For security screeners, being able to identify threats and prohibited items under X-ray is an important responsibility. To aid in this task, some may agree that learning how to identify everyday objects is almost equally important since most items inspected are innocent. Think about it. How beneficial would it be for security screeners to recognize and clear innocent everyday items quickly and efficiently? A rapid check over of the X-ray image is all it would take for a skilled screener. That’s why practice recognizing everyday objects alongside threats and prohibited articles is encouraged.
No one can deny that technology has evolved immensely in a short amount of time. Today’s technologies allow us to do things that weren’t possible years ago. 3D printers, encrypted phones, and drones are examples of how technology has advanced.
Despite the best intentions, there will still be those who will use new technology with bad intentions. Because technology is widespread and readily available for global consumption, it is often difficult to control who uses it. So when powerful technology gets in the wrong hands, it could spell disaster.
The recent upswing in terrorist activities is troubling. Terrorists have gotten smarter and more tactical with how they carry out their attacks. Although they haven’t stopped targeting the air industry as evidenced with the recent bombing of Metrojet Flight 9268 over Egypt, they have shifted toward more ground attacks.
Clearly, these attacks on places of worship, markets, cafes, hotels, and stadiums are becoming more common than we would like. Because of this, there are concerns of security especially in countries with open borders. This has some people asking whether Europe’s open border policy is making it easier for terrorists and criminals to do business. If so, would it be wise for Europe to bring back its internal borders?
X-ray systems are deployed at security checkpoints in many different industries. X-ray operators use them to screen belongings, mail, and cargo. In real-time, these operators must be able to view an X-ray image and promptly make a decision about it - whether the scanned items are safe to proceed or if further inspection is required.
To get to that point, there are a few fundamental topics X-ray operators must have a solid understanding of first. Help operators become successful at X-ray screening on the job by ensuring your X-ray equipment training includes these critical topics.
Currently, X-ray systems are in their most stable form. They have become a proven security screening technology and are used in many markets around the world including transportation, critical infrastructure, and ports & borders.
Until X-ray equipment manufacturers invent a groundbreaking way to revolutionize the X-ray machine and push it to the next level, today’s X-ray systems will continue to dominate the security screening industry.
It’s a scene you’d expect to see from Netflix’s hit series Orange is the New Black. Prison guards storm inmate cells simultaneously to conduct a shakedown. Except in this case, it’s not a show. It’s real life and it has happened at several facilities overseen by the Mississippi Department of Corrections over the past couple of months.
The MDOC’s goal? Combat contraband behind bars.
And it’s not just the MDOC. Many prisons and correctional facilities have emphasized confiscating contraband as one of their top priorities.
Typically located in centralized areas for easy access by many, courthouses are an essential part of critical infrastructure. Every day, thousands of people around the world gather there to attend hearings and trials and to handle other legal matters.
Considering the nature of activities taking place, courts can become vulnerable to acts of violence. That’s why courthouses everywhere are taking the necessary steps to protect their property, the visitors and employees, as well as the integrity of the judicial system.
Terror threats are a real concern and they’re not going away anytime soon. Many would actually agree that attacks have been steadily increasing in number all around the world.
Unfortunately, we’re constantly seeing media coverage and reports of plots, attacks, and aftermaths. We’ve learned quite quickly that virtually any organization in any industry could fall victim to an attack.
That’s why it’s important to stay informed on the latest security threats and attacks happening around the world. Here’s a timeline of notable events from over the past three months.
Workplace supervisors have day-to-day responsibilities they must attend to including overseeing employees, ensuring productivity is maintained, and reporting to management. Part of their duty involves coaching employees, but sometimes that role expands into a full-on trainer position.
Many companies experience this – supervisors are forced to take on additional responsibilities in order to provide employees with security training in compliance with regulations or programs such as EU 185/2010, AOSSP, IACSSP, FACAOSSP, MSP, or CCSP. When supervisors double as security trainers, they’re only fulfilling a short term role so supervisors generally do not get the guidance and support needed to be successful in delivering training.
It seems like over the past fifteen years, we’ve heard a lot about the Improvised Explosive Device, otherwise known as IED. An IED is a homemade or noncommercial explosive device used to cause pain and mass destruction. It has been a prominent threat tactic used largely by terrorists in package, suicide, car, and roadside bombs to target both soldiers and civilians.
Despite recent media spotlight on these IED attacks in the past few decades, you might be surprised to learn these were originally devised over a century ago. Since then, the terminology has changed and the device itself has evolved, but the core concept of the Improvise Explosive Device remains the same.