, North Potomac, MD 20878.
SUBSCRIPTION: $295 one year.

The Perils of Wireless Networking


POSTMASTER: Send address Fencing Out Malicious Code
changes to SecureROI, 12154
DOT’s Security Off Track
Darnestown Road, #615, North
Potomac, MD 20878 Quick Bytes

newmarket 25
© 2005 Cloud Concepts, LLC

4 SecureROi n December 2005


SecureROi n December 2005 9
12.05

newsfl
g o v e r n m e n t ag e n c i e s

No Consensus on FEMA Focus


Even before the Feder al E mergen c y M anage men t Agen c y (FE MA) was deluged with criticism for its poor
handling of the emergency response effort after Hurricane Katrina, a plan to drastically reorganize the agency had been put forth by
Department of Homeland Security (DHS) Secretary Michael Chertoff.
Under that proposal, which is a part of the total restructuring plan for DHS, FEMA would be tasked solely with response and recovery. The
preparedness functions would be consolidated under a new undersecretary for preparedness, who would be responsible for facilitating grants
and overseeing nationwide preparedness efforts, including telecommunications, cybersecurity, and critical infrastructure. Both the director of
FEMA and the undersecretary would report directly to Chertoff.
The proposed reorganization, which leaves FEMA under DHS,
falls short of some critics’ recommendations that FEMA be given
back the independent agency status that was taken from it when
it was merged under DHS. But the integrated approach is still
championed by James Jay Carafano, senior fellow at the Heritage
Foundation and coauthor of DHS 2.0, the report credited with
prompting Chertoff ’s package of proposed changes.
The proposed changes will make FEMA directly responsible to
the secretary, removing the layer of bureaucracy and management
duties that go along with being an undersecretary, says Carafano.
He adds that this move will help the agency better focus on its
historic mission: response.
A tighter focus could also help FEMA respond more efficiently,
says Paul Light, professor of public service at New York University.
“I’d like to see FEMA focus much more tightly on the 36 hours
after an event and then the recovery,” he says.
But some experts question whether splitting up preparedness
and response can work, noting that efficient response to disasters
depends almost entirely on whether preparedness has been
effective.
“We’re facing a structural problem,” according to Scott
Fosler, former president of the National Academy of Public
Administration, which did two studies of FEMA in the 1990s

6 SecureROi n December 2005


ash deterring terrorism

Animal ID Fights
Agroterrorism
Animals bred for consumption in the United States
are often moved with relative ease and with little paper trail.
That lack of documentation creates vulnerability, because if an
after Hurricane Andrew that were used as the basis for the animal becomes infected, the ability to quickly ascertain its origins
reorganization of the agency during the Clinton Administration. could mean the difference between an isolated case and a deadly
Fosler worries that the plans to remove the preparedness pandemic.
function from FEMA will result in less communication. One important step toward implementation of a tracking
Moreover, FEMA should never have been incorporated within system would be an animal identification program. The National
DHS, Fosler says. Restructuring it within that department simply Cattlemen’s Beef Association (NCBA), one of the largest cattle
reinforces a wrongheaded path. associations in the world, is currently working with industry
Carafano, however, says that because the head of FEMA partners to develop a national database that is privately controlled.
Page 6: Illustration: Peter Neu, Dreamstime.com | Page 7: Illustratoin: Scott Weichert, Dreamstime.com

and the undersecretary for preparedness will both report to The NCBA-initiated system will only contain information related to
the secretary, the organizational problems Fosler fears will be animal health, says Kim Essex, vice president of NCBA.
mitigated. National Animal Identification System (NAIS) should be able to
In addition, the preparedness directorate will support FEMA identify and trace all animals and premises that have had contact
with training resources and will continue to rely on FEMA’s with a foreign or domestic animal disease within 48 hours after
subject-matter expertise to advise the preparedness function. discovery.
For first responders, however, the success of the The NAIS program will be instituted in three phases. The first
reorganization will be measured in the amount of funding phase involves the registration of any premises on which animals
available. “Our focus has remained on the need to have both are handled. This is now voluntary, but once NAIS is mandatory in
preparedness and response portions of emergency management 2009, proprietors will have to register all premises with state or
funded properly,” and first responders should have the authority tribal officials. The data will then be reported to NAIS.
they need to get the job done, says Jeff Zack, spokesman for the After their premises have been registered, producers will be
International Association of Firefighters. able to obtain an identification tag, which will be tied to a unique
But maintaining funding and staffing levels becomes much animal identification number (AIN). The AIN, which will be in the
more difficult as bureaucracy becomes more complicated, says datbase, will remain with the animal until slaughter and will be
Pietro Nivola, senior fellow at The Brookings Institution. FEMA used to determine its origin or where it was first tagged.
has had significant staffing and funding problems in the past, says The type of tags will most likely vary from species to species,
Nivola, and its reorganization may not help. but the data on the tag will be consistent, focusing on dates of
While adequate funding is critical, it is hoped that the sale and locations to which the animal has been taken. Cost of the
reorganization will begin to fix the problems that led to the devices will be shared between federal and state governments and
bungled response to Hurricane Katrina. the producers.

SecureROi n December 2005 7


newsflash
found money

DHS Awards More Than $15M


Homeland Security Contracts
awardee amount purpose The number of supplemental
grants given to fire departments
Hebrew University around the country by the
$5.6 million Develop drug against superantigens
of Jerusalem Department of Homeland
Security’s Assistance to
RTI International $1.2 million Early detection of disease breakouts Firefighters Grant Program. The
supplemental funding makes
Rutgers $3.5 million Develop lie detection system nearly $4 million available to
help local fire departments and
University of Mexico $1.49 million For bioterror training/curriculum emergency medical services
programs pay for training
University of programs, safety equipment, and
$5 million Develop homeland security courses
Tennessee response vehicles.

