SlideShare a Scribd company logo
Global Security Academy
The Global Threat to Secured Locations
• The threat of a terrorist attack to a major
  transportation hub is a primary concern for
  security officials worldwide.
• Persons considered to be security risks to aviation,
  mass transit and border areas.
• Unidentified packages.
• Attempts to hijack and take down
                                                    DO YOU HAVE
                                                    ANY LIQUIDS IN
                                                    HERE?'


  an aircraft.                                NO!




• Homegrown and radicalized
  suicide attacks.
The Problems We Face Maintaining Security
1. Continuous evolution of internal and external threats.

2. The changing of policies worldwide and their impact on
   technology, operating procedures and structure of the
   checkpoint or transportation hubs.

3. High turnover rate of security personnel -> low proficiency level
   of security personnel -> inadequate security level.
    “Almost one-quarter of the officers who screened passengers
    before flights at Canada's eight busiest airports left their jobs in
    2009-10, says a report by the CATSA“.
    “According to a USA Today article, airport security screeners have
    the highest employee turnover rate in the U.S. government”.
The Solution
• The solution is to be ready with tested and proven
  techniques to limit the vulnerabilities while providing key
  resources to be able to remain flexible, evolve and adapt to
  the continuous threat of terrorism and criminal behavior.

• We propose to create a local academy
  that will supply training and overall solutions
  for checkpoints at secured locations
  (i.e. airports, government buildings, prisons etc.).
Solutions to the Global Threat of Terrorism
1. Security courses: IED awareness, checkpoint security
   officer, screeners (x-ray operators), threat detection
   technology operators, security managers, risk analysis,
   threat definition.
2. Canine courses: explosive dogs training, annual dog
   training, dog handler evaluations.
3. Selection program for security employees: HR screening
   procedures – get the right employees!
4. Auditing: (OPSEC) risk surveys, soft spots, vulnerability
   assessments and annual security reviews.
5. Consulting: secured location design, risk analysis, threat
   definition.
Results and Expectations
    Better security personnel, better security.




“The system has been in place for about one year and through the tracking tool, I have witnessed my
operators consistently perform better on each of the training modules. The system is fantastic, can be
tailored to the sites specific needs, but the crowning touch is the staff that will be included with the XD
system” Keith L. Kambic, CPP – Director of Security & Life Safety, US Equities Asset Management. Feb. 2012.
Specialized Training and methods available

• Hands on training

• Computer based training
  using advanced self developed software


• On-the-job training
Why the X-Test™ method Works
• Based on experience
Yuval Amsterdam - VP Homeland Security
Captain (res.), Israeli Defense Force, Special Forces, EOD unit.
B.Sc. Mechanical Engineering, MBA.
Former head of detection equipment evaluation unit at the Israeli Security Agency.
Rami Schiffer - Marketing Director
Captain (res.), Israeli Defense Force, Special Forces, EOD unit.
LL.B., B.A. Economics.
Former officer at the security detail, Israel International Airport.
Jasmin Bar-Or - IED Specialist
First Sergeant retired, Israeli Engineering Corps, Israeli Defense Force.
Senior Security Officer, Ben Gurion Airport.
Dr. Gad Friedman – R&D
PhD in Photochemistry, Associate Professor (Weizmann Institute of Science).
Former head of the Israel Defense Force's R&D chemistry laboratories.
Vladimir Magidenko – R&D
PhD & Engineer in Materials Engineering.
Galina Brodsky – R&D
MSc & Engineer in Materials Engineering.
Why the X-Test™ method Works
• Turn key project:
 building the organization
 building the training facility
 training the local trainer

• Computer based oversight:
  receiving on-line auditing results
Security is a profession – you need to
   learn it from the professionals!

More Related Content

Viewers also liked

Tema power point
Tema power pointTema power point
Tema power pointdaneaana
 
Horror trailers for preparation
Horror trailers for preparationHorror trailers for preparation
Horror trailers for preparationmattharwood
 
Application for mobile services
Application for mobile servicesApplication for mobile services
Application for mobile servicesChristophe Evrard
 
Questionnaire Analysis
Questionnaire AnalysisQuestionnaire Analysis
Questionnaire Analysisbecausemegan
 

Viewers also liked (7)

Tema power point
Tema power pointTema power point
Tema power point
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Horror trailers for preparation
Horror trailers for preparationHorror trailers for preparation
Horror trailers for preparation
 
