Security in All Forms

We have learned via the news recently that security comes in many forms and fashions; included are risk management and contingency planning.

Ebola. The first that comes to mind is the recent scare of an Ebola outbreak on American soil. I live in the Dallas area, and the news of Ebola has been in all the headlines. Thomas Eric Duncan contracted the disease in West Africa and brought it with him to Dallas, even though reports are that Duncan went through a health screening before leaving the country. At 42 years old, Duncan came to the United States to visit and marry his girlfriend, and be a father to their child, who has since grown up and is making his way through college.

It seems that proper security measures were in place and taken prior to his departure from West Africa. However, I believe that not enough was done in Dallas to ensure he received proper treatment. Duncan arrived in Dallas on Sept. 20, and within five days sought medical care at Texas Health Presbyterian hospital, only to be sent home with antibiotics. He returned three days later with those unmistakable symptoms of Ebola. In fact, two days after being admitted to the hospital, his medical diagnosis was confirmed.

In my opinion, security of a different form should have been taken. Medical staff should have taken into consideration that Duncan had just flown to Dallas from West Africa. This is the first red flag. Security should have come in the form of attacking the virus inside the patient days earlier; however, hospital staff has assured Dallas residents they will stop the Ebola virus in its tracks.

After laying in isolation for 10 days at the hospital, Duncan, a Liberian national, died on Oct. 8, after showing some improvement in his health. His ordeal showed Americans the reality of a plague that was once considered a far-away problem. Nearly 4,000 people have died in what was once just a West African epidemic. I feel bad for Mr. Duncan, his family and those affected by this situation. New medical security measures should be put in place to ensure this never happens again.

No more football. I really love this story pulled from the news in New Jersey. The Sayreville High School football team in Parlin had its season cancelled in early October because there were allegations of bullying, intimidation and harassment among players.

From my youth, I thought this was what high school football was all about, but school officials now see it differently. They already canceled and forfeited a game prior to the announcement of the season’s suspension.

The Middlesex County prosecutor’s office is investigating these allegations, which have been said to be enough to prove incidents of harassment, intimidation and bullying on a pervasive level, on a wide-scale level and at a level that players knew, tolerated and generally accepted.

With this knowledge, school superintendent Richard Labbe said that what has been substantiated to have occurred, “We have canceled the remainder of the football season.” (Where was this guy when I was a high school freshman and sophomore football player?)

The school would not discuss the case any further, nor would the prosecutor’s office, but there is credible evidence to back up the allegations.

As schools today act to add security to district facilities, some of the biggest security problems reside within the halls of the school, or in this case, the locker room.

Riots in Ferguson. Talk about security…Missouri authorities had to draw up contingency plans, fearing that if the grand jury no billed a white police officer for killing a black teen, a riotous battle might ensue. State officials even sought information from other U.S. police departments on out-of-state agitators.

Riots have been commonplace since Aug. 9 when police officer Darren Wilson shot teenager Michael Brown, sparking days of protests in Ferguson, a suburb of St. Louis. Security and safety have been absent in this city for a couple of months now, and Missouri law enforcement officials have been so concerned that they have been in contact with police chiefs from Los Angeles, New York, Florida and Cincinnati. Police fear an outbreak of violence not only in Ferguson, but also in numerous metropolitan cities.

Protesters, most from outside of Missouri, including New York and California, and civil rights groups say that the shooting is part of a national epidemic of young black men being shot by white police officers. What alarms me more than anything is that it seems civil rights protestors can bully law enforcement and the courts into getting what they think is fair.

The grand jury’s decision will affect members of the black community as well as those in the white community. The city is fraught with racial tension and simmering anger from Brown’s death. Any death in this type of situation should not be taken lightly, but mixing in racial tensions does not help calm the storm.

This article originally appeared in the November 2014 issue of Security Today.

Featured

  • Survey Shows Election Anxiety Crosses Party Lines

    New reports of election worker intimidation are raising concerns about election interference. A majority of Americans (71%) are worried about voter intimidation or safety at the polls, and 75% want security cameras at their voting place, according to a new national survey. Read Now

  • 66 Percent of Cybersecurity Pros Say Job Stress is Growing

    Sixty-six percent of cybersecurity professionals say their role is more stressful now than it was five years ago, according to the newly released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • Live from GSX 2024: Post-Show Recap

    Another great edition of GSX is in the books! We’d like to thank our great partners for this years event, NAPCO, LVT, Eagle Eye Networks and Hirsch, for working with us and allowing us to highlight some of the great solutions the companies were showcasing during the crowded show. Read Now

    • Industry Events
    • GSX
  • Research: Cybersecurity Success Hinges on Full Organizational Support

    Cybersecurity is the top technology priority for the vast majority of organizations, but moving from aspiration to reality requires a top-to-bottom commitment that many companies have yet to make, according to new research released today by CompTIA, the nonprofit association for the technology industry and workforce. Read Now

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3