b o r d e r pat r o l

Efforts to Tighten Borders Continue


Spec i ally tr ained border patrol officers have long been is not a panacea, it is a necessary first step toward securing the
authorized to issue removal orders so that illegal immigrants not country’s borders against terrorists. Reforms to the visa program
seeking asylum get deported without a hearing. Called “expedited have made it more difficult for terrorists to enter the country
removal,” the authority previously applied in only three U.S. illegally, he says, and consequently they will be looking to exploit
Customs and Border Protection Border Patrol Sectors across the other vulnerable areas of the U.S. border.
southwest border. It has now been expanded to nine. Mexico and Canada are likely to be the entry point of choice, he
Before the removal order is issued, a senior-level supervisory says. Expedited removal will help ensure that these persons will be
immigration officer must review the decision. People removed deported quickly and before they can commit acts of terrorism.
from the United States under expedited removal are Cutler and Martin agree, however, that the visa exemption for
barred from reentry for a period of five years, but friendly countries must be revoked. Visas are integral to the fight
can apply for a waiver. against terrorism, says Cutler, because visa officials are required
It is one of many attempts to reduce the to screen applicants, and the application itself can provide INS
likelihood that potential terrorists will enter the officials with investigative leads they would not have had otherwise.
United States as illegal immigrants, but the effort The Government Accounting Office (GAO) has also looked at
does not do enough, says Michael W. Cutler, progress at the Department of State, the Department of Homeland
former senior special agent with the Security, and other agencies in strengthening the visa process.
INS and a fellow at the Center for Among the improvements, the GAO says, consular officers at eight
Immigration Studies. “Until posts, including those of interest to antiterrorism efforts, now
and unless we come up with a “regard security as their top priority.”
coordinated system—not a However, the report also cited areas of concern. For example,
piecemeal approach—then the Department of State has not consistently updated the Foreign
we’re not going to be Affairs Manual to reflect recent policy changes. Additionally,
successful in securing our clarification is needed as to DHS’s roles and responsibilities
borders and defending our overseas, and State must also work to ensure that trained staff
country against terrorism,” he says. members with language skills are posted at key consular points
Jack Martin, special projects around the world.
director for the Federation for The GAO found that critical posts in Saudi Arabia and Egypt
American Immigration Reform, were staffed with first-tour officers with no permanent mid-level
says that while expedited removal visa chiefs to provide guidance.

8 SecureROi n December 2005


SecureROi n December 2005 9
12.05

techru
s tay i n g c o n n e c t e d

The Perils of Wireless Networking


Compu ters th at follow their holding a laptop. The homeowner became would be wise to take into consideration
own directives—to the detriment of their suspicious and called the St. Petersburg preventive measures that will head off any
human owners—are a favorite topic of police, who found Smith connected to possible legal problems.
science fiction. If you use Windows XP the Internet through the homeowner’s Windows XP users can do a bit of
and have a wireless card installed, this kind unprotected wireless network. Smith was behind-the-scenes tweaking, says Preston
of sci-fi scenario may not just be fiction arrested and the case is now in its pretrial Gralla, author of the book Windows XP
anymore. phase. Hacks. “You can turn off the Wireless
When you turn the computer on, it Only intent separates a criminal from Zero Configuration service that runs in
automatically looks for and connects to the average road warrior whose computer the background in XP and automatically
the strongest wireless network it can find attaches itself to the nearest and strongest connects you to any nearby wireless
that is not being protected by encryption network, says Thomas J. Smedinghoff, network,” Gralla explains. “With it turned
or otherwise hidden from view, without an attorney with Baker & McKenzie who off, your computer won’t automatically
considering whether you are authorized specializes in computer security issues. search for and connect you to
to use that network. Once connected, the “I think the fact that Smith knew he wireless
computer can even hop to a new network was connected to someone else’s network,
if it finds a stronger one, without asking and apparently knew he did not have
you first. permission to do so, is probably the key
That could lead to trouble, because issue here,” he says. Smedinghoff says that
court cases in the United States and abroad the Florida statute, like most computer-
are firming up the position that if you crime laws, makes it a crime to access any
connect to someone else’s wireless network computer network “willfully, knowingly,
without permission, you could be guilty and without authorization.”
of unauthorized access to a computer While war drivers who look for open
network. networks and provide the information
One case that is still ongoing concerns to others through online maps may
Benjamin Smith, who was charged with be the group most affected
that crime in April in Pinellas County, by the outcome of the
Florida, when a homeowner noticed Smith case,
Smith sitting in a vehicle outside his house average users

10 SecureROi n December 2005


les Organizations need to be
sure that they are making
it clear to employees the
kinds of online behavior
that are considered
unacceptable.

Pros:
networks,” so any decisions on what networks will be connected to will be
made explicitly and solely by the user.
Turning off Wireless Zero Configuration is a fairly easy process. Open
the Start menu and choose Run; in the box that opens, type services.msc
It’s extremely easy to use, and
and then click OK. This will bring up a box showing all the services available
doesn’t require updating each time a
on the computer. Scroll down to Wireless Zero Configuration, select it, and
new threat appears.
choose Stop. In the same box, select Startup Type and change its setting

Cons:
to Disabled, so that the service will not automatically resume when the
computer is rebooted.
Other countries are also beginning to prosecute those who piggyback
onto unsecured networks. For example, this summer, British police
Right now it only works with
arrested war driver Gregory Straszkiewicz for illegally accessing a wireless
Internet Explorer and the Outlook
connection. According to reports by the BBC, he received a £500 fine and
mail program, a problem for the
was given a year’s conditional discharge, in addition to having his laptop and
many Web surfers (myself included)
his wireless card confiscated.
who try to avoid these programs
Companies can learn two important lessons from the Smith and
in favor of alternative browsers
Straszkiewicz cases, Smedinghoff says. “One is that obviously they need
Page 10: © Photographer: Joachim Angeltun, Dreamstime.com

and mail clients. Where to get


to secure their own networks, because if somebody is able to get in almost
it. A limited-time demo can be
accidentally, it’s going to be embarrassing, and could be a real problem if
downloaded from GreenBorder’s
something serious happens.”
Web site. Pricing for the enterprise
Second is that organizations need to be sure that they are making it clear
edition runs about $39 per seat
to employees the kinds of online behavior that are considered unacceptable,
annually.
including accessing another person’s wireless network just because it’s
available and open. “You have to resist that temptation and understand there
are legal consequences,” Smedinghoff says. “For somebody who’s computer
savvy there are a lot of places that are easy to go, but if you’re not authorized,
you could be committing a criminal violation.”

