| "Counterfeit Colgate Has Poisonous Chemical" Washington Post (06/15/07) P. D3 ; Yang, Xiyun Colgate-Palmolive has announced that counterfeit tubes of its Colgate toothpaste containing a poisonous substance have been discovered at stores in Maryland, New Jersey, Pennsylvania, and New York. At present, there are no reports of anyone becoming sick after using the counterfeit products, which appear to have come from China. The poisonous compound diethylene glycol (DEG), which is used in antifreeze, has been discovered in the counterfeit toothpaste. (go to web site) "Campus Killers' Warnings Ignored" USA Today (06/13/07) P. 1A ; Frank, Thomas USA Today has conducted a broad examination of 110 college homicides since 1991, concluding that flawed or insufficient security has played a role in many of the murders. In addition, many of the killers, including students and campus employees, had criminal or psychotic backgrounds that were not discovered until it was too late. USA Today determined that about 33 percent of the murderers had recently experienced rejection; a large proportion of this group were men would go on to murder a former girlfriend and then take their own lives. Seven of the murderers were spurned graduate students or flunking graduate students who killed a faculty member. Security expert S. Daniel Carter says that many college murders can be prevented, but colleges do not have systems in place for identifying violent students. After a murder occurs, colleges typically increase their security levels--more or less an admission that security was not tight enough in the first place. Colleges also have paid millions of dollars to settle lawsuits claiming that campus security was flawed. For example, the University of North Carolina has been sued by the family of a female student who was raped and killed in her college dorm room. The murderer in this case was the son of a university administrator who purposely omitted his son's criminal background on his son's admission application. (go to web site) "Diehard Security at World Preview" Channel NewsAsia (06/15/07) Security was exceedingly tight for a preview of the fourth installment of the Die Hard series of movies starring Bruce Willis. The preview of "Live Free or Die Hard," hosted by Twentieth Century Fox at a Paris theater, was open only to a select group of about three dozen trusted journalists who were carefully scrutinized to prevent anyone from making pirated copies of the movie, which has a U.S. release date of June 27. "U.S. studios are very reticent about screening movies ahead of release, and we personally guaranteed there would be nobody inside the cinema whom we did not have entire confidence in," said Fox France spokesman Alexis Rubinowicz. Two security guards monitored the audience during the preview. "For all big world releases we are extremely vigilant; we do everything possible to avoid piracy," said Fox France chief Jose Covo. If pirated copies of Live Free or Die Hard appear on the Internet before June 27, Fox will make the decision to only show previews the night before a movie's release, said Rubinowicz. Hollywood loses $6 billion annually to piracy, according to one estimate. (go to web site) "Sears Tower's Well-Grounded Security" Security Management (05/07) Vol. 51, No. 5, P. 59 ; Longmore-Etheridge, Ann For several years after the Sept. 11 terrorist attacks, the security team for Chicago's Sears Tower took a hard-line approach to security, as did many other commercial buildings during that time. Sears Tower is now under new owners who have replaced the hard-line approach to security with an approach that emphasizes subtlety and customer service while still maintaining the building's security. The change in approach was necessary because the building's tenants complained that the strict security measures were too oppressive and unwelcoming, prompting some tenants to leave the building. Following the Sept. 11 attacks, the previous owners of Sears Tower doubled the number of security guards at the building. However, the new ownership decided to reduce the number of full-time guards from 140 to 70, eliminate all proprietary guards, and switch to an all-contract force. The security officers receive extensive training, including a customized program for the Sears Tower and training from the FBI, Secret Service, and Chicago Police and Fire departments. The training places a heavy emphasis on customer service and greeting tenants and guests--even the officers' uniforms have been changed to reflect a more updated, professional look. The building's occupancy rate is climbing again thanks to the modified security approach, which also includes revamped visitor-management and tenant-access systems, fire drills, and role-playing exercises. (go to web site) "The Dreaded Gate" Access Control Trends & Technology (06/01/07) P. S8 ; Zunkel, Dick Pedestrian security gates are typically found along the