June - Sfasis.org

Transcription

June - Sfasis.org
San Francisco Bay Area Chapter
Newsletter
Q2-2009
Recession fuels worries of U.S. workplace violence
By Ellen Wulfhorst
NEW YORK, April 22 (Reuters) - A worker recently laid off by a U.S. financial
services company grew so upset that the firm had him followed to be sure he didn't
strike out violently at his former co-workers or bosses.
Social
2" Defense against Social
Engineering"
Discover 5 methodologies
to thwart social
engineering, elicitations or
establish legitimacy
"Tough times will cause people to do crazy things," said Kenneth Springer, whose
company Corporate Resolutions Inc. did the surveillance. "People are taking more
precautions."
Indeed, stories of workplace violence are filling headlines of late -- the San Diego bus
mechanic who killed two co-workers or the unemployed man in upstate New York
whose 12 shooting victims included a receptionist and a teacher.
With such jarring tragedies, fears of violence fueled by financial
worries are growing as the recession puts strain and stress on anxious
workers, experts say. Job losses, job uncertainty and slashed budgets
are all pressures that could push someone over the edge.
"People are flat out concerned," said James Cawood, a security expert
and author of "Violence Assessment and Intervention: the Practitioner's Handbook."
"People that are staying in companies where there has been significant downsizing
and there's also been major dislocation ... are worried at every level," he said. "Even
in down economic times, I'm doing more training now than I've done in years."
Events
11 Check on the inside for
chapter events coming to a
location near you.
Workplace violence can range from harassment and intimidation to violence and
homicides, experts say. While economic stress can make some people violent, it won't
turn just anyone into a killer, said Laurence Miller, author of "From Difficult to
Disturbed: Understanding and Managing Dysfunctional Employees."
"People shouldn't be sitting around wondering if someone they've been working
with for years who has been a regular guy and no real problem is going to suddenly
snap and go ballistic on them," he said. "It's usually somebody that's had a long
streak of problems."
Members
8 Find out our committee
members in bay area
3 Is background check
applying an critical role
in this tough economic?
4 What is 5 Free Ways
to Track Online Leaks
of Information?
13 To Know about
The Foundation of
Intelligence
management
Moreover, people prone to violence tend to reveal their intentions, experts say.
"People aren't mushrooms sitting in a dark closet by themselves and all of a sudden
one day explode," Cawood said. "If you listen and observe what they're actually
doing and saying, they're communicating."
Statistics on workplace violence in this recession will take years to compile and
analyze, experts say. From 1997 to 2007, the most recent year for which data is
available, there were more than 7,000 occupational homicides nationwide, according
to the U.S. Bureau of Labor Statistics. While most involved robberies, more than
1,000 involved work associates, the government agency said. Whether or not the
numbers will show a spike in economic-related violence, the fear is valid and
significant, said Joel Shults, head of public safety at Adams State College in
Alamosa, Colorado and an expert in safety awareness. Elevating the fear is the fact
that so many perpetrators in recent workplace shootings seemed normal, he said.
"It makes it hard to tell ourselves that we're safe because they seem like such ordinary
people in such ordinary circumstances," Shults said. "It's hard for us to tell ourselves,
no, that's not going to happen us."
Ironically, he added, a heightened sense of fear can make matters worse. "That might
potentially actually increase the number of people snapping. It's one more thing to worry
about," he said. (Editing by Michelle Nichols)
inbox
Robert Dodge, CPP
Vice President - West Region
Pinkerton Consulting and Investigations
Defense against Social Engineering
Famous Hacker Kevin Mitnick helped popularize the term 'social engineering' in the 1990's, but the simple idea
itself (tricking someone into doing something or divulging sensitive information) has been around for ages. Social
Engineering can be accomplished via the phone, email, web and in person. The common theme is that Social
Engineers use internal phone numbers, knowledge of procedures and even industry lingo to gain the trust of their
intended victims. Ultimately they hope to gain access to sensitive information/intellectual properties that could
strongly damage the organization if it becomes compromised.
So how can we protect ourselves? Certainly organizations should provide training education and awareness
seminars on the threat of Social Engineering to all of their employees and strong information protection practices,
but in addition organizations should test themselves by running 'penetration tests' that employ social engineering
attacks to see the level of vulnerability the organization has.