SecureROi n December 2005 11


techrules
step it up

DOT’s Security
Off Track
When the Z otob wor m appe ared only days
after Microsoft released a patch that would have prevented
infection, 700 Department of Transportation (DOT) computers
were infected after a contractor connected a laptop to the DOT’s
w o rt h i t network against the department’s policy. This incident, which

Fencing Out
is recounted in a report on the department’s IT security by
the DOT’s Inspector General (IG), is just one indication that
some federal IT professionals are having trouble in meeting the

Malicious Code challenges of locking down networks.


Here’s another. The IG notes that “about half of all Federal
Railroad Administration computers are not subject to routine
When medic al c rises hit, patients who might vulnerability checks because they are being used by employees
have been exposed to a highly contagious disease are put into who telecommute (or travel around the country) for the majority
quarantine, thus ensuring that they cannot infect the public at of the year.” As is made clear by the Zotob example, these laptops,
large. When the virus is the digital kind, it’s just as important to “if infected with hostile software, could become conduits for
segregate whatever is infected from the rest of the network until spreading problems to the rest of the networks.”
the cause of the infection can be eradicated. The IG writes that the department’s 12 Operating
New software from GreenBorder Technologies creates a Administrations (OAs) were given baseline security standards
quarantine that sits on every computer, allowing users total last year for configuring computers using Windows Server,
freedom to view or download what they like while protecting Linux, Solaris, Cisco routers, and wireless devices. “However,
the computer itself—and the network it’s on—from harm. there is little assurance that these security standards have been
The company’s GreenBorder Desktop DMZ does just implemented due to the lack of enforcement.” For example, last
what its name says; it puts a green border around any content summer the DOT’s Office of the CIO requested the OAs for an
downloaded from the Internet or contained within an e-mail. update on efforts to meet these standards. Only four OAs actually
For example, the Internet Explorer browser has the border, replied, and one of them (the Federal Railroad Administration, or
and so does anything opened on or downloaded from any Web FRA, again) reported that only 29 percent of Windows servers,
site. If you receive an attachment in an e-mail and click on it, and only 17 percent of its computers running Linux, were in
a green-bordered box will open that describes the attachment compliance.
and the IP address it’s being downloaded from. It will come as no surprise, then, to learn that auditors
If you choose to open the file, it will open in the appropriate were able to gain root access at FRA “over a critical file server,
program, such as Word for a document; but that document will desktop computers, and a network switch,” thus allowing them
have a green border around it when it opens, showing that it is to access sensitive data. “Given the interconnectivity among all
still considered unsafe material. If you save it, it will appear with DOT networks, this security lapse also puts other Departmental
a green border around the icon to show its unsafe status. systems at risk,” the report notes.
The program doesn’t prevent you from opening any kind
of file, nor does it prevent problematic applications such as
ActiveX from running. Instead, it allows everything to run
inside a virtualized environment, meaning that there is no
contact with or effect on the host machine. For that reason, no
software or spyware can be surreptitiously installed.
Once you log out, all content is flushed away. This includes
anything illegitimate (such as worms or spyware) or legitimate
(such as a patch). To keep something from being flushed
away, users can designate safe zones whose content is trusted.
This can be done as simply as right-clicking on an icon and
choosing to have the border removed. Otherwise, a document
can be saved so it doesn’t get flushed, but it will remain in its
quarantine each time it is opened.

12 SecureROi n December 2005


Quick Bytes
Password frustration.
How many passwords do you need to remember? A survey
by RSA Security Inc. of 1,700 enterprise technology end
users found that 71 percent had as many as 12, and almost
one-quarter had more than 15. To keep track of these, the
majority of users said that they keep a record on a PDA or a
document on their PC; 19 percent keep a note attached to
their computer or have another type of paper record in their
office.

RFID planning.
The Department of Defense (DoD) is using radio frequency
ID (RFID) tags throughout its supply-chain operations; by
January 2007, all DoD commodities will have these tags. The
Government Accountability Office (GAO) reports that the
Pentagon has identified many of the challenges it needs to
resolve before this can happen but notes that “it has not
yet developed a comprehensive strategic management
approach” to guide, monitor, and assess implementation.

Zero-day approaches.
The time between the disclosure of a computer vulnerability
that can allow infection by a worm or virus and the release
of an exploit that can attack that vulnerability has dropped
from 6.4 days to 6.0 days. Meanwhile, the average time
between the appearance of a vulnerability and the release of
a patch is 54 days. Those statistics, which come from antivirus
vendor Symantec’s most recent Internet Security Threat
Report, are even more frightening when you consider that
1,862 new vulnerabilities were found in the first half of 2005.

A Site to See
Web-page bookmarks are a great way to keep track of your
own frequently traveled Web sites. But how can you find out
what sites are most popular with other people?
Page 12: Illustrator: Pt Lee, Dreamstime.com | Illustrator: Cristescu Valentin, Dreamstime.com

“Social bookmark” sites allow anyone who stumbles


across an interesting site to immediately bookmark it and
then post it to a central Web site to encourage others to visit
it as well.
One of the most prominent of these sites is del.icio.us,
which posts hundreds of bookmarks each day. Posters can
add comments to their bookmarks and categorize them
under any number of different tags, including security,
software, and hacks, that allow other users to search for new
sites in specific categories.
The del.icio.us site also provides a location for saving
personal bookmarks that can be accessed from any computer
so that if you’re on the road and want to visit a bookmarked
page but don’t have your regular computer, you can find the
links easily nonetheless. Best of all, the site is completely free.
Social bookmarking is a great way to find new sites in any
category of interest to you, and that makes del.icio.us. A Site
to See.

SecureROi n December 2005 13


14 SecureROi n December 2005
W ri t t e n b y: d av i d s a d d l er

In order to provide signiFIcant value and return on investment


(ROI) for the pre-employment screening program, proper policies and
diligent management must be in place.

