Background
Integras Intelligence assists organizations with investigations around the globe. During these engagements, we typically identify opportunities for the organization to prevent future issues, often by reviewing policies and procedures. Either these critical guides don’t exist or they are not properly documented. Sometimes the documentation is not reviewed on a regular basis and is outdated. Frequently, employees either do not know such documents exist or they ignore them, partly due to lack of formal training on this critical information.
Situation
A global manufacturer learned that a sensitive shipment did not make it to its final destination. The company contacted us for answers—and recommendations for improving their supply chain security.
First, we had to understand who was involved. Then, we reviewed relevant documentation and CCTV footage, interviewed personnel, and coordinated with law enforcement. After weeks of digging, interviewing, and reviewing documents, we discovered that an individual had studied the protocols (and weaknesses) for handling shipments at a certain facility. Equipped with falsified documents and a vehicle with incorrect tags, he was able to steal the shipment without detection.
Once we learned what had happened, we identified several vulnerabilities, including the following:
- Existing policies and procedures were several years old. Not only was the information outdated, but most employees were also unaware of their existence.
- The company had no formal training process. Informal training took place on the job during the first day of employment.
- Responsibility for post-theft actions was unclear.
- Several years had passed since the facility’s last security assessment.
- Some critical cameras were not functioning properly. Security personnel did not review camera footage regularly, only when incidents occurred.
Solution
Integras Intelligence partnered with the client to do the following:
- Update policies/procedures and documents, including a new policy that requires annual review
- Develop a formal training program
- Create a process for handling future thefts
- Conduct a security assessment and develop a schedule for future assessments
In addition, we worked with local law enforcement to identify the suspect, who appears to have committed similar acts at other facilities. Law enforcement is actively tracking down this individual and pursuing prosecution.
Conclusion
When it comes to security and risk management, proactive efforts are better than reactive ones. It’s all too easy to become complacent once we’ve checked off an item—like creating a company policy or establishing a standard procedure. When a loss or other incident drives us to scramble for a solution, it’s too late. Careful, consistent planning before an incident occurs will safeguard your organization and prepare you to face unknown threats in the year ahead.