BOOKS: John Strauchs (as primary author or as contributor)

John Janis Strauchs, The Boys in the Woods: Inside the CIA, [e-book], Amazon Kindle,2015

John Janis Strauchs, The Arcturus Man, [e-novel], Amazon Kindle, 2012.

John Janis Strauchs, Jupiter’s Rings, [e-novel] Amazon Kindle; Barnes & Noble Nook, 2011.

John Janis Strauchs, Tides, [e-novel] Amazon Kindle; Barnes & Noble Nook, 2011.

Louis A. Tyska, Lawrence J. Fennelly, Mark H. Beaudry, Security in 2020, John J. Strauchs, “Convergence of IT and Security,” Alexandria, VA: ASIS International, 2010.

John J. Strauchs, William C. Cunningham, and Clifford W. Van Meter, Private Security Trends: 1970 to 2000 - The Hallcrest Report II, Stoneham, Massachusetts: Butterworth-Heinemann, 1990

Security Industry Buyers Guide-1988-1992 editions, [Technical Consultant], Bethesda, Maryland: Bell Atlantic/ASIS.

John J. Strauchs, Standard Practice for Security Engineering Symbols, ASTM Standard F967-85/90, American Society for Testing and Materials, Philadelphia, Pennsylvania.

Richard W. Kobetz (ed.), Providing Executive Protection, John J. Strauchs, "An Executive's Guide to Security Construction Projects," Berryville, Virginia: Executive Protection Institute, 1990.

Louis A. Tyska and Lawrence J. Fennelly (ed), Security in the Year 2000 and Beyond, John J. Strauchs, "Transportation Security -- Can We Meet the Challenge of the Future?"Palm Springs, California: ETC Publications, 1987.

Shari Mendelson Gallery (ed.), Physical Security: Readings from Security Management Magazine, John J. Strauchs, "Passive Infrared, “Woburn, Massachusetts: Butterworth Publishers, 1986.

John J. Strauchs, "Home Security and Personal Emergency Response Systems," National Conference on Safety for Older Consumers: Proceedings and Recom¬mendations, U.S. Consumer Product Safety Commission and American Society for Testing and Materials, Philadelphia, Pennsylvania, 18 September 1985.

Louis A. Tyska and Lawrence J. Fennelly, Controlling Cargo Theft: A Handbook of Transpor¬tation Security, John J. Strauchs, "Mass Transit Security Programs Can Miss the Mark," Woburn, Massachusetts: Butterworth Publishers, 1983.

John J. Strauchs, Visitor Safety and Security at Corps of Engineers Projects, U.S. Army Engineer Waterways Experiment Station, Vicksburg, Mississippi, (Technical Report R-82-1) 1982.

John J. Strauchs, Practical Guide To Documenting a Local Program, U.S. De¬partment of Health, Education and Welfare, Washington, D.C., 1978.

BOOKS: Citations

Hampton Sides, Americana: Dispatch from the New Frontier, Anchor Books, 2014

Julia Angwin, Dragnet Nation: A Quest for Privacy, Security, and Freedom, Henry Holt & Co, 2014

Tanya Spencer, Personal Security: A Guide for International Travel, CRC Press, 2014.

David Morrell, The Interrogator, The David Morrell Short Fiction Collection #3, “Introduction,” Smashwords Edition, 2012.

Tricia Jenkins, The CIA in Hollywood, University of Texas Press, 2012.

Olson, Slavich, Peddicord & Zalesny, Commercial Building Security Industry Sector Analysis: Commonly Used Security Measures and Industry Trends, (contributor), Pacific Northwest National Laboratory, U.S. Department of Energy, PNNL-19840, September 2010.

Mary Alice Davison, The Gold Standard: ASIS Celebrates 50 Years of Advancing Security, (citations). Alexandria, Virginia: ASIS International, 2004.

Larry Elder, Showdown: Confronting Bias, Lies, and the Special Interests That Divide America, (citation), New York, St. Martin’s Griffin, 2003.

Robert L. Oatman, The Art of Executive Protection, (citation), Baltimore, Maryland, Nobel House, 1997.

William C. Cunningham and Todd H. Taylor, Private Security and Police in America (The Hallcrest Report I), "Security Consulting: Engineering-Related," (Citation), Portland, Oregon: Chancellor Press, 1985.