But managers can employ the following methodology to thwart social engineering, elicitations or establish
legitimacy:
Who is this individual engaging me?
What is their agenda and the goal of this conversation?
Why did this individual pick me to talk to and why at this
specific time?
When will the true purpose of this conversation reveal itself,
now or after it has ended?
Where is this conversation going and where will it end
(with me saying more than I intended to?)
Robert Dodge
[email protected]
By posing these questions internally you will raise your level of
personal awareness and limit your vulnerability to leaking sensitive
information and as a result help to protect your organization.
Do you know….Here are ten ideas from the National Institute for
Occupational Safety and Health (NIOSH) for preventing violence against
workers who have contact with the public:
1.
2.
3.
Use physical barriers to protect yourself.
Install silent alarm systems, panic buttons.
Use mirrors, raised platforms and make sure that the area where
money is exchanged can be seen.
4. Use bright and effective lighting.
5. Make sure that you have enough staff members.
6. Use drop safes so that there is only a limited amount of cash on
hand. Make sure that you post signs telling people that you only
have a limited cash supply.
7. Use height markers on exit doors.
8. Use video surveillance equipment so that activity is always being
monitored.
9. Control or limit access to the facility.
10. Install locks on doors that lead to staff-only areas.
Background you need to know..
To
fracture Shakespeare: Tis nobler to equally background check all, than to
suffer the slings and arrows of risk and focus on those with more keys to the
Proprietary Information Kingdom. In this economy, is the Company Treasury
requiring an increase in your level of acceptable risk? A real and complete
background check is expensive.
Aside from the obvious workplace violence issues, the more sensitive and
proprietary the data that employee has access to; the more important a background
check is for that position. The more important it is, the more difficult it is to do a
complete check and the greater the vicarious liability is of missing something
important.
William Stepka
CPP CISSP, Stepka &
Associates
425-928-7105
A really smart criminal/social engineer/industrial spy would not soil his own
territory. In profiling terms, an “organized offender” who is acting as a
“commuter” outside his home territory will present a challenge to the standard
criminal record/background check.
Criminal Record checks are the weakest link in this process. Few US counties have
complete and accurate online criminal databases. Therefore, in each county where
that potential employee has lived requires that an individual record retriever go
there and do an actual physical search. Since it takes little time to cross county
lines, this must be done for all the counties that border the list of former home
addresses. While this may be adequate for a “disorganized offender” who is
“marauding” for criminal opportunities near his home, it does not help with our
first profile.
It is important to look at the formal profile of our greatest threat,
the “Organized Offender.” A list of this profile’s characteristics
according to FBI Psychiatrist Ann Burgess include: “Normal-tosuperior intelligence, socially adequate, prefers skilled
employment, sexually adequate………..
high social standing, father in stable employment, inconsistent discipline in
childhood, emotional control during a crime, may use alcohol during a crime,
precipitates situational stress, lives with partner, uses a car in good condition,
follows crimes in media and may change jobs or leave the city.” The
“Disorganized Offender” has the polar opposite traits and will likely not venture as
far from his home territory.
For our prime threat profile we need to look far and wide, from the home territory,
as well as from all previous work sites. This is a lot of work and expense if you go
state wide including the nearest adjacent states. One way to shorten this is to
emphasize the early addresses and worksites after the age of 18 and sealed juvenile
records. Early criminal activity is less organized and nearer residences and
worksites. As the organized offender commits more crimes that distance increases.
It is also important to hold firms doing complete backgrounds to a
high standard of information retrieval or be prepared to suffer the
consequences of a superficial search. These days, companies often
have catch, fire and release policies – even with workplace violence,
so there may not even be consistent criminal records.
It all goes back to that big question: What is the executive team’s definition of
acceptable risk and how will that policy be implemented in a bad economy?
Update
Ways to Track Online Leaks of Information
information online by
accident and well after its
too late.
- Brandon Gregg
Investigations Manager
Seagate Technology
As you know, there is a
wide range of threats online
from malware and bots, to
phishing scams and viruses.
