All posts by admin

The Persistent Threat of Terrorism

Since 2013 there has been 159 homegrown jihadist cases in 30 states. Recent examples of homegrown terror-related incidents cited in the report include the case of a 28-year-old Ohio resident, Laith Alebbini, who was arrested Sept. 5 and charged with attempting to provide material support to ISIS. Also on Sept. 5, 26-year-old Alexander Ciccolo of Adams, Mass., was sentenced to 20 years in prison for the same crime. According to the snapshot, Ciccolo “planned to use pressure cooker explosives and firearms to target places where large numbers of people congregated, such as college cafeterias.” Ciccolo is the son of a Boston police captain.

To read more, click here.

Do I Need to Resubmit a Top-Screen?

There are still circumstances which may require your facility to resubmit a Top-Screen today, even if you have already resubmitted using CSAT 2.0. For example, a facility must report material modifications to its chemical holdings or facility operations, as these changes may alter a facility’s tier. Material modifications may include:

  • The addition or removal of COI at the STQ and concentration
  • Changes to quantity, location, or packaging of a COI as previously reported on a Top-Screen

Facilities are encouraged to report the highest expected quantity and concentration of COI they anticipate possessing over the lifecycle of their operations. By taking this approach, facilities can maintain a more efficient reporting process as they will not need to resubmit a Top-Screen when the quantity or concentration of a COI is reduced through normal operations.

Additionally, CFATS-covered facilities are required to update their Top-Screens on a regular basis, as determined by their tier:

  • A Tier 1 or Tier 2 facility must update its Top-Screen two years after its SSP is approved
  • A Tier 3 or Tier 4 facility must update its Top-Screen three years after its SSP is approved

Let us know if we can help you prepare and submit your CFATS Top Screen and prepare your facility for a Compliance Inspection.

To read about what to expect from a CFATS CI, click here.

DHS OIG Review of the USCG Oversight of the TWIC Program

The Department of Homeland Security’s Office of Inspector General performed a review of the USCG oversight of the TWIC program and found that the USCG “does not have a full understanding of the extent to which the TWIC program address security risks in the maritime environment”.

Report Findings:

  • DHS did not complete the mandated TWIC Program assessment
  • USCG needs to clarify TWIC Reader requirements for industry
  • USCG needs to improve TWIC card verification process
    • USCG completed 33,800 TWIC verifications, but only used electronic TWIC readers to verify just 2,425 cards, or 1 in 15 cards
  • USCG needs to strengthen oversight guidance on TWIC program

The report also lists four recommendation for DHS and the USCG:

  • DHS Under Secretary of Science and Technology complete the TWIC program assessment required by Public Law 114-278 to evaluate the security value of the TWIC program.
  • The USCG’s Assistant Commandant for Prevention Policy take action to more clearly define the applicable facilities that have certain dangerous cargo in bulk and which must implement the use of electronic TWIC readers as an access control measure.
  • The USCG’s Assistant Commandant for Prevention Policy improve the Coast Guard’s use of electronic TWIC card readers during annual inspections at regulated facilities by procuring new TWIC card readers.
  • The USCG’s Assistant Commandant for Prevention Policy revise and strengthen the Coast Guard TWIC Verification and Enforcement Guide.

DHS concurred with all four of the recommendations and stated that the Homeland Security Operational Analysis Center is currently conducting an assessment of the TWIC program. The estimated completion date for the DHS assessment is March 30, 2020.

To download a copy of the full report, click here.

The Adversary Sets the Agenda

Security planning must take into consideration that the Adversary sets the agenda and is better informed when plotting than the security strategist.

The threat adversary sets the agenda.  This is an important and too little discussed reality.

Building occupants, even building security, do not know that an adversary is considering an adverse attack or criminal intrusion.  The building and suite occupants “blindly” implement security measures that are customary and often “cosmetic”.  However, the adversary has an agenda:

  • They have an objective ranging from simple theft of purses and wallets to incidents of workplace violent, including rage killings.
  • They know the “territory” – they have studied and surveilled the building and avenues of access.  They know how ineffective the lobby guard is.  They have a target and a plan.
  • They want to enter incognito – their observations of building activity show they what to do to maintain a low profile.
  • In active shooter situations, they may be suicidal and have no plan of escape, which makes them very dangerous.
  • They will likely identify the same vulnerabilities that have been identified during a security assessment.

Security countermeasures must mitigate these risk as far as is reasonable and possible.  They should be deterred by at least two access-controlled perimeters to complicate their plan and increase their risk of detection.

Watch for our series of blogs on the security assessment process.

Is Your Building/Office Space Secure?