“Vulnerabilities to Terrorism Against Infrastructure and Nuclear Power Plants,” Secure Freedom Radio with Frank Gaffney, WRC 1260, IRN/USA and Talk Radio Network, 17 September 2014.

“SCADA and PLC Vulnerabilities in Correction Facilities, 28c3m: BSidesBerlin [via Skype], Berlin, Germany, 06 February 2012.

“Prison Electronic Systems and PLCs,” Paul’s Security Weekly [Blog], Episode 257, 01 September 2011.

Radio Interview, Hacking at Random (HAR, FM 106.8), Vierhouten, Netherlands, 14 August 2009

“Canned Risk Assessment Systems,” WFTV, Orlando, Florida, 10 August 2005.

“Debate with Mayor Koch over New York City Mayor’s SecurityCommandCenter,” Equal Time, CNBC, 19 June 1998.

"How the War With Iraq May Affect Airport Security," WNBC News, New York City, 09 February 1998.

"Hospital Security," Channel 8 News, Washington, D.C., 06 February 1998.

"Security at the Olympics," Today Show, NBC, 29 July 1996. (transcript)

"Bombing at Olympic Centennial Park," NBC Nightly News (Tom Brokaw), 29 July 1996. (transcript)

"Security at the Olympics," Today Show, NBC, 31 July 1996. (transcript)

"Balancing Safety and Freedom in America," Jim Lehrer News Hour, Public Broadcasting (PBS), 19 July 1996 (transcript and recorded)

"Domestic Terrorism and Congressional Legislation," NET TV, 09 November 1995.

"Private Security in America," G. Gordon Liddy Show, 21 May 1993. (recorded)

John J. Strauchs, (Consultant), Motion Picture, Sneakers (Robert Redford and Sidney Poitier), 1992, Universal Studios, California.


By John Strauchs

“Schools Need Schooling in Security,” C2C Blog,, 03 April 2013

“Time to Triage,” The Checkpoint (Rapiscan Systems Blog),, 25 March 2013

“Special Report: Wireless Trends—The Great ZigBee Caper,” Security Infowatch, 19 July 2012

“Securing High-Risk Hotels,” Security Management, July 2012

“What Is BIM and Should You Care?” Security Dealer & Integrator, April, 2012

“SCADA & PLC Vulnerabilities in Correctional Facilities,” [White Paper] DefCon 19, Las Vegas, NV, 07 August 2011

“Security Architecture Quality Control Checklist,” FacilityCare, March/April 2011.

“The Melding of Technologies: IT and Security—A Survey,” Security Management On-Line, June 2009.

“CCTV: Panacea or Problem?”, Security Management On-Line, July 2008

“The Herd Instinct,” Security, July 2008

“MythBusters Are Busted,” Security, February 2008

Security Blog Postings,, September 2007 to present: “Video Surveillance – What is the Common Good?,” “Big Corporations Discover Security,” “Why Attack Lions?,” “Security in Hollywood, Myths and Legends,” “Design-Build Folly,” “Airport Screening Flap,” “Robot Weapons Go Nuts and WarGames,” “What’s in a Name?”, “Is there a Core Competency Gap at DHS?”, “Video Cameras, Panacea or Tar Tip? (Parts 1 thru 4),” “MythBusters Busted (Parts 1 thru 2),” “NASA Scientists Furious Over Presidential Directive,” “Isn’t it Time to Triage Security?,” “The Way We Were (Before 9-11 and D. B. Cooper),” et. Ali.

"Internet-Based Security System Service Almost Ready For Prime Time, Access Control & Security Systems, March 2003.

"Loss Prevention Technology in a Total Systems Environment," Security Technology & Design, August, 2001.

"Which Way to Better [Access] Control," Security Management, January 2001.

"The Yin and Yang of Security: Justifying a Security Approach," Security Technology & Design, November 2000.

“Security Trends for the New Millennium,” The Solutions Source, ADT Security Services, Fall 1999.

“Benchmarking America,” Security, May, 1999.

“Adding Method to the Madness - Command Center Design,” (interview), Access Control& Security Systems, March 1999.

"Platform Diving" (A Trend Toward Windows NT), Security, July 1998.

"Vulnerability of the Corporate Backbone Needs Attention," Security, July 1998.

"Effective Security Screening," Security, June, 1997.

"Help Wanted: Experienced Terrorists," Security, April, 1997.