perimeters of schools, commercial buildings, hospitals, apartment buildings, senior citizen centers, and similar structures. Pedestrian security gates are most effective when security and access/exit requirements are considered in the design phase, prior to the gate's construction and installation. Building codes in many parts of the country consider these types of gates similar to exterior doors if they are found in commercial buildings, schools, and hospitals. In climes with wet winters and dry summers, a steel frame gate with a wood fascia is a good option because it is both aesthetically pleasing and resistant to environmental factors. A standard hollow metal door and frame built into the fence is similarly resistant to environmental effects. Installers should consider that exterior security gates may encounter difficulty closing against the wind, and outdoor door-closers should contain oil with a viscosity that remains stable over various temperatures. Some state and local building codes place limits on the opening force on exterior doors to ease access for the handicapped, although the Americans With Disabilities Act Accessibility Guide has no bearing on the opening force. Many buildings have been using electric locking and emergency exit hardware on their gates since the Sept. 11 terrorist attacks. "A Push to Safeguard Pipelines" Newsday (06/13/07) ; Madore, James T. Two New York state lawmakers have unveiled legislation that calls for the state's Homeland Security Office (HSO) to review safeguards for natural gas, oil, and aviation fuel operations statewide. Sen. Dean Skelos (R) and Assemblyman Michael Gianaris (D) want the HSO to review protections for each pipeline and storage facility and inform owners how to make improvements. If the recommended steps are not taken, the owner would be required to pay fees and face other penalties from the state Public Service Commission (PSC). Initial assessments would be conducted next year, followed by assessments every five years. When introducing the bill, Skelos and Gianaris referred to the recent alleged plot of four men originally from Guyana and Trinidad and Tobago to blow up a 40-mile pipeline linked to Kennedy Airport. Gianaris asserted that pipeline owners "aren't as well-trained in antiterrorism efforts as our state experts ... [and] their incentives are not necessarily security first and foremost." But the owner of the Kennedy pipeline, Buckeye Partners, said that in the wake of the Sept. 11 terror attacks, it reviewed safeguards for its more than 5,000 miles of pipelines in 18 states. "Most of the problems with pipelines have been caused by contractors who have dug up the line," said Buckeye's Stephen Milbourne, who along with others fear that any additional legislation would raise pipelines' maintenance costs that would be passed along to consumers. (go to web site) "All-Star Game to Cost City a Pretty Penny" San Francisco Chronicle (06/11/07) P. B1 ; Matier, Phillip; Ross, Andrew San Francisco will host the Major League Baseball All-Star Game on July 10, and the U.S. Department of Homeland Security and local law enforcement agencies will be among the parties providing security for the event. The game will cost the city an estimated $700,000, with security accounting for the bulk of this total. Local law enforcement will play a vital role in the effort by providing security for MLB players and VIPs during an All-Star parade; police also will be tasked with maintaining a 100-foot security perimeter around the stadium for several days before the game. The San Francisco Police Department's Southern Station has been planning for the game for the past year. "No trucks will be allowed in without being screened," explained Capt. Denis O'Leary, chief of the Southern Station. The costs of the game could go up by a couple hundred thousand dollars after extra expenses associated with fire fighters, sheriff's deputies, medical workers, and others are factored in. The Bureau of Alcohol, Tobacco, Firearms and Explosives will have a presence at the event, as will the Coast Guard, which will be tasked with ensuring that boats keep their distance from the stadium. (go to web site) "Dollars and Sensors" Newsday (06/14/07) ; Eisenberg, Carol New York City Police Commissioner Ray Kelly is calling on federal legislators to fully fund the Homeland Security Department's pilot program, Securing the Cities, to guard against a nuclear or radiological attack. The program would establish a ring of radiological detectors on bridges, highways, and tunnels leading into New York City, within an approximately 50-mile range. Police officials from several states have united to lobby Congress for the $40 million needed to finance the project, which was developed in response to the 2005 London terror strikes. The London plot originated 180 miles north of London, in Leeds, illustrating the "regional aspect of the terrorist threat," said Kelly, and