Perfect
Practice
F ormer major league baseball player Dwight Evans, when responding
to a question about preparation and practice, once said, “Practice does
not make perfect, perfect practice makes perfect.” The message was and
is clear to those aspiring to new heights: going through the motions simply will
not suffice.
This approach applies perfectly to how Scott Hewitt, CPP approaches the
overall security program at Ferguson Enterprises, Inc., particularly to the
importance placed company’s pre-employment screening program. In order
to provide significant value and return on investment (ROI) for the pre-
employment screening program, proper policies and diligent management must
be in place. >>

i l l us t r at io n b y: C a ro l i n e C l a rke

SecureROi n December 2005 15


The key is constantly measuring the Former major league baseball
player Dwight Evans, when
also quantifying the program is
essential.
program, with the main goal of showing responding to a question about “In this day and age, it is

the corporate value it provides. preparation and practice, once


said, “Practice does not make
almost impossible for me to
fathom that any organization,
The measurable value is important, as well as the overall management
perfect, perfect practice makes large or small, does not perform
philosophy. A conversation with Hewitt details the management level items
perfect.” The message was and some sort of background check
to consider when creating, or re-examining, a pre-employment screening
is clear to those aspiring to of the people they are looking to
program:
new heights: going through the hire,” said Hewitt. “In this time
motions simply will not suffice. of high litigation, workplace
• Establish criteria to measure and report the value (detailed below). When This approach applies violence and negligence lawsuits,
considered over time, the tangible measurements are staggering; the perfectly to how Scott Hewitt, pre-employment screenings, in
intangibles ones, such as making sure that the company has sound, reliable CPP approaches the overall my own opinion, are vital.”
and loyal employees also have tremendous business impact. security program at Ferguson But simply doing it and doing
• Ensure the appropriate legal review. In any hiring process the legal Enterprises, Inc., particularly to it correctly are two different
team should have input, but especially when using information to deny the importance placed company’s things. Hewitt’s own experience
employment. Also, there are requirements from laws such as the Fair Credit pre-employment screening with Ferguson, a $6 billion, coast-
Reporting Act of which companies must be aware, including how much program. In order to provide to-coast service distribution
history can be brought in. significant value and return on network with nearly 1,200
investment (ROI) for the pre- locations in 50 states, the District
• One size does not fit all. Companies hire a variety of types of employees,
employment screening program, of Columbia, Puerto Rico and
some that may need more scrutiny and examination than others. Every
proper policies and diligent Mexico, is a perfect indication of
business is different; each employee’s risk factor is varied and must be
management must be in place. this point.
managed that way.
A pre-employment screening When he first joined the
• Perform constant management and diligence. This is merely good business program is one that can either company, he discovered that
practice and is expected of most corporate departments. For the program to be totally ignored or potentially a number of the items he was
be truly effective, it must be consistently studied and adjusted. provide a false sense of security. responsible for were backlogged.
• Employ the proper flexibility. The hiring process is inherently subjective. But for those who conduct Had an effective screening
Work with the staff and managers to make appropriate business decisions pre-employment screening, the program been in place, this
on employees to weigh risk and potential. importance placed on constantly situation may have been avoided,
examining the program and thus proving significant business

16 SecureROi n December 2005


Here are the metrics that Hewitt employs:

Annual cost of the program. Costs associated with Costs associated with drug Costs associated with
This includes the vendor contract employee theft. abuse. workplace violence.
and in house personnel time: According to the Association of Hewitt uses statistics published in Hewitt refers to data published in
$260,000 (conducting screening on Certified Fraud Examiners, fraud the Bottom Line, which indicated 1992 that indicated that 100,000
700 to 800 people per month). and abuse costs $9 a day per that each drug abuser costs close to incidents of workplace violence
employee. Based on one year of $7,500 per year. cost employers $4.2 billion. He uses
working days only, a conservative the figure of $25,000 per rejected
estimate for one employee is $2,250 violent person as a conservative
per year. estimate.

ROI model.
Using data from two years ago,
screening issue # rejected associated cost/year total $ saved Hewitt estimated that Ferguson
avoided hiring 158 people (36 from
Theft issues 36 $2,250 $81,000
theft issues, 48 from drug issues
Drug issues 48 7,500 360,000 and 58 from violence, saving the
company $1,888,246 (versus costs
Violence 58 25,000 1,450,000 then of $245,000)) in one year.
Total 158 260,000 (inhouse) $1,631,000

value for the company. increase activity in one area and


Hewitt points out that the decrease it another after diligence
key is constantly measuring the discovered that the information
program, with the main goal of provided was not all that useful.
showing the corporate value it Hewitt practices what he
provides. “This is what the CEO preaches. The quantifiable ROI
needs to see,” Hewitt says. “You is significant to Ferguson, not
have to speak their language and just in tangible measurements,
show that you are a contributor but intangible ones as well.
to the bottom line.” Tangible measurements include
Hewitt contends that there the ones below for Hewitt, who
is an art to proper screening. classifies pre-employment
Relying solely on a Web site reviews in one or more of
with outdated or inaccurate three categories: thefts, drugs we should be doing this. That’s
information or simply relying and violence. The intangible five out of every 100 people that
on references, a credit score or measurements include the you would not want near your
criminal check might increase increased productivity that building.”
risk and, in the end, cost more results from finding the right He also uses these
money. The key is trained employees and what they numbers when new
professionals who understand accomplish due to a thorough branches open or when
what to look for, what questions pre-employment screening Ferguson completes
to ask and how to recognize red program, versus the alternative an acquisition to
flags. from a weak or ineffective convince these new
Because of this, Hewitt out- screening program. managers that his
sources the pre-employment As Hewitt points out, these program is viable for
screening process but also has are significant yet conservative the company. Hewitt
one in-house person to manage numbers. In one recent month, views it as beneficial for
it daily, mostly because of Ferguson did not hire 90 people his department to have to
the volume and impact of the out of more than 900 who were “sell” the service to new
program. This is to provide the screened. Hewitt said that managers. This proves
vendor with guidance on issues generally, he is seeing five out of that the security function
such as when to continue an every 100 people statistically who is as viable as any other
investigation, which obviously should not be hired. corporate function, also
costs more money, or how to This is a significant business contributing to the
react to red flags. Hewitt’s vendor issue. “This is the data I use to bottom line of the
contract was recently adjusted to show when someone asks why business.
18 SecureROi n December 2005
i l l us t r at io n b y: b ri a n c h a se

A s the Security Director


for Comcast Cable
Communications,
Midwest Division, I attempt to justify
the Security Department’s role in
the company by demonstrating a
quantitative return on investment (ROI)
and by the implementation of “value
added” programs.