"Is the Intelligent Building Concept A Technical Reality Or A Tar Pit," Security Technology & Design, Sep 1996.

"In Bed with New Wisdom," Security, January, 1996.

"Reduce Risks in Computer Rooms," Security Strategist, Risk Management Advisor, May, 1995.

"Retrofitting: Planning and Implementation of Security and Fire Systems, “Security Technology & Design, December 1994.

"Security Advice: Don't Spend More Than the Risk Is Worth," Washington Business Journal, December 09, 1994.

"Security in Architecture," Security, September, 1994.

"This Is A Test - A Layperson's Guide To Testing And Inspecting Security Systems," Today's Facility Manager, March 1994.

"Security Consultants," Today's Facility Manager, October, 1993. (no copy)

“Do-It-Yourself Security Testing,” Security, August 1993.

Combating Drug Trafficking in the Workplace, U.S. Bureau of Justice Assistant, National Institute of Justice, Washington, D.C., 1993.

"Security Industry Trends: 1993 and Beyond," Security Management, December, 1992.

“Private Security: Patterns and Trends,” Research in Brief, National Institute of Justice, August 1991.

“Can Security Professionals Fly With the Angels?," Security Manage¬ment, July 1987.

"Is Your Business Being Robbed?", Automotive Rebuilder, March 1986.

"Designing the Computer Room for Security," Datapro Reports on Infor¬mation Security, Datapro Research Corpo¬ration, McGraw-Hill, Delran, NJ, January 1986.

"The Question of Specifications: Having the Right Stuff," Security Management, October 1985.

"Overview of Intrusion Alarms," Datapro Reports on Information Security, Datapro Research Corpo¬ration, McGraw-Hill, Delran, NJ, June 1985. (no copy)

"Living With Violence Abroad," Security Management, June 1984.

"Security: How Safe Is Your Investment in Inventory?" Automotive Volume Distri¬bution, May 1984.

“Proposed Security Symbols: A Comparison," Security Management, October 1983.

"A Step Toward Security Standards," Security Management, September 1983.

"Finding the Cause of Inventory Shrink," National Foremen's Institute: Security Management, 25 May 1983.

"Portable Protection," Security Management, March 1983.

"The Security Engineer - A New Professional," Security Systems Admini¬stration, March 1983.

"An Elusive Profession [Security Engineering]," Security Manage¬ment, October 1982.

"Getting Active About Passive Infrared [Sensors]," Security Manage¬ment, June 1982.

"Mass Transit Security Programs Can Miss the Mark," Security Manage¬ment, February 1982.

"How Biased Is an Interview? [Psychological Aspects of Interviewing]" Security Management, October 1978.


Interviews and Citations

Andrea Olson, “CybersecurityExperts Share Safety Tips with UM Students,” NBC Montana, KECI, 18 December 2014.

Jordan Robertson, “The Top 10 White-Hat Hacks,” Bloomberg, 22 July 2014.

Carlton Purvis, “Biggest Misconceptions Security Managers Have About CCTV,” IPVM, 09 April 2014

Kim Zetter, “Prison Computer ‘Glitch’ Blamed for Opening Cell Doors in Maximum Security Wing,” Wired, 16 August 2013

Dennis Fisher, “State of SCADA Security ’Laughable’ Researchers Say,” threatpost (Kaspersky Lab Security News), 07 February 2012.

Meghan Kelly, “Vulnerability Allows Hackers to Open Prison Doors, Hiding Activity from Central Control,” VentureBeat, 07 November 2011.

Shaun Waterman, “Prisons Bureau Alerted to Hacking Into Lockups,” Washington Times, A7, 07 November 2011.

Shaun Waterman, “Feds Concerned About Hackers Opening Prison Doors,” Washington Times, 04 November 2011.

Kim Zetter, “Researchers Say Vulnerabilities Could Let Hackers Spring Prisoners From Cells,” Wired, 29 July 2011.

Laura Spadanuta,”Always Room for Improvement,” Security Management, February 2011.

Steve Stanek, “Tougher Airport Checks Fuel Outrage,” The National, January 2010.

Bill Zalud, “Convergence 2.0,” Security, February 2009.

“Do You Think Your Civil Liberties and/or Privacy Are Violated by Government Programs, Such as CAPPSII,” Government Security, 01 August 2004.

