- Security TWENTY
- Women in Security
The HIM method and Tools that this work is based upon, were conceived, researched, and are presented by Juan Kirsten (HIM), of the ISIO, International Security Industry Organization.
These methods are based on four manuscripts and/or e-connect tools which have been reviewed by Prof Larry Barton/Emergency Management and Disaster Planning (USA), Prof. Rommel Manwong/Criminology and Security Studies (Philippines), Dr Katerina Poustourli Pre-normative Security Research (Greece), Dr Declan Garrett/Security Training (United Kingdom), and Dr Gavriel Schneider (Australia), and other seasoned non-academics.
This work is a simple solution to disabling COVID-19. COVID-19 is in theater and will be an active biological threat until such time a cure is discovered, and the population is inoculated. Therefore, the infectiousness of the disease dictates that many people will be infected to the extent that all people must be tested, monitored, and managed daily. This calls for mass mobilization and focused concentration by all stakeholders using the same methods and working in sync to limit the level of collateral damage.
– The Health Department have set protocols to ‘chemically’ test and in addition for hygiene and social practises for cv-19.
– Mobile phone cv-19 awareness tech in theory may work however, the length of pandemic life- time plus the known and unknown impacting issues may not derive the desired results.
– The security industry views the situation differently and considers that [they] are dealing with an active biological threat and therefore are conscious of unique challenges that could influence increased infections. Therefore, they have a different comprehension of the situation, the specific objectives to be achieved and security protocols that must be used.
The security sector and industry can electronically second tier test millions of people. Furthermore, they have the semi-and skilled manpower to orchestrate the managed flow of people for quarantine. Security success depends on the level of situational awareness of the decision-makers (people) on the ground and their reaction speed. When the situation talks to a pandemic, then reaction speed must be highly proactive with distinctive objectives.
It is impossible to ‘chemically’ test each person every day because of the infectiousness of the virus. However, the security sector can assist with millions of people that must be tested many times a day for cv-19, which could easily be activated and achieved. This means that once a person has a high temperature then we are aware of the situation. Both the health and security sector must be working in sync together towards the same goals, whereas the private security industry (with no policing powers) assists with second tier testing, identifying people of concern and directing them towards the authorities (medical and mental institutions or quarantine centres).
When people leave their homes and use public transport then their temperature will be monitored, when they walk into a store or a building or anywhere – their temperature will be taken. Specific protocols for the instruments must come into session because the instruments are only as good as the users. Furthermore, not all equipment and technology may be advertised authentically or is reliable.
The problems are in the management and containment of the people that are in a state of anxiety and despair, meaning that they could react differently from their norm. This situation must consider using distinct protocols by the security departments because cv-19 is considered as an active biological threat in theatre with life impacting and deadly outcomes. For example, the layering of the manpower must be by layering appropriate soft and hard skills using relevant and unique skill-protocols.
Identify – Contain – Isolate – Rejuvenate
The objective for the security sector is simple, to identify a person that is infected, direct them to an isolation area and summon the appropriate authorities to assist the person in their quarantine.
Stated earlier, to identify the person of concern, technology and equipment is used. Companies must purposely purchase relative, reliable, and authentic equipment and technology. The manufacturers are running onto the market with temperature, fever detection, etc. Major issues are being currently discovered (such as false advertising) therefore it is vital to check before purchasing or upgrading verify the authenticity of equipment and technology.
There must also be consideration for where best to place certain technology/equipment. It does not help anybody if the users are not obtaining the desired results or achieving specific objectives by using the equipment or technology. This information must be considered when compiling the protocols. Decision-making in this pandemic does give leeway to reaction speed.
Decisions made during a pandemic is quite unlike other scenarios where decision-making may be timeously introduced. There is no room for emotional issues regarding fears of failure, egos, or any other irrelevant agendas. Reaction speed takes precedence and one would have to live with the consequences. Do rather do something than nothing at all!
When a person of concern is identified then they would need to quarantine. Some will voluntarily participate while others will be reluctant, unable or be unwilling to do so. The crowd reactions overall would be unlike any other before which calls for specific protocols by layering the skills accordingly. The biological threat must be isolated and contained until such time it is not a threat. Consequently, the faster infected people are isolated and healed the better. When the person is infected and refuses to be contained then that person is a high threat that is weaponized and must be into forced quarantine.
The biggest nightmare is not knowing what is truly happening on the ground therefore, security related investigative thinking applies more so than criminal investigation methods, simply because crime investigators are only called in after the fact. If incident management software will be used then the incident management software will only be as good as the critical thinking management of such, besides collection of reliable and all-the-truthful information considered and must be speedily uploaded.
Security issues impacted
The Security Industry must consider the implications on crime and security that took place in the 1930s during the great depression. The manufacturing industry took a major blow during the depression, the banks had their issues along with other sectors in the economic machine took its toll. Now, with the Fourth Industrial Revolution is on the rise and will have its own unique issues and crime related.
In 1929 the great depression brought the world into a time of despair that lasted ten years. COVID-19 is the root cause which surmounts the issues even more so. This dynamic of the ‘perfect storm’ will create calamities and shifting crime into different directions causing the security industry to shrink in some areas and grow in others. This is the time when the security sector must play an important and productive role so that the globe does use these skills to disable COVID-19. Any form of riot or acts of aggression will trigger increased physical contact thus stimulating the number of infections.
This period in the 1930s gave rise to certain types of crime and stimulated the birthing of the transnational and local organized crime gangs besides the empowerment of the pro-nationalist extremists that participated with the mass murder of millions.
Physical security will now have to contend with issues that will increase dramatically. The lack of jobs and lower buying-power specially from low paying jobs could stimulate pro-nationalist extremists to do once again unspeakable things. Furthermore, the pro-nationalist and migrant reactions could turn to some towards radicalization and using methods of terror. We comprehend that there has been a distinctive increase in migration over the past few years, whereas, the vulnerability landscape has changed dramatically.
Polarized neighbourhoods have grown in size and various countries experienced increased support for pro-nationalist parties. The crime related in cross cultural attacks of grievously bodily harm, rape and murder has increased along with demonstrations and riots breaking out periodically. This physical retaliation will speed up the number of infections in specific locations and feed into neighbouring locations. This work is not going to discuss right now the crime and damages related besides other issues but, declares that one cannot fathom the possible outcomes related to this scenario in theatre that could impact the landscape dramatically. [Ref Critical Thinking the X Factor in Criminology, Security & Risk by Juan Kirsten 2018]
The loss of revenue could drive humankind even more towards using desperate measures. Man’s basic need of food, shelter and drink [alcohol – (prohibition crime in the 30s)] besides medicine or medical support will be heightened and calling for all related buildings and logistic services related as soft targets. It must be considered that additional needs form part of man’s basic needs and is discussed in the research of this article. This comprehension of this knowledge will give direction to the security industry whereas, security consultants, companies, risk managers, investigators and trainers must comprehend their position, predict the changes in their location and field of interest to survive this debilitating period.
The perfect storm
As suggested above, the outcomes of cv-19 have led to the economic meltdown which in-turn, will present increased collateral damage with common and unique crime besides major factors concerning the human condition. COVID-19 influenced the human condition with heightened senses of fear, desperation, and anxiety. When we couple the cv-19 issues with unemployment leading to starvation then the human condition will become more desperate and lead to major challenges of increased mass violent outcomes to the extent of total anarchy in some countries.
The private security sector must protect the integrity of the supply chain besides contribute towards the disablement of covid-19. The supply chain will be tampered with by organized crime, gang crime, corruption, and very desperate people. This will cause major issues in delays of logistics, services or products required which will then cause even greater despair for the many.
There is a second part to this plan of action which must run parallel and refers to food security and securing ‘community silos’ (hybrid domains). This stage is already gearing into a major threat as food parcels and stamps are already being distributed in an attempt to feed the masses. If not addressed simultaneously then anarchy will prevail and destroy the lives of billions.
Solutions, Leadership, and Implementation
In this short overview, it clearly displays that there are multi-threats impacting simultaneously, and others that will come into theater at different times in various locations. The implementation of the leadership plan and method would be by orchestrating the global and regional infrastructure working in concert on the same foundation. as well as, at their own timing and rhythm relative to their location. Many countries have their structure in place the necessary methods to bring them onto the same page are being used with the current technology available. This all means, that the suggestions above could limit the level of collateral damage and offer a platform of solutions that can rejuvenate collateral damage already done and tackle the unknowns that are to follow.
The research, operational methodology and protocols are available from Juan Kirsten. Director General [ISIO] | International Security Industry Organization and Author HIM | Human Investigation Management, (Endorsed by ISIO and IFPO | International Foundation for Protection Officers)
Juan Kirsten Author, Security Manager’s Strategic, Operational and Protocol Guide to manage Covid-19, 2020, Master Investigator Critical Thinking in Investigation Vol 5, 2019.Criminology and Security Investigation Management Vol 4, 2019,Critical Thinking the X Factor in Criminology, Security and Risk Vol 3, 2018.