Channeling
ROI W ri t t e n b y ro n h n i l i c a

I . T h e f t o f S er v i c e
In the telecommunications industry, theft of service by unauthorized
users is a continuing and expensive problem. Not only do cable
(satellite and telephone) companies lose millions of dollars annually
for actual revenues lost as the result of stealing cable signal, but there
is also the additional millions of dollars lost to damaged or vandalized
equipment and the man hours to repair this damage.
This is an area of Security’s responsibility in which a return-on-
investment (ROI) can be quantitatively demonstrated to executive
leadership. At Comcast, we have a proactive theft of service program
that not only seeks criminal and civil remedies for this theft, but
also includes an active audit program to identify unauthorized cable
users and attempt to convert these persons into paying subscribers.
Our Loss Prevention personnel, working through the Security
Department, are trained in proper audit procedures for end-user
(residential and commercial) theft of service. This training >>

SecureROi n December 2005 19


In 2004, Comcast Security and Loss
Prevention recovered in excess of
20,000 cable converters and cable
modems with an approximate value of
$6 million.

includes proper documentation which, if necessary, can be used the issuance and recovery of these cable boxes and modems.
in civil and criminal court proceedings. In addition, our Loss Comcast works with contract cable companies that must follow
Prevention employees are trained by our Sales department on our procedures for reconciliation of cable box (and cable modem)
proper sales techniques so that these unauthorized users can be inventory.
offered, through a low key sales approach, the opportunity to In 2004, Comcast Security and Loss Prevention recovered
become paying cable subscribers. It is not uncommon to convert in excess of 20,000 cable converters and cable modems with an
up to 30% of these identified unauthorized users of cable to paying approximate value of $6 million. In addition, LP investigators are
subscribers. trained through our Sales department to attempt to retain existing
Another area of theft of service that has bee a huge problem for customers (that have fallen behind in payments or who may be
years is the purchase of illegal (“black”) cable boxes, either through thinking of switching to another company for video services). These
magazine advertisements or via the internet. These boxes, often sales by LP investigators result in an approximate 20-30 % retention
manufactured overseas and sold to large American distributors at rate of customers that may have been lost as subscribers.
very low prices, can be connected to an analog cable system and
allow unauthorized viewing of pay-per-view (PPV) and premium I I I . W orkp l a c e Vio l e n c e P re v e n t io n
movie channels without compensation to the cable company. Tr a i n i n g
Security departments for many cable companies often cooperate in In a value-added program, Comcast Security (Midwest Division)
investigations to identify and prosecute these major distributors. has developed a Workplace Violence Prevention (WVP) program
In addition to criminal prosecution, civil suits are filed by the cable for managers and directors of the various disciplines within the
companies against these distributors, often involving settlements company. This program, called the Comcast Crisis Response Team
of $1 million or more. As part of the civil judgment, the courts (CCRT), was developed as a two day intensive training to develop
are ordering the release of the customer list for these black boxes. crisis management skills for Comcast management personnel. The
The cable companies will then pursue individual civil settlements training incorporates Comcast’s existing WVP and harassment
against the purchasers of the boxes. policies, but includes training on dealing with potential WV
Through the Comcast Security departments, it is not unusual situations, warning signs, WV incident management, angry/
to receive $1 to $2 million annually as the result of theft of service distraught employee “talk down” procedures, etc. Over 200 Comcast
programs listed above. managers and directors in the 7-state Midwest Division have
received this training in the past year. Security has implemented
I I . R e c o v er y o f Co m c a s t P roper t y yearly 2 hour refresher training sessions so that these skills learned
Security and Loss Prevention work with the Comcast warehouse in the original CCRT training can be reinforced. An additional
personnel in the recovery of cable converter boxes and cable benefit of this training is that it demonstrates a proactive approach
modems. These are huge capital expense items and can cost a cable to the prevention of workplace violence which can be an issue
company millions of dollars in lost equipment fees. The newest in premise liability, negligence and the “General Duty” clause as
converter boxes, which are a high definition and digital video pertaining to OSHA regulations.
recorder (DVR) combination, will cost the company approximately
$350 per box. Needless to say, if several thousand of these boxes I V. Ho m e l a n d S e c uri t y / Terroris m
are lost, stolen, or simply not returned by customers, the monetary Awa re n ess Tr a i n i n g
losses can mount rapidly. In 2005, in another value-added program, Security implemented
Security works with the warehouse in conducting performance a terrorism awareness training program for Comcast technicians,
audits to verify that proper procedures are being followed in sales personnel and any other employees that spend a good deal

20 SecureROi n December 2005


The newest converter boxes cost the
company approximately $350 per box.
If several thousand of these boxes are
not returned the monetary losses can
mount rapidly.
of work time “on the street.” with Human Resources (HR)
This program is an extension of has probably been the most
“eyes and ears” training that has “valuable” in terms of critical
been used to increase employee relationships that involve
awareness of street crimes, everything from labor relations
especially related to school issues, hostile terminations,
age children. The terrorism and internal investigations of
awareness training program is employees (that violate Comcast
used to train Comcast employees ethics policies) to issues of
to be alert and report potential criminal wrongdoing that result
terrorist activity around critical in criminal prosecution.
infrastructures, shopping The relationship between
malls, sports stadiums, etc. HR (with many employees) and
This program was developed security (the smallest department
with valuable input from the in terms of employees and
Michigan State Police, especially budget) is so strong that these
in preparation for the 2005 Major two groups now have annual
League Baseball All-Star game training seminars together so
and the upcoming 2006 NFL that old working relationships
SuperBowl, both of which involve can be refined and new ideas for
stadiums and events in the city of cooperation can be explored.
Detroit. This program has been For those of us in security,
well-received by the field techs we know that to be a viable part
receiving the training because it of the organization, we must
increases their involvement in the have support of our executive
possible prevention of a disaster, leadership. From the point of
manmade or natural. view of Comcast Security in the
Midwest Division, I can truly say
V. S e c uri t y a n d that the executive leadership of
Hu m a n R esour c es HR is our greatest asset and most
Of all of our value-added influential support group.
programs, the partnership

