Security Audit and Risk Assessment is one of the method of risk management process with regard to the security aspect of a business, enterprises and its installations. It is a systematic process of security auditing and assessment which comprises of several steps followed by the security professionals with the objectives of assessing the threats to any facility, areas or businesses, the level of vulnerability based on the existing security measures, analyzing the impact of the security incidents, and lastly proposing recommendation on mitigation action and the necessary security counter measures. Security Audit and Risk Assessment should be carried out on a continuous and periodical basis as there might be changes of threats to the facility or businesses over time. Moreover, the infrastructure and security system of a an installation or facility also might change over time that will impact to the current risk level at site[i]. For example, a change in the access control system of a facility from manual recording through punch card system to biometric system will definitely give rise to the threat of high tech fraud such as database intrusion, digital tampering and others.
This evening, after finishing my work at the office and on my way back home, my cell phone rang and it was from one of our client who had engaged us to get some information. The conversation started:-
Client:- “Zairi, I read your email and you’ve got the info that we want, right?
Myself:-Yes sir, we’ve emailed our final invoice to you and upon payment, we’ll release the info to your part.
Client:- May I know, is the info that you got showed some linkage to this particular person that we are investigating? If the info does not show any linkage, then we won’t pay you!!
Myself:-Well sir, let me reassert our position and standpoint, whatever information that you want us to secure, we managed to secure it and our report will be based on the information that we have in hand. Our main concern is on the accuracy of the info and whether it has any linkage to the person that you are investigating or not, it will be on your part to decide on it as we will just report the truth.
Client: My question is simple whether there is any linkage or not, because if it does not, then we won’t pay you!!
Myself: The question sounds simple but difficult to answer. I won’t answer then.
When I was in my master class listening to one of my risk management lecturer explaining on the importance of risk management and the emergence of enterprise risk management in businesses, suddenly a story of her personal friend getting married to an impostor cropped out and a topic of background check was discussed. We were told that this unfortunate lady only realized that her husband was defrauding her after 10 years of marriage and eventually the marriage ended due to lost of trust.
Apart from personal experiences of individuals dealing with fraudster, there were also a lot of enterprises had suffered due to their failure to carry out background check on criminals in their organization. Based on an article in www.compliancex.com, let us examine the experiences of these organizations so that we can eventually understand the importance of us conducting a background check to protect our personal or business interest:-
Idea of how GPS tracking works is quite simple. A GPS tracking device works by communicating with satellites that orbit around the planet. These satellites are owned by the United States Department of Defense that were opened for civilian use since 1996. These 24 satellites are responsible for feeding the exact location on to the tracking device.
The signals they transmit are very accurate because they all work simultaneously. Apart from the location, they can also give data that will show the tracking device’s speed, altitude, and direction.
Truly, the technology of GPS has come a long way. Now, we see them on mobile phones and in the internet.
In becoming an effective surveillance operative, one of the most crucial skill that need to be grasped and mastered is the skill to set up a static observation post or some other private investigator terms it as “stationary surveillance post”. Relevant questions such as “Where do I set up my surveillance vehicle?”, How close should I be to the subject’s house?”, and “What if I can’t see the subject’s residence directly?”, are all the questions that might crop up in the course of carrying out the surveillance measure. Below are some insights that might be considered in addressing the issues above:-
Infidelity, Extra Marital Affair, Secret Lover or in Malay they call it ‘Curang” or “Makan Luar”, these are the names and terms which are referred to a cheating spouse and no doubt with the sophistication of Malaysian family from time to time and maybe due to lacking of religious foundation, these type of cases are on the rising mode.
Proper planning and preparation is always one of the key factor to your success in whatever that you intend to achieve. This concept also applies in a surveillance operations where before your actual surveillance even begins there are several things you can do to ensure that your surveillance efforts will be successful. Consider these five (5) tips:
Surveillance or Observation job is one of the main task in a job description of a Private Investigator. Its either you become the coordinator of your own surveillance team which can be comprises of one, two or more operatives at one time at a site or you yourself will have to go on the ground carrying out the task yourself. I’m not going to be touching on the topic which method is the best in carrying carry out the task , but I would like to highlight the findings that was presented in one of the forum where I am one of the member. The issue that was brought up was:-
“If your mark becomes aware that you are watching them, what reactions have you observed from them”?
1. Private Investigation Industry in Malaysia has been in place for so long that the act which governs the conduct of Malaysian Private Investigator in Malaysian has since being enacted in 1971 which is known as Private Agencies Act 1971.
2. Private Agency Act 1971 outlines that any company or an individual who wants to operate a private investigation business, a licensed need to be obtained from the government and at this current moment, the license is issued by Ministry of Internal Affairs.