Stephen Ursery, “Taking Stock of Building Security,” American City & County, September, 2003.

James Ott, "Tight Security Compels Airport Design Shakeup," Aviation Week and Space Technology, 18 February 2002 (no copy)

Michael A. Gips, “CEOs Are Mixed on Terrorism Concerns,” Security Management Online, April 2002.

Sherry L. Harowitz, "Altered States: The Evolution of Protection," Security Management, January 2002.

Chris Royse & Barbara Johnson, “Security Considerations for Microbiological and Biomedical Facilities,” (citation) Anthology of Biosafety V – BSL4 Laboratories, 2002.

Brett Lieberman, "Hardening the Workplace," Virginia Business, December 2001.

“Watching Over Us,” Andrew Access Article, 2001.

Thomas G. Dolan, "Evil From Above, or Incompetence from Within," Security Technology & Design, October 2001.

Alex Salkever, "The Coming Face of Security," Business Week, 12 September 2001.

Michael A. Gipes, "Integration or Dis-Integration," Security Management, May 2000.

Sherry Harowitz,, "A World of Possibilities," Security Management, January 2000.

“The ‘Big’ Break,” (citation), Access Control & Security Systems, March 1999.

“Anthrax! Scary, Costly, Real,” Security, February 1999.

“Integrating Security and Building Controls,” Security Management, January 1999.

Ewart Rouse, “A Surveillance Firm Finds Security in Camden,” Philadelphia Inquirer, 18 October 1998.

Michael A. Gips, "Assessing Trends in Access Control," Security Management, September 1998.

“Atlanta Remembers Bombing,” (citation)ABC News.Com, 27 July 1998.

M. Major, "Expanding and Upgrading into Integrated Systems," Security Technology & Design, May, 1998.

Kate Doherty, “Beyond the Gore Commission: What Next?,” Security Solutions Online, May, 1998.

Kathryn Hamilton, "Planning for Proactive Security Management in Year 2000," Buildings, February, 1998.

"Casino Security," Play Graph Magazine, Japan, February, 1998.

"A Different Buyer's Guide; A Buyer’s Philosophy," Security, January, 1998.

Barr Seitz, “Olympic Bombing Victims Sue,” (citation)ABC News.Com, 11 November 1997.

"Feds Help Companies Operating Overseas," Security, October, 1997. (no copy)

Tom Squitieri, "Atlanta Olympic Officials Were Warned of Threats to Security,"USA Today”, 24 July 1997, 2A.

“Terrorism – Security Engineering,” Crime & Justice International, February 1997.

“The Uncivil War,” Criminal Justice Center, Sam Houston State University, January-February 1997.

"Get Real On Terrorism, Says Security Expert," Security, September, 1996.

"Systech, Others to Gain from Fed, Corporate Link," (citation), Security, September, 1996.

Stephen C. Fehr, "Closing [Pennsylvania Avenue] Called Only Safe Avenue," Washington Post, 03 July 1996.

Carl J. Panek, "Secret Service Defends Closure of Pennsylvania Ave.," Chicago Tribune, 09 June 1996.

M. Cherie Black, "Critics Want to Reopen 'America's Main Street'," The Washington Times, 08 June 1996.

Burton Royce, "One Year Later...Oklahoma City Revisited," Access Control & Security Systems, April, 1996.

Wendy K. Loerch, “Giving Security Its Due – Due Diligence Helps Prevent Mistakes,” Facilities Net, 1996.

"1995: Year in Review Shows Dramatic Changes in Security, Security Sales, December, 1995.

Michael Terrazas, Asst Ed, "Guarding Against Another Oklahoma City," American City and County, June, 1995.

Mark Spaulding, "Analyze Needs, Options When Networking Systems," Security, June, 1995.

Sherry L. Harowitz, "Reengineering Security's Role" Security Management, November, 1993.

Sherry L. Harowitz, "More Than Meets the Eye: Biometrics," Security Management, February, 1993.

Kent Black, "The Operatives Behind 'Sneakers'; Los Angeles Times, 15 September , 1992, p. F-1.

Julian Grey, "Trade Secrets ," Entertainment Weekly, September 11, 1992.

"Eye on Intelligence," (Security Spotlight), (citation), Security Management, July, 1992.

“Sistemas de Deteccion y Control,” Cuadernos de Seguridad, Informeo, Caracas, Venezuela, 09 June 1991.