A recent FBI report reveals that a majority of active shooters spend at least a week planning their attack and often attack people and places with which they were already familiar. In the majority of active shooter cases, the active shooter knew and actively targeted at least one of the victims.

In this growing threat environment, employees are expressing concerns about acts of workplace violence and active shooter. The most important security measures for workplace protection are employee awareness training and a fundamental building security program.

A thorough and detailed building security vulnerability assessment (SVA) and report are the first steps in developing an effective building security program to protect people and critical assets. The SVA provides for the foundation of a risk management program.

 The objective of conducting a security assessment is to assess security risks as a means to assist management in identifying and understanding the risks that face the organization.  This assists management in making informed decisions on the adequacy of security and the need for additional security countermeasures to address threats, vulnerabilities and potential consequences.

Contact Don Greenwood & Associates, Inc. to have us conduct a security assessment on your building or office spaces.

TWIC Reader Rule Officially Put On Hold

On August 2nd, President Trump signed into law the Transportation Worker Identification Credential Accountability Act of 2018 (HR.5729).  This formally prohibits the Coast Guard from implementing the Rule until DHS submits a satisfactory assessment of the TWIC program to Congress.

Furthermore, a U. S. District Court (Eastern, Virginia) issued a court order delaying the Rule at certain CDC facilities “until a further order of the court.”  This is in response to lawsuits from several industry groups.

We will track this activity closely and keep you all informed.

Don Greenwood

Preparing for a CFATS Compliance Inspection

Many companies aren’t prepared when they receive a letter from the DHS Infrastructure Security Compliance Division (ISCD) notifying them of an upcoming facility Compliance Inspection (CI). You might have documents that are out of date, or you may be missing the necessary forms. If left unchecked, you could be forced to waste time and money in enforcing corrective actions. When it comes to advising our clients to be prepared, these are the top three tips we give them for a successful CFATS Compliance Inspection.

Review Your Documents

When you receive a notice from DHS about an upcoming inspection, this is always a good time to review your security plan and required documents to make sure that you have everything in order. Also, this is a good time to verify that you have conducted the required drills and/or exercises, and an annual audit of the security plan.

Training Moment

Training is very important for facility personnel and this is a good opportunity to make sure all your training is up to date and to have a general discussion regarding security of the facility. The training can focus on topics that will most likely be covered during the inspection; including access control, monitoring, screening, security personnel (who is the FSO, Alt. FSO?), NTAS security measures, etc.

 Organize

One thing that we recommend and develop for majority of our clients is to have a single security plan binder with all relevant documents and forms. This is a perfect, centralized place to store and secure all the forms and documents that the inspectors will want to review during the inspection. We have had great success with these binders for all of our regulated clients; CFATS, MTSA, TSA, DOT, etc. As we tell our clients, it is best to get the inspectors the requested material in a timely fashion and get the inspection over with as quickly as possible.

Recently one of our clients had a Compliance Inspection that they passed without any issues, “We went through our security plan book while the inspector was here and we were complimented on how all the files were in one book and not in different locations.  We didn’t spend much time with it, because everything was in the binder that they had questions about.”

Let us know if we can help you prepare for your CFATS Compliance Inspection and develop a security binder for you and help you succeed with your inspections.

To read about what to expect from a CFATS CI, click here.

TSA Begins Issuing New TWIC Cards

The Transportation Security Administration (TSA) began issuing the new TWIC NexGen cards on July 10, 2018. The new cards incorporate enhanced security features (click here to read more).

Details about the new TWIC NexGen card:

  • Current TWIC card holders do not need to replace a valid TWIC card with the new TWIC card design.
  • Regulated entities that require TWIC for access will accept and recognize both the current and new TWIC designs until the card’s expiration.
  • The new card design is compatible with qualified TWIC readers.
  • To deter alteration of the card’s expiration date, the new card includes a color-coded expiration date box that will update on an annual basis.
  • The fee for the newly re-designed TWIC card remains unchanged ($125.25) and the credential is valid for five years.

Click here to read more about the TWIC NexGen cards.

Click here for a TWIC NexGen Authentication Guide

New Coast Guard Facility Inspection Form

Effective immediately, USCG facility inspectors are going to start using a new form for facility inspections. The new form, CG-835F, replaces CG-Form 835, “Vessel/Facility Inspection Requirements”. CG-835F is specifically formatted for facility inspections. There are no major changes to the new form or the information collected during the inspection.

Facility owners and operators may start seeing Coast Guard facility inspectors using the new form immediately, but some inspectors may still use the older CG-835 form during the transition.

Click here for a link to the new CG-385F form.