While your security and IT
department implement
firewalls and virus protection
programs to combat these
threats, many companies are
missing the most damaging
threat to their business
online: Intellectual Property
posted online by their own
employees, maliciously or
not. Unfortunately a lot of
companies are stumbling
across their own IP
Although a new market of
brand protection companies
like OpSec and BrandProtect
have recently popped up and
grown to fill a much needed
market, the following tools
offer free and easy to
customize internet
monitoring features to be
seconds behind information
leaks.
Monitter.com. This simple to
use website allows you to
customize Twitter searches
by keyword and location and
save your searches as RSS
feeds to have the data
emailed or texted to you
instantly. Start off slow with
searches for your company
name or a new product and
monitor twitter for threats,
disgruntle employees and
internal leaks. You will be
A best case scenario for undoing the damage is the data is
quickly removed by the website and is never seen again to the
seemingly more common worst case scenario of becoming a
viral video on youtube!
1. Monitter.com
Combine the word Monitor
with the social networking
tool Twitter and you have
amazed to see how many
employees actually post on
Twitter about their own
company or boss.
Chapter Activity
- ASIS 1st Annual Social Mixer (05/21/09)
2. Limewire
As many of you might know, Limewire is one of the
most popular peer 2 peer file sharing programs on the internet,
however its poor design (that Congress is actually demanding
they change) opens the world up to any documents, photos or
files on your computer. During a quick install of the program,
most users overlook the details and approve the program to share
the entire contents of their My Documents folder. Most recently
President Obama’s new military helicopter designs for Marine
One were tracked to Iranian computers after a defense contractor
installed Limewire on his personal computer and shared his top
secret company documents to the world.
Simply download and install this program on your computer
(make sure to disable all file sharing) and routinely search for
your company’s name. Documents with “Acme” in the metadata
or title will flag and you can actually see the user’s IP address
and download the file.
3. Addictomatic.com
While some search tools overlap with data and can lead
to information overload, addictomatic.com provides a quick and
easy way to search for your company or keywords across a wide
selection of sites including news, blogs, youtube, even popular
photo sharing site flickr. Countless unapproved videos and photos
by employees can quickly be discovered.
Left: Ray Cotton
Right: Ray Madrigal
Right: Tracy Gomez
Mid: Andrea Savella
Left: Vanessa Santucci
4. and 5. Google and Google Alerts
No search for data would not be complete without Google.
Their proprietary collection of websites and vast arsenal of tools
give it the fourth and fifth place on the list. The power behind
Google’s server farms full of processors crawling the web for
information makes Google.com one of the first places to look for
leaked information. However, unlike addictomatic, the
information can easily be overwhelming without the right
combination of search tricks.
Right: Laura Armor
Left: Greg Christian
Using a recipe of basic and advanced search features can
greatly narrow the number of results returned and give you better
data. Instead of searching for Acme Company, use “Acme
Company” in quotations or narrow your results with more details
like “Acme Company” “Confidential Handling” to find any
leaked company documents with “confidential handling” in the
Group Picture
metadata or headers for important company files. Check out
Google advanced search or search for “Google Hack Lists” for
by Gary Halverson
more tricks from finding your companies IP CCTV cameras to
ASIS Member
password lists and much more with Google.
Once you have narrowed your search and tested it out, use Google Alerts (www.google.com/alerts) to make Google work for
you. In this example I have setup two searches in Google Alerts, the first a simple search to find specifically search Myspace users
posting about our company, ACME : “Acme Company” site:profile.myspace.com and a second more complex search looking for
any Acme file on free file sharing websites: Acme (rapidshare. | megaupload. | sharebee. | mediafire. | slil. | sendspace. |
turboupload. | speedshare. | depositfiles. | massmirror. com | ftp2share.com| zshare.net). To setup, make sure to search narrow or
specific topics, Acme alone might provide too much invaluable data. After you have picked a good search simply paste in your
term(s), select Comprehensive, select how often Google should search (I use As-It-Happens), enter your email and soon you will be
getting information sent directly to you.
-Brandon Gregg
Greg Schneider, CPP
Understanding Intelligence Management
“ Jet Liner Goes Down”
“ Labor Strike in France”
“Underground Explosion in San Francisco”
reputations can be saved by knowing what the
intelligence needs of an organization are first and
then designing a plan to capture the intelligence.