Rebecca D. Russell, "Specifications Help Maximize Equipment, Security Capabilities," Security, April 1991.

Rebecca D. Russell, "Consulting/Engineering Growth Leads Industry Into 2000," Security, Dec 1990.

"Hallcrest II: The State of Security," [review], Security Management, December 1990.

Bill Zalud, "What's Happening to Security," Security, September 1990.

Amy Hessel, "Store Security," Jobber Retailer, September 1990.

W. Hampton Sides, “Waiting for Liddy,” (citation), The Washingtonian, August 1987.

George M. Walsh, “Hey Rambo, Get Out of the Way,” (citation), The Journal-News, Rockland County, New York, 10 September 1986.

Stephen Brown, "Security Engineering: Directors & Engineers Work Together,", Security World, March 1984.

"Specifying a Security System," Security World, February 1981.

“Terrorism Wave Should Escalate, Panel Maintains,” (citation), Diamondback, University of Maryland, 14 March 1977.


“Vulnerabilities of Security Sensors,” University of Montana, Missoula, 18 December 2014.

“Defeating Intrusion Sensors,” GoRuck, Trek Event, Jacksonville, FL, 11 October 2013.

“The Bombing of the World Trade Center in1993: A Wellspring of Counterterrorism Planning,” Panasonic Federal Security Symposium, The Army and Navy Club, Washington, D.C., 12 September 2013.

“The Bombing of the World Trade Center in 1993,” Association of Former Intelligence Officers, New England (AFIO/NE), Milford, MA, 22 June 2013.

“The Gauntlet: Defeating Alarm Systems,” Kaspersky Security Analyst Summit, San Juan, Puerto Rico,05 February 2013.

“Physical Security Vulnerabilities: Intrusion Detection Sensors,” Center for Advanced Vehicle Engineering, Battelle Memorial Institute, Aberdeen, MD, 14 August 2012.

“PLC Vulnerabilities in Correctional Facilities,” In-Q-Tel, Arlington, VA, 18 May 2012.

“PLC/SCADA Vulnerabilities in Correctional Facilities,” Source Boston, Boston, MA, 18 April 2012.

“SCADA and PLC Vulnerabilities in Correctional Facilities,” Kaspersky Security Analyst Summit, Cancun, Mexico, 03 February 2012.

“Protecting the Justice System from Cyber-Attacks,” International Association of Security & Investigative Regulators (IASIR), Alexandria, VA, 02 November 2011.

“SCADA & PLC Vulnerabilities in Correctional Facilities, Hacker Halted USA, Miami, FL, 26 Oct 2011.

“SCADA & PLC Vulnerabilities in Correctional Facilities,” DefCon 19, Las Vegas, NV, 07 August 2011.

“Security-A County Government Perspective,” Virginia Association of Counties Risk Pool (VACORP), Manassas, Williamsburg, and Roanoke, VA, 22-24 February 2011.

“Security-A County Government Perspective,” West Virginia Counties Risk Pool, Bridgeport, WVa, 25 February 2011.

“Security and IT Convergence,” DojoCon at ReverseSpace, Herndon, VA, 11 December 2010.

“Convergence of Security and IT,” University of Maine, COS 499, 13 April 2009.

“A Convergence of Communities (Security and IT),” Hackers on Planet Earth--Last HOPE Conference, New York, New York,18-20 July 2008.

“Convergence of Security and IT,” University of Maine, COS 499, 14 April 2008.

“Triaging Security Resources,” ASIS. Western New Jersey Chapter, Randolph, New Jersey, 02 November 2007.

“A Sea Change for the Security Industry,” MESDA (Maine’s Software and Information Technology Industry Association), Westbrook, Maine, 12 September 2007.

“Counterintelligence,” University of New Haven, Connecticut, 08 February 2007

“Homeland Security in North Carolina: A Security Industry Practitioner’s Perspective,” Exploris (Terror in America; The Spy Museum), Raleigh, North Carolina, 10 September 2006.

“Security Surveys,” Electric Power Conference 2005, Chicago, Illinois, 07 April 2005.

"High and Low-Tech Countermeasures to Terrorism," Maine Law and Technology Associates, University of MaineLawSchool, 05 October 2001.

"Workplace Violence - The Prevention Discussion," Facility Forum 2000, Today's Facility Manager, Atlanta, Georgia, 03-05 April 2000.

