Search This Blog

Friday, August 10, 2007

Security Management Weekly - August 10, 2007

header

  Learn more! ->   sm professional  

August 10, 2007
 
 
CORPORATE SECURITY  
  1. " Masterpieces Nabbed in French Art Heist"
  2. " Satellite Aids in Tracking Bank Robbers: Bad Guys Now Have to Worry About GPS Technology"
  3. " Government Set for a Crackdown on Illegal Hiring" New DHS Rules Aimed at Employees' Use of False Social Security Numbers
  4. " The Security Guard to the Stars" Private Security Guard Protects VIPs at Yankee Stadium
  5. " Retailers Organize Against Crime" Retailers Using Security Technology to Combat Organized Retail Crime Thieves

HOMELAND SECURITY  
  6. " Biological Surveillance Falls Short, Report Says" DHS Inspector General Criticizes National Bio-Surveillance Integration System
  7. " Earlier Terrorist Screening to Begin for Flights Into U.S."
  8. " Terrorists Teaming With Drug Cartels" DEA Report Says Islamic Terrorists in U.S. Posing as Hispanics
  9. " U.S. Qaeda Member Threatens Embassies and Diplomats"
  10. " Tornado Hits Brooklyn; Subway Back in Service" Storm Causes Tens of Millions of Dollars of Damage
  11. " Police Arrest Intruders Near Fallen Bridge, Boost Security"
  12. " Could Tiny Sensors Detect Bridge Crises?" Los Alamos Researchers Developing Sensors to Detect Structural Failure of Bridges

CYBER SECURITY  
  13. " City Man Charged With Selling Employer's Domain Name for $200K" Things to Consider When Buying Service-Oriented Architecture Security
  14. " Researchers Set to Spark Up New More Secure Network, Routers, Switches"
  15. " SOA Security: One Treacherous Journey" Things to Consider When Buying Service-Oriented Architecture Security


   









 

"Masterpieces Nabbed in French Art Heist"
Washington Post (08/07/07) P. A8 ; Moore, Molly

Five robbers wearing jumpsuits and masks stole four art masterpieces, including a Monet, from the Museum of Fine Arts in Nice, France, on Sunday. Interpol said the value of the artwork is "inestimable." After stealing the paintings, the gunmen fled the scene by car and motorcycle. The heist occurred during daylight hours, around 1 p.m., when six security guards were on duty. The robbers worked quickly, taking just 10 minutes. The robbers "held up the two downstairs guards, went upstairs, held up the guards there, and took the four paintings off their X-shaped hooks and left," said Patricia Grimaud, the museum's deputy curator. The theft is just the latest in a series of high-profile art thefts in Europe in recent years. Grimaud noted that the museum does not have security devices for each painting, pointing out that removing paintings from their hooks is easily accomplished. "The fact that there were few visitors and few guards made it much easier for them," she said.
(go to web site)

"Satellite Aids in Tracking Bank Robbers: Bad Guys Now Have to Worry About GPS Technology"
New Haven Register (08/05/07) ; Kaempffer, William

Global Positioning System (GPS) technology is being utilized in New Haven, Conn., to follow bank thieves, most likely the first time it has been used for that reason. "The banks will tend to use it in higher-risk locations because it's not the cheapest," explains Connecticut Bankers Association senior vice president Lindsey R. Pinkham. "That, to some degree, has limited its deployment." Industry sources claim one product being worked on is a computerized fiscal recognition system in a current database. While GPS technology functions in a similar fashion to traditional dye packs, which are placed alongside money and go off after the thief exits the bank, the GPS tracker silently transmits signals that permit police to precisely uncover the suspect's whereabouts on a computer screen. Throughout the country, GPS technology has been more and more used by police to solve a broad variety of crimes. A female bank robber was recently apprehended in New Haven after exiting the branch with money and a concealed transmitter. Police were able to find and arrest her in minutes by using GPS to locate her.
(go to web site)

"Government Set for a Crackdown on Illegal Hiring"
New York Times (08/08/07) P. A1 ; Preston, Julia

Employers will be required to fire any worker who uses a false Social Security number or face a fine of up to $10,000, according to the terms of new rules that will be announced by the Department of Homeland Security (DHS) this week. The DHS intends to enforce the rules by launching several new raids on companies that have illegal immigrants on their payroll. Under terms of the new regulations, employers would likely be given about 90 days to verify that the identity data submitted by their workers can be confirmed with data from the Social Security Administration. On Tuesday, DHS spokesman Russ Knocke said that the DHS plans to take a tough approach with employers who hire illegal immigrants. "There are not going to be any more excuses for employers, and there will be serious consequences for those that choose to blatantly disregard the law," Knocke said. Companies in agriculture and other low-paying industries voiced concern about the rules, saying they may have to fire thousands of migrant workers. Growers' associations estimate that more than 70 percent of U.S. farm workers are in the country illegally. Labor unions and pro-immigrant groups vowed to launch a legal battle to prevent the new DHS rules from going into effect.
(go to web site)

"The Security Guard to the Stars"
New York Times (08/05/07) ; Mallozzi, Vincent M.