Japan Week 2011
Japan Week 2011Japan Week 2011
Japan Week 2011
 
Application for mobile services
Application for mobile servicesApplication for mobile services
Application for mobile services
 
Questionnaire Analysis
Questionnaire AnalysisQuestionnaire Analysis
Questionnaire Analysis
 
Music Television
Music Television Music Television
Music Television
 

Similar to Academy

Ar Ts Profile
Ar Ts ProfileAr Ts Profile
Ar Ts ProfileRafiSela
 
IDGA’s Aviation Security Summit
IDGA’s Aviation Security SummitIDGA’s Aviation Security Summit
IDGA’s Aviation Security Summitcassie111
 
Defentect cbrn threat_detection system
Defentect cbrn threat_detection systemDefentect cbrn threat_detection system
Defentect cbrn threat_detection systemSandeep Kumar
 
Odum.t.averbeck.r
Odum.t.averbeck.rOdum.t.averbeck.r
Odum.t.averbeck.rNASAPMC
 
Erez Swissa_RESUME docx
Erez Swissa_RESUME docxErez Swissa_RESUME docx
Erez Swissa_RESUME docxErez Swissa
 
RUNNING HEADER AIRPORT PART 1 .docx
RUNNING HEADER AIRPORT PART 1                                    .docxRUNNING HEADER AIRPORT PART 1                                    .docx
RUNNING HEADER AIRPORT PART 1 .docxagnesdcarey33086
 
Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussionRussell Publishing
 
The growing threat to information security: a focus on ISM
The growing threat to information security: a focus on ISMThe growing threat to information security: a focus on ISM
The growing threat to information security: a focus on ISMNorman Disney & Young
 
Dezfuli.homayoon
Dezfuli.homayoonDezfuli.homayoon
Dezfuli.homayoonNASAPMC
 
unit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineeringunit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineeringPoornachanranKV
 
Aviation security challenges: practical solutions
Aviation security challenges: practical solutionsAviation security challenges: practical solutions
Aviation security challenges: practical solutionsTristan Wiggill
 
Israel Irazarry new resume 10-19-2016
Israel Irazarry new resume 10-19-2016Israel Irazarry new resume 10-19-2016
Israel Irazarry new resume 10-19-2016ISRAEL IRIZARRY
 
Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualDayo Olujekun
 
FEMARisk Management SeriesRisk AssessmentA How-To Gu.docx
FEMARisk Management SeriesRisk AssessmentA How-To Gu.docxFEMARisk Management SeriesRisk AssessmentA How-To Gu.docx
FEMARisk Management SeriesRisk AssessmentA How-To Gu.docxmydrynan
 

Similar to Academy (20)

Ramkishore choudhary resume
Ramkishore choudhary   resumeRamkishore choudhary   resume
Ramkishore choudhary resume
 
Ar Ts Profile
Ar Ts ProfileAr Ts Profile
Ar Ts Profile
 
Ism cbt
Ism cbtIsm cbt
Ism cbt
 
IDGA’s Aviation Security Summit
IDGA’s Aviation Security SummitIDGA’s Aviation Security Summit
IDGA’s Aviation Security Summit
 
403 3
403 3403 3
403 3
 
Defentect cbrn threat_detection system
Defentect cbrn threat_detection systemDefentect cbrn threat_detection system
Defentect cbrn threat_detection system
 
Odum.t.averbeck.r
Odum.t.averbeck.rOdum.t.averbeck.r
Odum.t.averbeck.r
 
Erez Swissa_RESUME docx
Erez Swissa_RESUME docxErez Swissa_RESUME docx
Erez Swissa_RESUME docx
 
RUNNING HEADER AIRPORT PART 1 .docx
RUNNING HEADER AIRPORT PART 1                                    .docxRUNNING HEADER AIRPORT PART 1                                    .docx
RUNNING HEADER AIRPORT PART 1 .docx
 
Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussion
 
The growing threat to information security: a focus on ISM
The growing threat to information security: a focus on ISMThe growing threat to information security: a focus on ISM
The growing threat to information security: a focus on ISM
 
Dezfuli.homayoon
Dezfuli.homayoonDezfuli.homayoon
Dezfuli.homayoon
 
Airline security new
Airline security newAirline security new
Airline security new
 
Donald william reid resume 7 17
Donald william reid resume 7 17Donald william reid resume 7 17
Donald william reid resume 7 17
 
unit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineeringunit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineering
 