SecureROi n December 2005 21


i l l us t r at io n b y: s c o t t m a xwe l l

Blueprints
of Success W ri t t e n b y d av e s a d d l er

A term often used in law enforcement is force multiplication. It refers


to the ability, mostly through technology, for officers to stretch
resources, be in more places than one and have a positive impact on the
ability to protect and serve. >>

22 SecureROi n December 2005


SecureROi n December 2005 23
ICUs are financially challenging for health

The Findings care providers. These units account for 25


to 35% percent of operating budgets.
among the clinical findings:

• There was a 25% reduction in hospital mortality The true value for the According the study, ICUs
rate for the ICU patients. implementation of such a are particularly challenging
program would be to study financially for health care
• There was a 17% decrease in length of stay (LOS). and measure the return on providers. Care in these units
investment (ROI) and the account for 25 to 35% percent
• ICU capacity was increased by 20% and thus business value. One great of operating budgets. This is
the ability to provide better care because of the example of this type of business amplified by the budgetary
shortened LOS. study is found in an application pressures from managed care
of real-time data and real-time reimbursements and fixed
monitoring that has little to do Medicare payments. In addition,
among the financial findings: with security or law enforcement, 50–67% of expenditures are
a hospital critical care facility. concentrated in 10 to 15% of the
• A 26% reduction in costs for ICU patients, resulting The Sentara study provides ICU patients, according to the
from a 17% decrease in LOS an excellent example of how a case study. With the ability of
company used technology, well doctors and other health care
• 15% decrease in daily costs of ICU care, known to security professionals, professionals to deal with these
attributable to a 4% decrease in nursing worked to deliver better health care cases with this remote “expert
hours per patient day services to patients and also monitoring”, costs are reduced
to reduce costs and provide and care increased.
• 18% decrease in ancillary cost significant value. After using the digital video
The numbers demonstrate and patient data platform,
• $2,150 per patient financial benefit attributable to that the use of this application where doctors can actually view
lower cost, after adjuring for revenue loss in “fee provides tremendous ROI and vital patient information while
for service” and “per-diem” patients helps the health care provider personally communicating with
meet its many missions, among the patients remotely through
• A $460,000 increase in gross monthly revenue them excellent care provided the video platform, the clinical
due to additional ICU cases. This generated in a timely fashion. The length benefits and cost savings were
$274,000 margin contribution, monthly of stay (LOS) for a patient is dramatic (see sidebar).
critical in the health care arena, This is a prime example
• A $3,000,000 annualized net financial benefit for as insurance often dictates these of the type of technology
the 2 ICUs after subtracting all program costs. parameters. solutions, available to security
According to the study professionals, that can enhance
publicized by VISICU of the businesses mission of a
Baltimore, Maryland for an company. The technology tools
application at Sentara Health are the same, it is the application
Care of Norfolk, Virginia, the that is unique in this instance.
ROI is tremendous. VISICU is While this application is
the application provider, using not for security purposes per
The vast majority of law Since security professionals a program called eVantage. se, the technology, information
enforcement’s capacity to be understand the intricacies of Enrst and Young provided the gathering and management
in more places than one is this type of technology, it would analysis. The technology was is certainly within the realm
real-time, remote video and behoove the security function to utilized in two intensive care of possibilities for a forward
data monitoring. This allows study how to utilize technology units (ICUs) at the Sentara thinking security manager. The
greater coverage for public safety, such as this for business Norfolk General Hospital, where skill comes not in figuring what
without the extra officers or the purposes and to help achieve care is obviously much more something will cost, but in
overtime that a municipality multiple business objectives. In sensitive and demanding. The figuring out, as Sentara did, what
might not be able to afford. The law enforcement, one objective study covered 600 patients who business objectives can be more
technology does not replace the might be to use a number of were discharged in the first readily met. Is there a way that
value of the officer, but enhances officers that could not physically half of 2001 and the data was your security operation can help
that value. cover a certain area to provide compared to the 12 months prior provide core business functions
This concept makes for an a zero tolerance objective for a to the implementation of the and significant return?
excellent blueprint for business. particular event. technology solution.

24 SecureROi n December 2005


newmarket
fire and security integration and designed for tactical use; and the VIP 900, generated threat images to be digitally inserted into
a stationary system for protecting military and a scanned image for training, practice, performance
SimplexGrinnell government installations, arenas, and transit monitoring, and management reporting.
SimplexGrinnell of Westminster, Massachusetts, stations.
has developed a new technology that integrates biometric identification
two products made by Tyco Fire & Security—the privacy filters Ultra-Scan Corporation
Simplex 4100U fire alarm platform and the Software
House C·CURE 800/8000 security management Winsted Corporation Ultra-Scan Corporation of Amherst, New York,
software. The new technology helps streamline the The new Two-Bay LCD/3 Console with Rack will combine its patented ultrasonic fingerprint
crisis management process and improves response Cabinet from Minneapolis-based Winsted biometric technology with the Dynamic Hospital
to emergency situations by employees and first Corporation offers space for binders, CPU, and Suite of products from Bio-Optronics, Inc.,
responders. It also provides post incident reporting rack-mount electronics in a single console. Besides of Rochester, New York. Designed to improve
of video, monitoring, and other life-safety systems extra storage, it features two 21-inch (12U) rack workflow and patient safety, the solution offers
events for analyzing and improving emergency spaces for LCDs as well as a TruForm top panel multiple means of identifying patients and staff as
response. It enables communications from the fire for a large LCD or plasma screen. The consoles a crucial step to reducing patient misidentification
panel to be transmitted to the software through are ergonomically designed to reduce fatigue and and medication errors. A patient’s fingerprint is
a networked or standalone serial data port. improve operator efficiency. The console measures required to match the bar code on a wristband,
While it provides central logging of events, it is 391/2” high x 921/4” wide x 451/8” deep. The top while hospital staff who administer medications
supplemental to the fire alarm system. panel, work surface, and lower cabinets are available are fingerprinted to ensure that they are authorized
in a variety of colors. to do so. Once a patient is enrolled in the system
security shredder using a fingerprint reader, the patient’s medical

