Private and Public Security Prepare globally for a flood of life impacting or deadly incidents.
The following article was published on the 24th of September. A few days later, the assassination of Hezbollah leader occurred. There has been a call for 5 days (28th September) of prayer besides the call for revenge. HEADS UP FROM 2ND October!!!!
#HeadsUpSecurity #SecurityMangers and #SecurityTrainers should be able to identify the Hezbollah and Israel Flags. The reason why is simply because the #HezbollahIsraelWar has a high probability of playing out worldwide.
#DontForgetHamas Call for Jihad Military-Styled a month ago or so!
The question to ask is why should all public and private security be made aware? #WhatToDo
1. There may be private sector security protecting sites that may be manufacturing or distributing items to either party. These sites could be earmarked and targeted for distinct reasons.
2. Identify insider threat or visiting threats!
Workers of Visitors that sport the flags display their intentions which could be for peaceful purpose or for the death and destruction of a specific group of people.
3. People displaying the Lebanese Flag may not be a threat. This is a religiously motivated war.
4. Weapons to consider. Suicide Bombers, guns and knives besides active assailants using any form of vehicle.
What to do (Technologies and Workforce)
Investigation Management Incident Management and Emergency Management.
1. Perimeter Security: Strategically layer physical security using the necessary equipment.
2. Technolgies such as video content analytics to identify weapons, mob formation, mask (facial covering) detection, or any other relative human behaviour of concern for example, ‘person down’ (specially on perimeter).
3. Explosives detection, X-Ray machines and metal detectors are necessary even at childcare centres, schools, universities, hospitals and places of worship besides businesses owned or run by any religious group of people, be it Christians, Jews or Muslims.
4. Security could identify the insider threat using OSINT for specifics be it flags, clothing or language. Once identified, one would need to determine if the person or concern is working on their own mission or in concert with others voluntarily or under duress. (See HIM Tool)
5. Emergency Protocols and Drills. Within the HIM Tool do find the suggestions of content analytics that could be used besides protocols for emergency management. Regardless, different sites have their own emergency protocols for their field of interest that could override the HIM suggestions or some may find the HIM suggestions unique and usable in all fields of interest.
All these topics and more could be security briefed on this link https://lnkd.in/exVDWRvF
#SecurityCriminologyRiskInvestigation #InvestigationManagement #PrepareIncidentManagement #EmergencyManagement and #CounterTerrorism