Aviation security challenges: practical solutions
Aviation security challenges: practical solutionsAviation security challenges: practical solutions
Aviation security challenges: practical solutions
 
Aviation Security Challenges: Practical Solutions
Aviation Security Challenges: Practical SolutionsAviation Security Challenges: Practical Solutions
Aviation Security Challenges: Practical Solutions
 
Israel Irazarry new resume 10-19-2016
Israel Irazarry new resume 10-19-2016Israel Irazarry new resume 10-19-2016
Israel Irazarry new resume 10-19-2016
 
Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government Individual
 
FEMARisk Management SeriesRisk AssessmentA How-To Gu.docx
FEMARisk Management SeriesRisk AssessmentA How-To Gu.docxFEMARisk Management SeriesRisk AssessmentA How-To Gu.docx
FEMARisk Management SeriesRisk AssessmentA How-To Gu.docx
 

Academy

  • 2. The Global Threat to Secured Locations • The threat of a terrorist attack to a major transportation hub is a primary concern for security officials worldwide. • Persons considered to be security risks to aviation, mass transit and border areas. • Unidentified packages. • Attempts to hijack and take down DO YOU HAVE ANY LIQUIDS IN HERE?' an aircraft. NO! • Homegrown and radicalized suicide attacks.
  • 3. The Problems We Face Maintaining Security 1. Continuous evolution of internal and external threats. 2. The changing of policies worldwide and their impact on technology, operating procedures and structure of the checkpoint or transportation hubs. 3. High turnover rate of security personnel -> low proficiency level of security personnel -> inadequate security level. “Almost one-quarter of the officers who screened passengers before flights at Canada's eight busiest airports left their jobs in 2009-10, says a report by the CATSA“. “According to a USA Today article, airport security screeners have the highest employee turnover rate in the U.S. government”.
  • 4. The Solution • The solution is to be ready with tested and proven techniques to limit the vulnerabilities while providing key resources to be able to remain flexible, evolve and adapt to the continuous threat of terrorism and criminal behavior. • We propose to create a local academy that will supply training and overall solutions for checkpoints at secured locations (i.e. airports, government buildings, prisons etc.).
  • 5. Solutions to the Global Threat of Terrorism 1. Security courses: IED awareness, checkpoint security officer, screeners (x-ray operators), threat detection technology operators, security managers, risk analysis, threat definition. 2. Canine courses: explosive dogs training, annual dog training, dog handler evaluations. 3. Selection program for security employees: HR screening procedures – get the right employees! 4. Auditing: (OPSEC) risk surveys, soft spots, vulnerability assessments and annual security reviews. 5. Consulting: secured location design, risk analysis, threat definition.
  • 6. Results and Expectations Better security personnel, better security. “The system has been in place for about one year and through the tracking tool, I have witnessed my operators consistently perform better on each of the training modules. The system is fantastic, can be tailored to the sites specific needs, but the crowning touch is the staff that will be included with the XD system” Keith L. Kambic, CPP – Director of Security & Life Safety, US Equities Asset Management. Feb. 2012.
  • 7. Specialized Training and methods available • Hands on training • Computer based training using advanced self developed software • On-the-job training
  • 8. Why the X-Test™ method Works • Based on experience Yuval Amsterdam - VP Homeland Security Captain (res.), Israeli Defense Force, Special Forces, EOD unit. B.Sc. Mechanical Engineering, MBA. Former head of detection equipment evaluation unit at the Israeli Security Agency. Rami Schiffer - Marketing Director Captain (res.), Israeli Defense Force, Special Forces, EOD unit. LL.B., B.A. Economics. Former officer at the security detail, Israel International Airport. Jasmin Bar-Or - IED Specialist First Sergeant retired, Israeli Engineering Corps, Israeli Defense Force. Senior Security Officer, Ben Gurion Airport. Dr. Gad Friedman – R&D PhD in Photochemistry, Associate Professor (Weizmann Institute of Science). Former head of the Israel Defense Force's R&D chemistry laboratories. Vladimir Magidenko – R&D PhD & Engineer in Materials Engineering. Galina Brodsky – R&D MSc & Engineer in Materials Engineering.
  • 9. Why the X-Test™ method Works • Turn key project:  building the organization  building the training facility  training the local trainer • Computer based oversight: receiving on-line auditing results Security is a profession – you need to learn it from the professionals!