Security Engineered Machinery


vertical rack cabinets record is quickly accessed with the touch of a
finger. Personalized wristbands are created through
The new Model 5140C/3 maximum security Winsted Corporation the MedID application and include a bar-code
shredder has a built-in oiling system that keeps the Minneapolis-based Winsted Corporation is offering identifier, biometric identifiers, a photograph, and
cutting blades sharp even under constant use. It an array of new accessories for its Pro Series II specific medical information.
shreds paper to 1-mm x 5-mm particles, meeting vertical rack cabinets, which feature adjustable
requirements set forth in the NSA/CSS 02-01 for tapped front and rear rack rails and gusseted iris reader
paper destruction. Made by Security Engineered horizontal supports for additional strength.
Machinery of Westboro, Massachusetts, the unit Accessories include a vented top panel with a Panasonic Security Systems
cuts in two directions. Photoelectric controls mounting bracket for a cooling fan, a set of four The BM-ET330 iris reader from Panasonic Security
provide for hands-free start and stop. The cutters locking side panels, and a 10-inch cooling fan. New Systems of Secaucus, New Jersey, delivers fast and
are activated when paper is inserted (up to 12 sheets 7-inch wiring spacers offer a place for cables and accurate system enrollment and authentication
at a time) and are automatically shut off when the wires to be routed, keeping the back of the racks using software developed by Iridian Technologies,
material is shredded. The blades will not operate if free of clutter. Removable front and rear doors Inc., of Moorestown, New Jersey. The system makes
the door of the machine is open or the bag inside is allow easy access to all cabling. a template or map of each person’s iris pattern.
full. The shredder operates at a speed of 40 feet per To verify identity an individual simply looks into
minute and has a 11/2-horsepower motor. door prop alarm the reader, which compares the iris pattern with
images stored in the system. It allows one-to-
pickpocket deterrent Dortronics Systems many searches and, compared to fingerprints,
The 7200-PT Series Door Prop Alarm provides requires much less data storage space. The reader
Tecco Corporation an audible alarm if a door is not closed within includes an advanced self-prompting user guidance
Tecco Corporation of Suffern, New York, has a specified time period or is forced open. It can system, tamper protection using 3DES encryption,
introduced the Zip-R-Lock, a twist-snap device also send an alarm condition to other monitoring and an error rate of one per 1.2 million. No
that can be attached to any zipper or bag closure to systems and it can be custom-configured for a physical contact is required, eliminating wear and
deter pickpocketing and casual theft. Manufactured wide range of standalone and system-integrated contamination issues. The unit can be used in a
by Comprehensive Identification Products, Inc., of applications. New from Dortronics Systems, Inc., systems configuration or it can stand alone.
Burlington, Massachusetts, the device allows the of Sag Harbor, New York, the alarm includes a
owner to quickly enter a one-digit code to open dual-voltage power lock that accepts 12 or 24 secure telephone
it, but it visually and physically deters a thief. To VDC, reduced wiring requirements that allow
open the unit, the user pushes the pointer key in installers to use the same wiring as a nonalarmed Nortel Corporation
and rotates it to the correct number; to close, the door, a built-in interface for the company’s 7600 Nortel Corporation of Brampton, Ontario, Canada,
pointer key is snapped back in and twisted in any annunciator/controller, multiple outputs, automatic has introduced enhancements to its Meridian
direction. alarm shunt, manual or automatic alarm reset, and telephone series that meet strict U.S. federal
an LED indicator for instant status verification. The government security requirements for protecting
bomb protection 7200-PT requires fewer switches and is available in highly sensitive information from intrusion and
single or double gang wall plate designs. tampering. The new Secure Telephone offers
Security Intelligence Technologies, Inc. a wide range of security features that prevent
The BombJammer VIP 300T from Security checkpoint screening outside intrusion into government networks
Intelligence Technologies, Inc., of New Rochelle, and safeguard against equipment tampering. It
New York, is a counterterrorism system that Rapiscan Security Products prevents the telephone from being used as a passive
can be covertly mounted inside a trunk or in the The Rapiscan 3D20 from Rapiscan Security listening device when the handset is in the on-hook
back of an SUV. It protects against the use of Products of Hawthorne, California, enables position. It also features positive disconnect, an
remote-controlled improvised explosive devices operators to view three-dimensional images of off-hook visual indicator, a unique serial number
and obstructs enemy and terrorist methods of scanned baggage in real time. It uses the AXIS-3D for quick verification during security sweeps, and
communication. Because it is mobile, it can protect camera system to deliver high-resolution x-ray tamper-evident labeling, and has no hands-free
VIPs in transit, military convoys, sensitive venues, images and offers variable zoom, organic-inorganic microphone.
and fixed installations by effectively emitting a material separation, and Deep Focus image
protective shield of electromagnetic radiation. processing to make threatening objects more
Other units in the BombJammer product line apparent. It allows the user to flip images and toggle
include the VIP 200, which is built into a briefcase between two-dimensional and three-dimensional
and jams radio-frequency-controlled bombs; the views. The company offers optional Threat Image
VIP 600, which is built into a military backpack Projection, a training tool that can be incorporated
into normal operation. It allows computer-