Francisco Estevez is a private security guard who works at Yankees Stadium, providing security for celebrities and other VIPs in the 20 box seats owned by New York Yankees owner George Steinbrenner. Estevez has held his position for seven years, protecting the likes of current New York City Mayor Michael Bloomberg, former Mayor Rudolph Giuliani, and Hollywood stars Spike Lee, Billy Crystal, and Adam Sandler. Estevez is comfortable rubbing elbows with the VIPs, and he has become something of a minor celebrity himself, as he is frequently visible on television wearing a bright yellow shirt and carrying a walkie-talkie as he stands in the seats behind the Yankee's on-deck circle. Yankees players have become fond of Estevez, giving him high-fives, teasing him good-naturedly, and rubbing his head for good luck. Estevez says he was once a bit intimidated about interacting with so many celebrities. "But now I’m comfortable sitting with anyone here and talking baseball, or just about anything else," he says.
(go to web site)

"Retailers Organize Against Crime"
Security Management (07/07) Vol. 51, No. 7, P. 52 ; Thuermer, Karen E.

Gangs of professional thieves who conduct organized retail crime (ORC) operations are capable of hitting as many as 15 retail stores per day, according to loss-prevention specialists. ORC thieves typically operate in teams of three or more people who steal hundreds of dollars of merchandise from stores, then sell the stolen products to fences who sell the items for as little as 20 cents on the dollar. Popular items targeted by ORC thieves include CDs and DVDs, electronics, alcohol, baby formula, razor blades, meat, OTC medicine, and beauty care products. Members of the retail industry are concerned that some of these ORC operations are helping to finance terrorism through global black-market rings--thus, retailers should coordinate their anti-ORC efforts with law enforcement and government officials, loss-prevention specialists say. Some fences will re-label stolen products or produce counterfeit labels to make the products look legitimate, but retailers are fighting back by authenticating their products with special stamps, laser codes, and UV ink. Retailers also are using antitheft technology such as merchandise-locks, hard tags, infrared technology, and Radio Frequency Electronic Article Surveillance systems. Loss-prevention specialists recommend that retailers emphasize the human element of security by training store associates in customer service and noticing and reporting suspicious activity. Security cameras are not effective deterrents to ORC thieves, but they are effective at identifying suspects who can be prosecuted.
(go to web site)

"Biological Surveillance Falls Short, Report Says"
Atlanta Journal-Constitution (08/10/07) ; Carr, Rebecca; Young, Alison

An analysis by the Department of Homeland Security's Inspector General Richard Skinner has found that the agency's National Bio-Surveillance Integration System is not progressing as it should. This system is intended to alert government agencies of possible biological threats to national security and aid them in their response. Skinner's report cites staffing problems and the program's lack of a permanent director as the cause of its current shortcomings. Homeland Security has responded to the report by looking to add nine full-time employees to the program. The Department is also working with six federal agencies to acquire adequate analysts and technical support personnel.
(go to web site)

"Earlier Terrorist Screening to Begin for Flights Into U.S."
New York Times (08/10/07) P. A12 ; Lipton, Eric

New rules instituted by the US Department of Homeland Security will obligate airlines to submit passenger manifests for screening before a flight takes off. The program, named Secure Flight, will most likely be instituted by early 2008. Secure Flight requires the passenger lists of all incoming international flights to be submitted at least 30 minutes before the plane departs. For domestic flights, airlines will be asked to begin turning over passenger data 72 hours prior to the scheduled departure time. Homeland Security hopes these new measures will help prevent a person flagged by terrorism watch lists from boarding a plane and cut down on unnecessary interrogations.
(go to web site)

"Terrorists Teaming With Drug Cartels"
Washington Times (08/08/07) P. A1 ; Carter, Sara A.