The Intelligence Process
These headlines are examples of what we read,
watch, or hear through open media sources. For some
people and organizations, these incidents may
directly impact their business process or livelihoods
requiring them to act (intelligence), and for others
these headlines are considered simple news items.
A common problem facing many senior security
managers is the feeling of being overwhelmed with
the constant influx of information via the Internet,
broadcast media, the corporate intranet, and coworkers. There is also the unspoken added pressure
the chief security officer puts on him or herself to be
the guy or gal who is expected to know everything
that is happening anywhere in the world at any given
time. Unfortunately, some managers, fall into a trap
of subscribing to every conceivable security oriented
e-mail list possible, with the hope of finding
something “actionable”. Casting a wide net in the
hope of catching a single nugget of actionable
intelligence will tax corporate or organizational
resources, demand many hours of analysis, and clog
up the security department’s communication
infrastructure.
How does one actually assess what it is
considered intelligence and what is non-essential
news to that organization’s business continuity or
security? How does one navigate through a
plethora of information sources? The answers to
these questions and other’s can be found by
understanding how to manage the intelligence
process. Valuable time, money and even
Intelligence like the security apparatus can be
applied on the macro level (strategic) or on the
micro level (tactical). Dependent on the situation
on hand, a strategic intelligence plan has goals that
will enable corporate or organizational decision
makers to take appropriate action in order to grow
the company, i.e. business intelligence and to
ensure long term business continuity. Strategic
intelligence as applied to business normally falls
under the responsibility of the business
development or sales and marketing divisions. The
security department is often tasked with developing
a tactical intelligence plan geared toward situations
or scenarios where more immediate action is
needed to protect the organization’s assets. In some
global business circles a tactical intelligence plan
is carried out to limit the advantage of a competitor
or adversary.
To manage an intelligence plan, whether
strategic or tactical, one should establish a
consistent process to ensure that decision makers
are getting the right information at the right time.
There are certain innate phases of intelligence that
when harnessed and used correctly help managers
leverage corporate or organizational resources to
either promote or protect the company or
organization.
Phases of an Intelligence Plan
1. Defining the Intelligence Requirement(s) –
information needed to determine actions
2. The Collection Plan – how the intelligence will
be gathered
3. Analysis – understanding what the intelligence
means and its criticality to the organization
4. Dissemination – delivering the right intelligence
to the right people at the right time
Greg Schneider, CPP
The first step in managing intelligence is to first
identify what the Intelligence Requirement(s) (IR)
that are needed so a decision or action can be
executed by management. IRs can be strategic in
nature or tactical but the intelligence process is the
same. It is important to distinguish that IRs will differ
from department to department even within the same
organization. For example, in a corporation, the sales
and marketing division will have Business
Intelligence Requirements that will direct actions to
help the organization grow and the security
department will have IRs for the purpose of
protecting the company. For our purposes we will
focus on the latter.
The IRs are generally comprised of a number of
questions as it applies to a given situation(s). The
questions usually start with “who, what, when, where,
how, and why.” A potential scenario that will spawn
IRs:
“A large commercial development
company in South San Francisco has
received menacing phone calls from
anonymous callers; pamphlets calling for
the developer to stop building have littered
the jobsite, and corporate executives have
had the tires of their cars slashed.”
IRs: Who are on record of opposing this development
project? What is their motive in disrupting
company operations? When do threatening calls,
graffiti, or other nuisance crimes occur? Where
do groups with grievances against the company
congregate? How does this person or group fund
their operations? Why is this activity happening
now?
The IRs give the security executive a game plan so he
or she can dedicate the appropriate resources to
acquire the needed intelligence.
Phase II: Collection Plan
Once the IRs have been generated and evaluated for
criticality, the next step is designing a collection plan.
The collection plan will identify the methods,
means, and assets needed to acquire
the desired intelligence.
[email protected]
Possibly much intelligence can be gathered via open
source intelligence OSINT (internet, print, and
broadcast news sources) or through human sources
(HUMINT). Examples of human sources could be
local law enforcement, journalists, subject matter
experts, or even a person that can infiltrate an
organization and report real time intelligence
developments back to his or her handler. Other
intelligence may need to be collected through
technical means. Video surveillance, a derivative of
photo intelligence (PHOTINT) generally considered
a tool for deterrence, has the ability of capturing
images and giving descriptions of individuals or
vehicles near or in a company’s property. Electronic
Intelligence (ELINT), listening devices; has long
been a valuable method to gain intelligence but
legally is questionable. IT networks and databases
can of course be targeted in order to find a treasure
trove of intelligence, though this method isn’t
advocated for legal reasons within the private sector.
Embedded into the collection plan are timelines for
when the selected intelligence is needed by decision
makers to act. Also of paramount importance is the
need to define how the collected intelligence will be
communicated back to the security or project
manager. Some means of communication can be
overt others may need to be covert to protect the
source of the intelligence. A third necessity is
creating due diligence procedures to
ensure that the intelligence collected is
accurate. Sources of intelligence must be vetted to
ensure that the collector of the intelligence is not
receiving misinformation or forwarding rumors
onward to analysts.
By knowing how to develop and manage an
intelligence plan, security and business executives
will be empowered to control the flow of information
and not have information control them.
(Look for Part II in the Q3 2009 Issue of the Newsletter....)
Members
Annual Seminar & Exhibits Chairperson
Curtis M Given, CPP
Visa
650-432-5551
650-554-5167 (fax)
[email protected]
Certifications Chairperson
Rudolph A DuBord III, CPP
COBHAM Defense Electronics
Systems-M/A-COM, Inc.
408-624-3328
408-624-3902 (fax)
ASIS Foundation Chairperson
Brenda M Knox
Acufacts Inc
408-286-5880
408-286-6817 (fax)
[email protected]
Golf Tournament Chairperson
Doyle B Minnis, CPP
Juniper Networks Inc
408-747-4898
408-745-8945 (fax)
[email protected]
[email protected]
Historian Chairperson
William F Stepka CPP
William F Stepka & Associates
415-928-7105
415-928-5293 (fax)
[email protected]
I.B. Hale Chairperson
John H Speicher
Strategic Security, Inc.
510-623-2355
510-623-2353 (fax)
[email protected]
Library Chairperson
Gary E Sepulveda
Tippit Group
408-257-0605
408-564-4461 (fax)
[email protected]
Public Relations / Publicity Chairperson
David J Gibbs, CPP
Safir Rosetti
510-250-6224
510-839-4791 (fax)
[email protected]
Legislative Liaison Chairperson
Lewis A Schatz CPP
[email protected]
Membership Chairperson
Rebecca E Clevenger
AlliedBarton Security Services
408-954-8274 x2
408-954-8452 (fax)
[email protected]
Member Profile…..
Placement Chairperson
Andrea Savella
Steve K. Brown
Silver Shield Security
408-435-1111
408-435-1122 (fax)
[email protected]
Hospitality / Events Chairperson
Andrea Savella
Securitas Security Services
408-571-1000
[email protected]
Web Committee Chairperson / Webmaster
Alex Dourov
Utkaduck Design
925-443-8852
[email protected]
St. Patrick's Day (Law Enforcement
Appreciation Day) Co-Chairperson
Pete Maddox
OSH/Sears
209-640-2514
209-833-3199 (fax)
[email protected]
St. Patrick's Day (Law Enforcement
Appreciation Day) Co-Chairperson
Art Lesser
Merit Security
650-366-0100
[email protected]
Name: Andrea Savella
Occupation:
National Accounts Administration Specialist
Securitas Security Services
1. Are you a morning or night person?
Ans: Night
2. Favorite food?
Ans: Mexican
3. What's your favorite color?
Ans: Purple
4. What was your favorite television program?
Ans: Seinfeld
5. If you could have any superpower, what would it be?
Ans: Stop Time!
6. Favorite Music?
Ans: All types but Country
7. Favorite Movie?
Ans: Office Space
8. Favorite Hobby?
Ans: Exercising
OFFICER
PROFILE
Chapter Chairperson
Raymond Cotton, CPP
Orchard Supply Hardware
408-826-9834 (Ph)
866-723-4252 (fax)
[email protected]
Chapter Vice Chairperson
Laura Armour
RFI Communications and
Security Systems
408-882-4377 (Ph)
408-882-4401 (fax)
[email protected]
Alert: In-Flight Internet...
aka InfoButterfly.Net
via Netragard, LLC...
Airline passangers' personal
computer information can be
easily hacked while in flight.
The wireless inflight airline internet access service, GoGo Inflight
Internet ("GoGo"), which enables travelers to access the internet
while in flight does not encrypt communications between users
(passengers) and the Wireless Access Points on the
aircraft.
As a result of this lack of encryption it is easy to intercept
and record all data sent and received by
passengers. This poses significant risk to passengers and
their respective businesses as sensitive information is sent
over the air without encrtyption. This information can
include emails, email attachments, email content, user
names and passwords,credit card information, social security
numbers, methods for accessing business networks, trade
secrets, etc.
Chapter Secretary
Threats in Terminations:
Michael Delamere
Pinkerton Consulting &
Investigations
408-232-3546 (Ph)
415-520-0109 (fax)
[email protected]
Chapter Treasurer
Carlos Galvez Jr CPP
Andrews International
408-516-4114 (Ph)
[email protected]
You are never more vulnerable to
information abuse and theft than during
a recession. Put your independent information security
consultant into overdrive. Skimp on something else to save
money.
A cautionary tale...
An insider at the California Water Service Company in San
Jose broke into the company's computer system and
transferred $9 million into offshore bank accounts and fled the
country.
Abdirahman Ismail Abdi, 32, was an auditor for the water
company, which delivers drinking water throughout the state
and is located in San Jose, Calif. Abdi resigned from his
position on April 27. Allegedly, that night he went back to
work and made three wire transfers totaling more than $9
million from the company's accounts to an account in Qatar.
Abdi is not a U.S. citizen and was ordered deported to Somalia
in 2005, the Mercury News reported. (Don't skimp on
background checks either.)
“The downturn in the economy is raising the internal security
threat levels dramatically, as more and more disgruntled exemployees take advantage of the fact that their ex-employer
did not decommission their access credentials,” Torsten
George, vice president, worldwide marketing, ActivIdentity,
told SCMagazineUS.com on Friday in an email.
Event
July
Ray Pezolt, CPP
Director of Operations
Pinkerton Consulting & Investigations
Denver, CO
Topic: Internet Profiling
Date: 07/16/2009
Time: 10AM PT to 11:30AM PT
Location:
Adobe
601 Townsend Street
San Francisco, CA 94103
Ray Pezolt CPP joined Pinkerton Consulting and Investigations in 2002 after owning and operating his
own private investigation and consulting company for 27 years. As Manager of Investigations for the
Rocky Mountain region, his duties include supervising investigators assigned to Colorado and four other
surrounding states. After four years in The US Navy, Mr. Pezolt went to work for a large security
company and rapidly advanced to the investigation division.
He worked for a short time as security director of a major food distribution company before starting his
own investigation company. The company specialized in business and industrial investigations. Most
recently he has specialized in the use of computers and the Internet to conduct "internet profiling"
investigations. Mr. Pezolt has conducted internet profiling research and investigations on five continents.
During his career, Mr. Pezolt has conducted investigations and consulting assignments for hundreds of
clients including several US Fortune 100 companies, law enforcement agencies and media sources. Mr.
Pezolt has assisted with several complex legal and business investigations, and has conducted training in
computer research subjects for law enforcement agencies, private business and investigation agencies.
Mr. Pezolt has assisted as technical advisor with three Emmy-award winning documentaries
concerning investigative subjects. “I Know You.” A documentary for ABC news concerned the use and
access of legal, public sources of information to learn supposedly "private" data about various individuals.
Mr. Pezolt has been a teacher, author and featured subject of numerous television news stories and print
media. Mr. Pezolt has been designated a Certified Protection Professional (CPP) by ASIS International.
He graduated from Metro State College in Denver and is a
graduate of the American Institute of Applied Science course
Forensic Science "Civil and Criminal Identification and
Investigation."