SecureROi n December 2005 25


newmarket
has introduced the Mass Transit Intelligent Video standby battery when AC fails. The core supplies
smart-card readers System, which uses sophisticated algorithms to are HP300ULX, HP-400ULX, and HP600ULX. All
OMNIKEY automatically detect, identify, and signal an alarm are 12 VDC or 24 VDC field-selectable.
when the system detects unauthorized activities
OMNIKEY of Walluf, Germany, is offering high-
performance desktop smart-card readers bundled
within or near the perimeter of a transit facility. integrated security panel
The system continuously monitors and evaluates
with validation software from CoreStreet, Ltd., GE Security
video inputs from multiple cameras in a single
of Cambridge, Massachusetts. The new package
command and control center to alert security of The new ACUVision panel 1.0 from GE Security
is designed to minimize deployment time and
intrusions, abandoned objects, and illegal parking, of Austin, Texas, offers a single-panel platform
reduce the total cost of compliance associated
among other events. Once an unauthorized activity solution for access control, alarm monitoring, and
with Homeland Security Presidential Directive 12,
is detected, the system tracks the activity using digital recording. The single IP solution lowers cost
which requires federal employees and contractors
cameras with automatic pan-tilt-zoom capability. of ownership by facilitation service and support;
to use a single credential to access buildings and
The system automatically alerts security or police. one integrator can install both access control and
networks. Users plug in the reader and the software
The intelligent displays highlight the types of critical digital video. A single database manages multiple
is automatically installed. System administrators
threats that have struck mass transit facilities, recorders and cameras, communicating over a LAN
can configure the enterprise validation software
making it easy for personnel to see the problem. or Wan using the same database. It can consist of
centrally. Users can insert their credentials into
one or many recorders, connected to hundreds of
the reader when they send a signed e-mail, and
recipients with validation clients can validate the network video cameras, each of which can be set up with different
recording criteria. The modular design reduces
e-mail when they open it. Integral Technologies space requirements by providing all power and
Indianapolis-based Integral Technologies is offering terminal connectors in one uniform wall-mount
evacuation notification a new solution to security system integration. enclosure.
Fire Control Instruments DigitalSENTRY Network Video Solutions (NVR)
The new E3 expandable emergency evacuation
offers a pure software solution and is designed to long range reader
accompany and complement the new 16-channel
system from Fire Control Instruments of HID Corporation
NVR turnkey solution. Providing seamless
Westwood, Massachusetts, is a peer-to-peer
integration and open architecture, the solution HID Corporation of Irvine, California, has
network operating at 625 Kbaud that can be
enables consumers to manage IP technology expanded its 13.56 MHz contactless smart-
arranged as Style 4 or Style 7 using two conductor
with existing analog cameras and from a single card reader family with the introduction of a
unshielded wire or fiber cables. The network
management system. self-contained long-range reader that meets
riser includes paging, firefighter telephones, and
international regulatory standards. For installations
input/output capabilities. Expandable and easy
to install, the system incorporates a broad range mpeg-4 codec incorporating parking and long-read-range
applications with access control, the R90 provides
of existing and new components, including fire PI Vision enhanced security via encryption and mutual
panels, repeaters, and displays. It can operate as a
PI Vision of Orlando, Florida, has launched a new authentication. It can read cards up to 18 inches
standalone, a network, or a broadband voice and
enterprise-level MPEG-4 codec. Benefits include away. The reader features a tamper switch,
audio solution.
smaller file sizes to help reduce bandwidth and and all electronics are packaged in a rugged,
hard-disk storage requirements, thus achieving indoor/outdoor housing. Two units can operate
building control cost savings compared to MPEG-2 and JPEG simultaneously at one meter apart for truck and
AMAG Technology encoding. The new codec also offers greater control car installations. Audio indicators include tone
over image resolution, bandwidth, and storage sequences to signify access granted, access denied,
An optional building control module for the
requirements. power up, and diagnostics, while a multicolor
Enterprise and Professional Editions of security
LED flashes from red to green when a valid card is
systems from AMAG Technology of Torrance,
California, allows control of building systems such card printer presented.
as heating, ventilation, and lighting. By monitoring Fargo Electronics
activity from access control readers and motion network cameras
The Persona C30 Card Printer from Fargo
sensors, the module determines whether an area Canon U.S.A., Inc
Electronics of Minneapolis is designed for facilities
is occupied, enabling the security management
that need high-quality plastic ID cards without Expanded audio features, built-in servers, and zoom
software to control devices, such as HVAC devices,
high-security features. It features an easy-to- lenses are the highlights of a new line of cameras
depending on occupancy. Using the module can
load, all-in-one ribbon cartridge to save time and from Canon U.S.A., Inc., of Lake Success, New
save energy and reduce operating costs for heavily
eliminate the mess of complex ribbon installations. York. Both the Canon VB-C50FSi Fixed Network
used building systems.
A card-cleaning roller is integrated into the ribbon Camera and the Canon VB-C50i/VB-C50iR Pan/
cartridge to assure clean card stock and high- Tilt/Zoom Network Camera feature an advanced
locking system quality prints. Users can choose from a single-sided 26X optical zoom lens and a 12X digital zoom for
ABLOY Security, Inc. printer or one that prints on both sides of the card, capturing fine detail from far away. They offer 640-
and an optional magnetic stripe encoder is also by 480-pixel resolution and recording speeds up to
The ABLOY EXEC High Security cylinder uses
available. Each printer carries a two-year warranty. 30 frames per second. Two-way audio features allow
rotating detainer disks to provide an extensive
the cameras to capture, play back, and transmit
number of key combinations for large systems,
including master keying capabilities. Made by access control power supplies two-way audio over an IP network, supporting
teleconferencing and security monitoring. The
ABLOY Security, Inc., of Irving, Texas, the locking Honeywell Power cameras transmit audio data only when sound is
system offers resistance to surreptitious entry,
Honeywell Power Products of Northford, present, thus reducing network traffic. A built-in
resists impressioning, and is virtually pickproof. It
Connecticut, is offering access control power network server can provide viewing for up to 50
offers a high level of key control with its restricted,
supplies with significantly expanded capabilities clients at once.
patented key profiles and key security levels. Keys
in three power output levels with both UL
can be duplicated only with proper authorization.
and ULC ratings for fire, access control, and
All parts are corrosion-resistant and resist wear,
intrusion systems. They feature circuit-breaker
dirt, moisture, and freezing.
battery protection, AC input and DC output
LED diagnostic indicators, AC fail and battery
mass transit video monitoring contacts to aid in supervision, and a
GVI Security Solutions, Inc. built-in charger for sealed lead-acid or gel-type
batteries. They offer a filtered and electronically
GVI Security Solutions, Inc., of Carrollton, Texas,
regulated output, with automatic switchover to

26 SecureROi n December 2005


SecureROi n December 2005 27
28 SecureROi n December 2005

Вам также может понравиться