A confidential 2005 report from the Drug Enforcement Administration (DEA) claims that multiple Islamic terrorists and extremists are inside the United States and are posing as Hispanic immigrants as they collaborate with Mexican drug cartels to raise financing for terrorists in the Middle East. The Washington Times has procured a copy of the report, which concludes that the collaboration between the embedded extremists and drug cartels "may contribute to the successful conclusion of a catastrophic event by terrorists." The report also notes that the embedded extremists have done a good job of maintaining a low profile and include individuals who speak Spanish, Arabic, and Hebrew. "It is very likely that any future 'September 11th' type of terrorist event in the United States may be facilitated, wittingly or unwittingly, by drug traffickers operating on both sides of the United States-Mexico border," the report concludes. Rep. Ed Royce of California, the top Republican on the House Foreign Affairs terrorism and nonproliferation subcommittee, confirmed that his committee has received similar information to that contained in the report. Royce says that the report and evidence on the ground show that the U.S.-Mexico border is a terrorist risk. "Law enforcement has warned that people from Arab countries have crossed the border and adopted Hispanic surnames," Royce notes.
(go to web site)

"U.S. Qaeda Member Threatens Embassies and Diplomats"
Reuters (08/06/07) ; Morgan, David

Adam Gadahn, the American member of Al Qaeda who is currently believed to be in Pakistan, released a video Sunday threatening to carry out attacks on embassies and diplomats. The video appears to have been produced by Al Qaeda's media branch, al-Sahab. Speaking in English and wearing a Muslim scarf, Gadahn, also known as Assam the American, warned that Al Qaeda will continue targeting the United States at home and abroad. "These spy dens, and military command and control centers, from which you plotted your aggression against Afghanistan, and Iraq, and which still provide vital moral, military, material, and logistical support to the crusade, shall continue to be legitimate targets," he warns.
(go to web site)

"Tornado Hits Brooklyn; Subway Back in Service"
New York Times (08/08/07) ; O'Connor, Anahad; Bowley, Graham

A tornado with maximum winds of 135 mph touched down in New York City Wednesday as part of an intense storm system that caused tens of millions of dollars of damage in the city. The tornado--a rarity in the city, the first since 2003--hit Brooklyn, where it toppled trees and damaged buildings and homes. All told, the storm damaged as many as 200 cars and 50 buildings, while wounding at least half a dozen people; fallen trees and flying glass caused many of the injuries. In addition, a woman was killed in Staten Island after her car was caught in intense rain and she was struck by another vehicle. Witnesses said that the tornado touched down directly atop a department store, causing pieces of the roof to go flying, and the tornado also destroyed the roof of a Nissan dealership. The storm also knocked out power to 4,000 customers and caused flooding that shut down the city's subway and rail system for much of the day. "The intensity of the storm brought torrential rainfall in a short period of time, overwhelming both our pumps and the sewer system that is needed to accept the pump water," explained MTA CEO Elliot Sander. More rain and thunderstorms are expected Thursday.
(go to web site)

"Police Arrest Intruders Near Fallen Bridge, Boost Security"
CNN.com (08/09/07)

The Minnesota Department of Transportation is taking over the responsibility of providing security at the site of the collapsed Interstate 35W bridge in Minneapolis, which authorities consider a death-scene investigation site. Security is being increased after Minneapolis police announced that they arrested 16 people for trespassing at the site and interfering with the investigation. Stressing the need to "maintain the honor and the dignity" of the site where five people died and eight people are still missing, Minneapolis police announced that they are deploying security technology at the site, including surveillance cameras and motion detectors. The technology will notify police if intruders are detected.
(go to web site)

"Could Tiny Sensors Detect Bridge Crises?"
Associated Press (08/03/07) ; Mygatt, Matt

Los Alamos National Laboratory scientists, working with the University of California at San Diego, are developing a network of sensors that could detect the early warning signs of structural failure in bridges. The small sensors, about the size of a credit card, would be put on bridges to give enough warning to shut down the bridge or have preventative maintenance work done to avoid a serious failure. "The idea is to put arrays of sensors on structures, such as bridges, and look for the changes of patterns of signals coming out of those sensors that would give an indication of damage forming and if it is propagating," says laboratory civil engineer Chuck Farrar. The sensors might be powered by microwaves or the sun, and would use radiotelemetry to send data to a computer for analysis. The sensors would be monitoring for electrical charges caused by stress on material such as steel-reinforced concrete. It will probably be several years more before the sensors are commercially available, Farrar said. The researchers are currently trying to build in microprocessors and wireless telemetry systems so the sensors can work as standalone monitoring devices. Another bridge sensor project is being conducted at the University of Michigan and Stanford University, and is experimenting with using a remote-control helicopter to send a pulse to the sensors to provide power and to take a reading. Drexel University is also researching bridge monitoring. There is still significant work to be done on the projects, and cooperation between civil engineers, electrical engineers, and computer scientists is needed to bring the technology together. "The hardest part is getting data from damaged structures to use in the study," Farrar says. "Nobody wants to give you a very expensive bridge to just test a data integration algorithm."
(go to web site)