"CCTV - The Corporate Perspective: Privacy, Liability and Reliability," Security Industry Association, AmeliaIsland, Florida, 07 February 2000.

"An Ineffective Physical Security Plan and How This Impacts Risk Assessment," A.S.I.S., Greater Philadelphia Chapter Annual Workshop & Exhibits, Plymouth Meeting, Pennsylvania, 21 October 1999.

"Changing Government Tactics in Response to Terrorism," Association of Former Intelligence Officers, Falls Church, Virginia, 25 October 1996.

"Testimony on the Closing of Pennsylvania Avenue, Washington, D.C. at the White House for Security Reasons," Congress of the United States, U.S. Senate, Committee on Governmental Affairs,¬ Senator Stevens, Chairman, 26 June 1996.

"Testimony on the Closing of Pennsylvania Avenue, Washington, D.C. at the White House for Security Reasons," Congress of the United States, House of Representatives, Committee on Government Reform and Oversight, District of Columbia Subcommittee, Congressman Tom Davis, Chairman, 07 June 1996.

"Domestic Terrorism," A.S.I.S.,Arlington, VA, July, 1995.

"Matching Countermeasures to Threat," A.S.I.S. Washington, D.C. Chapter, Arlington, VA, March, 1995.

"Security Technology Seminar," A.S.I.S. Ottawa Chapter, Ottawa, Canada, May, 1994.

"System Specification," Access Control Conference/Expo, Atlanta, GA, March, 1994.

"Refocusing Physical Security Programs For the Protection of Intellectual Property and Trade Secrets," First Annual Corporate Intelligence Symposium, ShenandoahUniversity, Winchester, Virginia, April, 1992.

"Security High Technology - Today and Tomorrow," Ameritech Conference, ArthurAndersonConferenceCenter, St. Charles, Illinois, May, 1992.

"The Future of the Private Security Industry - Privatization," State of Virginia, Department of Criminal Justice Services, Annual Private Security Management and Training Conference, Virginia Beach, Virginia, November, 1991.

"Private Security and Public Law Enforcement Cooperation," LehighValley Chapter, ASIS, Allentown, Pennsylvania, September 1991.

"Security to the Year 2000," Professional Security Television Network, Washington, D.C., January 1991.

"High Security Technology: Are We Utilizing What We Have?", American Correctional Association (ACA) Winter Conference, Nashville, Tennessee, January 1990.

"To Specify or Not to Specify," American Institute of Architects (AIA), Committee on Architecture for Justice, St. Louis, Missouri, October 1989.

"The Facility Managers Role in Security Program and Systems Development," The International Facility Managers Association (IFMA), Capital Chapter, Washington, D.C., 23 June 1989.

"The Strengths and Limitations of Electronic Access Control at Airports," American Association of Airport Executives (AEEE), Washington, D.C., 15 June 1989.

"Systems in Security," Assets Protection Course I (APC-I), American Society for Industrial Security (ASIS), Caracas, Venezuela, Oct 87; Philadelphia, PA, Mar 88; San Diego, CA, Oct 88; Dallas, TX, Mar 89; Madrid, Spain, Oct 89; San Francisco, CA, Nov 89; San Diego, CA, Mar 90; Ottawa, Canada, Apr 90; Dallas, TX, Nov 90; Chicago, IL, Mar 91; Atlanta, GA, Nov 91; Philadelphia, PA, Mar 92; St. Louis, MO, Nov 92; Seattle, WA, Mar 93; Washington, D.C., Nov 93; Atlanta, GA, Mar 94; Dallas, TX, Oct 94; Amsterdam, The Nether¬lands, Oct 94; San Diego, CA, Mar 95; Boston, MA, Mar 96; Dallas, TX, Nov 96; Baltimore, MD, Mar 97; Long Beach, CA, Nov 97; Boston, MA, Mar 98; Denver, CO, Nov 98.

"Technical Innovations in Security," Assets Protection Course II (APC-II), American Society for Industrial Security (ASIS), San Antonio, TX, May 88; Atlanta, GA, May 89; New Orleans, LA, May 90; Madrid, Spain, Oct 90.

"Security for Health Departments," Prince George's County (Maryland) Health Department, 27 July 1988.