Pre-Register: http://www.sfasis.org/Events/Details.asp?i=100
Cost: $0/per person
August
We are pleased to present the
sixteenth annual Larry Marshall
Memorial Golf Tournament, to be held
on August 20th, 2009 at the Spring
Valley Golf Course in Milpitas, CA.
Larry Marshall Golf Tournament
Look for the golf tournament to be
another sellout this year! It is important
to get your reservations in early for the
golf tournament in order to secure your
spot at this event. There will be lunch, a
GREAT dinner, lots of beer and drinks
on the course throughout the event, and
of course, the company of your peers and
friends from the security profession.
Pre-Register:
http://www.sfasis.org/Events/Details.
asp?i=103
Annual Law Enforcement Appreciation Day.
by: Dave Wood of OSH
Ron Sathre, ASIS Region II VP
Ray Cotton Chapter Chairman &
OSH, and Detective
Pat Ward of San
Jose Police
Department
John Nobriga, JMN
Investigations and
Ron Sathre, CPP &
Region II VP
Greg Acton - Palm
and Doyle B
Minnis CPP Juniper Networks
Keynote Speaker,
James Molinari and
Chapter Chairman,
Ray Cotton. Greg
Acton in front.
On April 16, 2009 the San Francisco Bay Area Chapter of ASIS International hosted its 46th annual
Law Enforcement Appreciation Day. 250 individuals were in attendance for the event hosted at the
San Mateo Marriott. The event was kicked off with opening remarks by the Chapter Chairman, Ray
Cotton of Orchard Supply Hardware, followed by an introduction by Chief of Police in the city of
San Mateo, Susan Manheimer. The event was highlighted by a keynote speech from State Director
of the Office of Senator Dianne Feinstein, James Molinari. More than a dozen police officers were
recognized with individual awards for their outstanding performance in the preceding year.
Larry Marshall Golf Tournament
2009 CPP, PCI & PSP
Classroom Review Schedule
Review Location
September 18-19, 2009
Anaheim, California
CPP Program #980
PCI Program #982
PSP Program #981
Hotel Information
Contact the ASIS
International Housing
Bureau at 888-887-8072
(U.S. and Canada) or 972349-7452 (International)
Review Schedule
Thursday, September 17, 2009
5:00pm – 6:30pm Registration
Friday, September 18, 2009
7:00am – 8:00am Registration
8:00am – 5:00pm Review Program
Saturday, September 19, 2009
8:00am – 2:00pm Review Program
Prior to ASIS International
Seminar and Exhibits
Location: TBD
Septiembre 18-19, 2009
Anaheim, California
Program CPP #983
Para reservar una habitación
con la tarifa de descuento,
contacte al ASIS
Internacional Housing
Bureau al 888-887-8072
Jueves, 17 Septiembre
5:00pm – 6:30pm Horario de
inscripción
Preliminar al seminario y
exhibiciones de ASIS
Viernes, 18 de Septiembre
7:00am – 8:00am Horario de
inscripción
8:00am – 5:00pm Curso de Repaso
Localidad: A ser acordada
Sabado, 19 Septiembre
8:00am – 4:00pm Curso de Repaso
San Francisco Bay Area Chapter
Congratulations
is hereby granted to
George McClosky
For Successfully A chieving The Designation of CPP
ASIS San Francisco 2009
“The job board on the newly designed
chapter website has increased capacity
and offerings of open positions for hire.
The job board is locked out to non ASIS SF
Bay Area Chapter members. Please take
the time to review the great positions
available now!”
http://www.sfasis.org/Career-Center/Job-Listings.asp
June
Position: Security/Facilities/Contracts Administrative
Associate IV
Location: San Jose
Position: District Loss Prevention Manager
Location: Bay Area - Stockton, Tracy, Milpitas area
Position: Sr. Director, Security
Location: Bristol, CT
Position: Safety & Security Facility & Security
Operations Center Supervisor
Location: Sunnyvale, CA
TEAM
Michael Delamere
[email protected]
Ken Lu
[email protected]
William Stepka
[email protected]
Anders Noyes
[email protected]
Gary Halverson
[email protected]
Sponsors
Diamond Sponsor
Platinum Sponsor
2009 Bay Area Chapter
Gold Sponsor
Bronze Sponsor