Over the years, the industry has come to recognise that an X-ray machine is only as effective as its operator. But humans are emotional creatures and far from perfect, so when the stakes are high it makes sense to invest in advanced technology to mitigate human error and enhance operations. Yves Duguay discusses the role
Executives, board members and security professionals who are tasked with enterprise risk management are constantly bombarded nowadays with cybersecurity news concerning new forms of attack perpetrated by both novice and sophisticated assailants, from state sponsored cyber criminals to malcontent employees. These criminals are exploiting vulnerabilities in Information Technology (IT) systems and networks that were not
Our most basic common link is that we all inhabit this small planet. We all breathe the same air. We all cherish our children’s future. And we are all mortal.” U.S. President John F. Kennedy’s 1963 commencement speech, titled “A Strategy of Peace,” foreshadowed the vulnerability of nonrenewable resources around the world today. […] Read
Nearly two dozen children, some as young as six weeks old, have been red-flagged as airline threats by the Canadian government with little recourse to extricate themselves from a highly secretive no-fly list.
The embarrassing revelations for the government have come to light since January 1, after the father of Adam Ahmed, aged six, posted a photo of an airline computer screen showing his son listed as DHP – or « deemed high profile ».
As 2015 draws to a close, and we reflect on the recent media headlines, we can appreciate the level of uncertainty that is affecting our society, along with the unpredictability of the threats we are facing, from weather hazards to terrorist attacks.
But what if we didn’t have to replace each retiring police officer? Given a blank canvas, how would we organize ourselves to better align security investments with resources availability? In this article, we will propose a new model for public security, based on four pillars, to leverage the complementary values and strengths found in the public and private sectors.
Canada’s “no-fly list” is, by design, a tight-lipped operation—a database so top-secret that the people on it have no idea (until they try to board an airplane). The federal government won’t even reveal how many names the list contains, insisting that such basic disclosure could somehow help a terrorist plan an attack. Reported estimates range from 500 to 2,000 entries, which means someone is way off.
The National Center for Spectator Sport Safety and Security (NCS4) at The University of Southern Mississippi announced in October 2014 that Yves Duguay is the first international candidate to earn the Certified Sport Security Professional (CSSP) credential. Duguay has extensive work experience as a security professional in civil aviation and public safety. More recently, he
The air transportation business is changing and adapting rapidly to passengers’ expectations, using data and innovative technologies, in an effort to meet its clients’ needs. We have learned, through studies conducted by the International Air Transport Association (IATA), that passengers want to exercise more control over their journey and that a large proportion of them