inspiring a more regional approach to security in the United States. In addition to the proposed Securing the Cities program, New York has joined forces with Baltimore, Buffalo, and other jurisdictions along the East Coast to identify threats before they reach the city. (go to web site) "FBI Warns Colleges of Terror Threat" Boston Globe (06/12/07) ; Murphy, Shelley; Bombardieri, Marcella U.S. colleges and universities should be aware of the possibility that terrorists or foreign spies could attempt to steal their research and use it for nefarious purposes, the FBI's Boston office warned Monday. The FBI said professors also should be careful when staying at foreign hotel rooms, as hackers could use the hotel's Internet system to break into their laptops. "What we're most concerned about are those things that are not classified being developed by MIT, Worcester Polytech, and other universities," said FBI special agent Warren T. Bamford. Bamford explained that the FBI just wants the academic community to be aware of potential threats and is not trying to restrict the flow of information or culture of openness on campuses. The FBI's Web site notes that terrorists and spies could pose as international students or visitors in order to study important scientific discoveries and advanced technologies at U.S. universities. The FBI plans to send its agents to campuses across the country in order to brief campus security personnel, students, and faculty about "espionage indicators." Those who notice anything suspicious should contact campus security, the FBI, or police, the FBI said. (go to web site) "Indonesia Says Captures Head of Jemaah Islamiah" Reuters (06/15/07) ; Nathalia, Telly The head of the Southeast Asian-based Jemaah Islamiah (JI) terrorist group is in the custody of Indonesian authorities after being captured June 9, Indonesian police announced Friday. The arrest of JI leader "Zarkasih" (alias Mbah) represents a huge setback for JI, and the announcement comes just two days after police announced the arrest of the chief of JI's military wing, Abu Dujana, who had been the most-wanted terrorist in Indonesia. Zarkasih "is the emergency head of JI," said one Indonesian anti-terrorism official. "He is above Abu Dujana and was captured on the same day." Police displayed video testimony from Zarkasih, who said he has been JI's acting chief since 2004. JI is believed to be responsible for several high-profile terrorist attacks in Southeast Asia, including the deadly 2002 Bali bombings. Indonesian Vice President Jusuf Kalla predicted that it would be just a matter of time before high-profile Malaysian terrorist Noordin Top is captured. (go to web site) "Pennsylvania to Provide $120,000 Grant to Cover Security at Flight 93 Crash Site" San Diego Union-Tribune (06/12/07) ; Lovering, Daniel The state of Pennsylvania has agreed to cover the costs of providing security at the memorial site for the victims of hijacked United Airlines Flight 93, which crashed outside Shanksville, Pa., during the Sept. 11 attacks. The $120,000 grant will pay for security at the site for the next two years, preventing the families of the victims from having to raise the money on their own, said Pennsylvania Gov. Ed Rendell. "It also eliminates any need for donation boxes, which transformed this hallowed ground into something less dignified," Rendell said. Rendell was referring to a donation box that landowner Mike Svonavec placed at the site to help defer the costs of security. The donation box offended the victims' families, prompting the National Park Service to cover the box with a black plastic bag. Svonavec, who owns 273 acres of the site, claims to have been paying $10,000 per month since February to secure the memorial site. Svonavec and the National Park Service have an agreement pertaining to the memorial and the use of his land. (go to web site) "Purdue Creates Scientifically Based Animation of 9/11 Attack" Purdue University News (06/12/07) ; Tally, Steve An animated simulation of the attacks that toppled the towers of the World Trade Center on Sept. 11, 2001, has been created by Purdue University researchers so that structural engineers can study the buildings' collapse in order that future disasters may be avoided. "Scientific simulations restrict us to showing the things that are absolutely essential to the engineer," explains Rosen Center for Advanced Computing director Christoph Hoffmann. "This gives us a simulation that doesn't deliver much visual information to a layperson. Our animation takes that scientific model and adds back the visual information required to make it a more effective communication tool." The new animated visualization owes a lot to computer science professor Voicu Popescu, who devised a translator application that establishes a connection between computer simulations and computer visualization systems to automatically render simulation information as a three-dimensional animated scene. The animation clearly represents elements, such as fire and smoke, that were not included in the scientific simulation, imbuing the computer model with a previously absent level of realism, according to Popescu. The visualization shows that most of the damage to the towers was caused by the weight of the fuel carried by the aircraft that slammed into the buildings, and not the aircraft themselves. The National Science Foundation partially funded the Purdue research. (go to web site) "Instant Messaging Poses a Big Risk" Financial Times Digital Business (06/13/07) P. 5 ; Ilett, Dan Real-time communication software can undermine security efforts by permitting unlimited numbers of individuals to directly link to a company network. Over 80 percent of companies employ some type of instant messaging (IM), as the tool has many business benefits, such as enhanced communication. While many organizations utilize free, Internet-based IM software, a growing number of worms and viruses are invading the more prevalent software, and experts are unsure as to who is launching the attacks. The most frequent attack comes in the form of a message, which either contains a link to a virus-spreading Web site, or a file attachment containing malicious code that can corrupt a computer and hijack it to launch other attacks, putting innocent workers on the line. To protect themselves, companies that convey information over a public network should either run their own closed system or use an encrypted, managed system. Companies should also be aware of the compliance issues, as Sarbanes-Oxley regulations require companies to regard IM conversations as documents, and therefore the conversations must be archived. Because IM began as a form of social networking, the tool may make it harder for employees to keep intellectual property from leaving the office. (go to web site) "A Dog or a Cat? New Tests to Fool Automated Spammers" New York Times (06/11/07) P. C1 ; Stone, Brad Captchas security puzzles are becoming increasingly easier for programs to solve, and increasingly more difficult for humans. The problem is that as online miscreants create better ways to bypass or defeat captchas, Web companies are responding by developing puzzles that are more difficult to solve, even for people. "They are creating tests that a reasonably healthy adult can't pass," says Gordon Weakliem, a programmer and blogger who said he failed a captcha test several times on the Microsoft Windows Live sign up page. To create puzzles that will block computers but be easier for people to solve, researchers are focusing on expanding the test beyond the current repertoire of 26 letters and nine digits. Microsoft has developed a captcha that asks Internet users to view nine images of household pets and select just the cats or dogs. "For software, this is wildly hard," says Microsoft research John Douceur. "Computers are tripped up by all the photos at different angles, with variable lighting conditions and backgrounds and the animals in different positions." The project is called Asirra, short for Animal Species Image Recognition for Restricting Access, and uses graphics of animals from a database of more than 2 million images. Other companies have chosen to keep their captcha projects secret, but PayPal's chief information security officer Michael Barrett says that PayPal's new tests may resemble image recognition and present pictures of, for example, a whale, a tree, and a head of lettuce, and ask the users to select the vegetable. "Captchas have gotten as good as they are going to get, and it is likely they are going to be slowly supplanted with a different technology that achieves the same thing," Barrett says. (go to web site) "Hardware Designed to Protect Data From Theft By Hackers" Chicago Tribune (06/11/07) ; Van, Jon In an effort to make computers more secure and reliable, University of Illinois at Urbana-Champaign researchers have been working for more than a year on the Trusted ILLIAC project, an effort to develop hardware that is capable of configuring itself to give each application a unique signature. The hardware cannot be reprogrammed by hackers and creates a barrier to protect sensitive data. "Hackers cannot reprogram it, and even insiders cannot access this data," says Ravi Iyer, chief scientist of the university's Information Trust Institute. "If they try to access it, they crash the application. They cannot corrupt it or even touch it." The National Science Foundation provided funding for the project, and university researchers also worked with researchers from Motorola, IBM, Hewlett-Packard, and Intel. Iyer says prototypes of the hardware could be made into cards that could be inserted into computers, but incorporating the hardware in processors is a more likely use of the technology. (go to web site) Abstracts Copyright © 2007 Information, Inc. Bethesda, MD |
No comments:
Post a Comment