"The Application of Physical Security Systems," [two-day seminars] University of Delaware, Wilmington, Delaware, December 1984, January 1985, March 1985, November 1985, March 1986, May 1986, July 1986, November 1986, March 1987, April 1987, July 1987, November 1987, March 1988.

"Electronic Security," Office of Diplomatic Security Training Center, U.S. Depart¬ment of State, Washington, D.C., April 1987; May 1987; October 1987.

"Security for Public Works Facilities," American Public Works Associations Seminar, 21 September 1987.

"Providing Protective Services," Richard W. Kobetz & Associates Seminars, May 1985, March 1986, May 1986, October 1986, March 1987, May 1987, November 1987, May 1988, October 1988, Winchester, Virginia.

"Technology and Counterterrorism," Richard W. Kobetz & Associates Seminars, April 1985, Chicago, IL; August 1985, Salt Lake City, UT; February 1986, New Orleans, LA; April 1986, Las Vegas, NV; June 1986, Houston, TX; October 1986, Pittsburgh, PA; December 1986, Washington, D.C.

"Physical Security", Richard W. Kobetz & Associates Seminars, June 1988, Winchester, VA.

"Hotel Security," Richard W. Kobetz & Associates Seminars, February 1985, New Orleans, LA; April 1985, Chicago, IL; June 1985, Valley Forge, PA; September 1985, Dallas, TX; January 1986, Orlando, FL; April 1986, Las Vegas, NV; June 1986 Houston, TX; July 1986, Chicago, IL; September 1986, New Orleans, LA; January 1987, Orlando, FL; April 1987, Chicago, IL.

"Corporate Aircraft Security," Richard W. Kobetz & Associates Seminars, January 1985, Orlando, FL; June 1985, Valley Forge, PA; August 1985, Salt Lake City, UT; September 1985, New Orleans, LA; October 1985, Detroit, MI; January 1986, Orlando, FL; April 1986, Atlanta, GA; July 1986, Chicago, IL; January 1987, Orlando, FL; April 1987, Chicago, IL; July 1987, Winchester, VA.

"A No Nonsense Approach to Security," Annual Convention and Exposition, Automotive Parts Rebuilders Association, September 1986, Dallas, Texas.

"Lighting, Alarm Specifications and Blueprint Reading," 31st Annual Seminar, American Society for Industri¬al Secu¬rity (ASIS), Dallas, Texas, 29 Sep¬tember 1985.

"A No Nonsense Approach to Security," Annual Convention and Exposition, Automotive Parts Rebuilders Association, February 1985, New Orleans, Louisiana.

"Guarding Against the Defeat of Intrusion Detection Sensors," Nine Live Associates, Third Annual Confer¬ence, The Green¬brier, White Sulphur Springs, West Virginia, Decem¬ber 1984.

"Protecting Warehouses and Loading Docks," 30th Annual Seminar, American Society for Industrial Security (ASIS), Chicago, Illinois, September 1984.

"The Federal Role In Transportation Security," 29th Annual Seminar, American Society for Industrial Security (ASIS), Washing¬ton, D.C. September 1983.

"New Techniques and Technology in Transportation Security," 28th Annual Seminar, American Society for Industrial Security (ASIS), Atlanta, Georgia, September 1982.

"Solving Security Problems in Nursing Homes," 32nd Annual Conven¬tion, American Health Care Association, San Antonio, Texas, 1981.

"Transportation Security Update," 27th Annual Seminar, American Society for Industrial Security (ASIS), New Orleans, Louisiana, September 1981.

"Developing a Security Profile," International Security Conference, New York City, New York, 1980.

"Reconciling Security and Life Safety Conflicts in Public Transpor¬tation," 26th Annual Seminar, American Society for Industrial Security (ASIS), Miami, Florida, 1980.

"The Security Manager's Role in Risk Management," International Security Confe¬rence, Chicago, Illinois, 1980.

"Application of Counterterrorism Techniques," [conducted for special police units from Eastern United States], University of Maryland, 1979.

"New Trends in Terrorism," [conducted for special police units from cities of Baltimore and Washington, D.C.], University of Maryland, 1977.


Elected "Distinguished Fellow," Academy of Security Educators and Trainers (ASET), 20 April 1988.

President's Annual Award, "Certificate of Merit," American Society for Industrial Security (ASIS), 30 Septem¬ber 1987.

John J. Strauchs