"City Man Charged With Selling Employer's Domain Name for $200K"
Sheboygan Press (Wis.) (08/07/07) ; Litke, Eric

A 41-year-old employee of the Wisconsin-based Dinesen's Leather Only company has been charged with stealing from the company, including selling the company's domain name, sofa.com, for $200,000 and pocketing the proceeds. Suspect Stephen Galstad faces criminal charges that could result in up to five years in prison and a fine of up to $25,000. The state has filed a criminal complaint alleging that Galstad agreed to sell the sofa.com domain name to London-based Deliverance Pension Scheme in October 2005. By the following month, records show that the domain had been transferred to Deliverance for a price of $200,000, with the money wired to Galstad's account. At present, the sofa.com domain is being used by a London-based e-commerce company that sells furniture, according to records. Galstad claims that the owner of Dinesen's Leather Only, Fritz Dinesen, who is now deceased, had promised the domain name to Galstad, but Dinesen's widow flatly denies this assertion. Galstad, who assumed control of the company after Dinesen died, is also accused of using the company's credit cards for several large personal transactions. The exact amount of money allegedly stolen via the credit cards is still under investigation.
(go to web site)

"Researchers Set to Spark Up New More Secure Network, Routers, Switches"
Network World (07/31/07)

Stanford University researchers this summer are deploying and testing an updated version of Ethane, an architecture for corporate networks that provides a powerful and simple management model with strong security. Most current corporate networks allow for open communication automatically, which makes implementing effective security and privacy rules difficult. Ethane establishes a set of simple-to-define access polices, all maintained in one place, that are consistently applied across a network datapath and ensures users, switches, or end-hosts do not receive more information than needed. A preliminary version of Ethane was built and deployed in the fall of 2006. The new version of Ethane reportedly has better policy language support and a more feature-rich datapath that can support more diverse techniques such as NAC, MAC hiding, and end-to-end L2 isolation. Ethane works because all complex features, including routing, naming, policy declaration, and security checks, are performed by a central controller instead of in the switches as is the common practice. All movement on the network must first get permission from the controller, which verifies that the communication is allowed under network policy. If the flow is allowed, the controller determines a route for the flow, and adds an entry for that flow in each of the switches along the path. Stanford researchers say their Ethane project, which is funded by Stanford's Clean Slate Project, closely complements multiple projects at the National Science Foundation, including the Global Environment for Network Innovations project.
(go to web site)

"SOA Security: One Treacherous Journey"
InformationWeek (07/28/07)No. 1148, P. 551 ; Dornan, Andy

Although most businesses have opted to keep Web services behind a firewall, the growth of service-oriented architecture and the emergence of Web 2.0 could convince them to open their internal systems to their customers, partners, and suppliers. However, it remains to be seen whether the benefits of exposing internal services to the Web will be worth the risks involved. So far two SOA standards have emerged: Security Assertion Markup Language (SAML), which is supported by almost everyone, except Microsoft; and WS-Federation, which is more closely bound to other Web services standards. Though both of these standards use XML, the two are incompatible, which means that companies with public Web services must either support both or ensure that all of their business partners using secure Web services choose the same standard. These problems with interoperability have been compounded by the immaturity of SOA security standards. Companies considering buying elements of SOA security should do their homework first, since the market is changing. For example, Web services exposed to the Internet need XML firewalls, though this product category is disappearing as a result of ongoing SOA consolidation. Meanwhile, since XML firewall functionality has been integrated into everything from management platforms to core switches, the choice of what product to use will depend on the scale and predicted growth of each enterprise's Web services and any existing SOA infrastructure.
(go to web site)

Abstracts Copyright © 2007 Information, Inc. Bethesda, MD


  ASIS also offers a daily and a non-sponsored, special-content Professional Edition of
Security Newsbriefs. Please click to see a sample or to contact us for more information.

Unsubscribe | Change E-mail | Advertising Opportunities | Security Management Online | ASIS Online

No comments: