SUBSCRIBE ADVERTISE READER SERVICE CARD MARKETPLACE HEADLINE NEWS U.K.: Incoming Spy Chief's Wife Posts Too Much Info on Facebook Jul 06, 2009 - Once again, Gordon Brown's embattled government has suffered another embarrassing security breach. This time, the wife of the incoming head of MI-6 posted personal information and pictures of her husband, children, and friends on the popular social networking site, Facebook. NYPD SUVs Get Radiation Detectors Jul 06, 2009 - The New York City Police Department (NYPD) has received a gift from the Department of Homeland Security: three Advanced Spectroscopic Portal Monitors to search the city for dirty bombs. Rat-like Robot to Aid Disaster Response Jul 02, 2009 - A British research team is developing a rat-like robot that may one day help first responders search and rescue victims of man-made and natural disasters, reports The New Scientist. SPLC Lists Right-Wing Terrorist Plots and Actions Since 1995 Jul 02, 2009 - There have been 75 right-wing extremist plots or actions since 1995 to slaughter those extremists did not agree with politically, according to a list compiled by the Southern Poverty Law Center. UK: White Supremacist Wanted to Throw Tennis Ball Bombs at Asian Neighbors Jul 02, 2009 - A British court has heard testimony against Neil Lewington, an alcoholic 43-year old white supremacist, who allegedly conspired to unleash terrorist bombings against his Asian neighbors and others not considered British enough. HOT DOCUMENTS Terror from the Right The Southern Poverty Law Center has compiled a list of "75 plots, conspiracies, and racist rampages" since the 1995 right-wing extremist attack on Oklahoma City. Terrorism and Tobacco: Extremists, Insurgents Turn to Cigarette Smuggling The investigative journalism nonprofit, The Center for Public Integrity, reports how seven terrorist and insurgent organizations use low-risk cigarette and tobacco smuggling to finance their operations. Proposed Revocation of Ruling Letters and Revocation of Treatment Relating to the Admissibility of Certain Knives with Spring-Assisted Opening Mechanisms Customs and Border Protection's Office of Regulations and Rulings Rulings published this decision to revoke earlier decisions, which allowed "certain knives with spring- or release-assisted opening mechanisms" as admissible under the Switchblade Knife Act of 1958, making many previously legal knives illegal. Combating Nuclear Smuggling: DHS Improved Testing of Advanced Radiation Detection Portal Monitors, but Preliminary Results Show Limits of the New Technology The Government Accountability Office remains skeptical that the performance of the Department of Homeland Security's new Advanced Spectroscopic portal radiation detection monitors warrants the nearly three-fold increase in cost to field them across the nation's port systems. American Civil Liberties Union: DoD's Level I Antiterrorism Awareness Training In a letter to the Pentagon, the American Civil Liberties Union expressed alarm that an antiterrorism awareness course equates protests with "low-level terrorism." | NEW ONLINE THIS MONTH FROM THE PRINT EDITION 1. July Podcast: Security and the Psych Ward, Britain's Squatters Problem, and the Risks of Cloud Computing Host Editor Laura Spadanuta interviews authors and editors about this month's topics, including why Baystate Medical Center's psych ward changed how security responds to problem patients, plus how security is adapting to the growing problem of squatters taking over uninhabited or foreclosed properties in the U.K. Also discussed are the perils of cloud computing, an FBI cybersting, and two legal casesone absolving a company of liability for a relationship gone bad and another backing police department neutrality with regard to religion. @ Listen in at Security Management's Podcasts page. This is the seventh podcast since the series officially launched in January. We'd welcome some feedback, so please let us know what you find most useful and interesting or what you'd like podcasts to include in the future. E-mail your comments to the Editor-in-Chief Sherry Harowitz. 2. ONLINE EXCLUSIVE: CFATS Compliance Approximately 36,000 facilities that manufacture, use, store, or process certain chemicals are subject to the Department of Homeland Security's Chemical Facility Anti-Terrorism Standards (CFATS). Because compliance requirements are specific to terrorism issues, security professionals need to select security upgrades designed for terrorist threats while continuing to cover more common security issues. @ Three experts from AcuTech Consulting Group take readers through the steps toward compliance in "CFATS and Comprehensive Chemical Security Management." Find the article only at www.securitymanagement.com. Read more about CFATS in the print edition of Security Management, where Steven E. Roberts of the Roberts Law Group describes the standards and how to meet them in "Complex Rules Present Compliance Challenge."  FROM THE PRINT EDITION 3. COVER FEATURE: Securing Psychiatric Patients At Baystate Medical Center, security was at odds with psychiatric nursing staff in the Adult Psychiatric Treatment Unit following radical changes in patient behavioral modification practices. When medical staff strictly limited the use of restraints, seclusion, forced medication, and other coercive practices in favor of "trauma-informed" methods, the immediate effect on the security department was not considered. Officers used to active physical intervention were suddenly expected to remain in the hall while counselors interacted with patients. A security training and shadowing program gave officers insight into the new practices and improved performance. @ Members of the medical center's security and clinical teams offer a firsthand look at the program in "Taking the Trauma Out of Security." 4. Enterprise Risk Management In the current global environment, security professionals' expertise in predicting, mitigating, and avoiding risks is more valuable than ever. By aligning security objectives with those faced by the enterprise, operational risks can be identified and responded to according to their significance and value to the business. Under the aegis of security management teams, corporations of all types benefit from cross-functional approaches to ERM and its subset, enterprise security risk management. @ In "Managing Risk Across the Enterprise," Mary Alice Davidson, former publisher and editor-in-chief of Security Management, describes the elements of a successful ERM program. 5. TWIC Solutions As the Transportation Worker Identification Credential (TWIC) is implemented, some port operators warn that one program requirement could be a serious problem. TWIC regulations require that anyone not possessing the credential be escorted within the facility by a cardholder. An alternative solution is to use electronic monitoring outside "restricted" areas. Two ports are taking advantage of that option through the use of smart video and wireless device tracking. @ In July's "Homeland Security," Assistant Editor Joseph Straw explains how the electronic monitoring works at the Port of Wilmington and the Virginia Port Authority. He also looks at nuclear smuggling and interviews Kentucky's top homeland security official. 6. Costly Counterfeiting Estimates suggest that trade in counterfeit goods accounts for the loss of 750,000 jobs and $250 billion in the United States each year, but intellectual property theft has economic implications for other countries as well. U.S. lawmakers recently held a field hearing in California to discuss the increasing economic implications of intellectual property piracy and possible solutions. @ Assistant Editor Stephanie Berrong reports on the hearing and its suggested solutions in this month's "International." She also covers a creative security awareness training program and reports on how businesses are combating the problem of "squatters" in Great Britain. 7. Securing Credit Cards The Payment Security Industry Data Security Standard (PCI DSS) aims to help organizations proactively protect customer account data via security management, policies, procedures, network architecture, software design, and other protective measures. But the standards can prove expensive and time-consuming, especially for small merchants. One solution is to outsource storage and transmission of card data. @ In this month's "Technofile," Associate Editor John Wagley reports on the Visa Security Summit recently held in Washing ton, D.C., and the options for protecting everyone's credit card data. Cloud-based security services and an FBI sting operation are also discussed in this issue. 8. Read All About It Listen to Their Cries is less a security text than a call to action, and more specifically a call to virtue. Author Vincent Bove provides the basics of security, but only the basics. The real security solution, he argues, is character, which he defines in this context as the trifecta of leadership, vigilance, and collaboration. @ Dennis G. Byerly, CPP, community manager for Monarch Management Group, reviews this book in the July edition of Security Management. Other reviewers examine books on software security engineering, terrorism, and risk assessment. 9. Online Discussion Forum: Question of the Month Visit the Forums on SM Online to share information and experiences with your peers. Here's a question recently posed by one visitor: I think it's really important to prepare for another terrorist attack. I've heard of certifications offered through private groups that deal with this and was wondering if anyone has taken...credible disaster preparedness training. Are there...recommendations you have? Leave an answer/comment about this post. @ Register and participate in the Forums. It's free! Because you are a valued subscriber to Security Management magazine, we would like to welcome you to the Security Management Online Product Information Service. You can instantly request product and service information from our June 2009 issue. Select one or more categories of interest to view the advertisements and product announcements for the selected categories. Request more information about products and services using our reader service Web site.  Also New Online: Don't forget to go to www.securitymanagement.com on a daily basis to get the latest news from "Today's Headlines." Subscribe to the print edition for additional, valuable information about important issues. This month, for example, includes the following: - Decoding camera claims
- Court ruling on negligent hiring
- Private funding for a fusion center analyst
- Outsourcing cash handling
Subscribe here. We welcome comments on content from the Web site or the print magazine, as well as suggestions regarding topics for future coverage. Send e-mail to: Sherry Harowitz Editor Security Management sharowitz@asisonline.org Thank you for signing up to receive the SM Online E-News, an informal periodic alert to make you aware of breaking security news and upcoming monthly features that you can read by going to SM Online. (You will only receive this alert if you requested it. If you wish to leave the list, see the instructions at the end.) This mail is never sent unsolicited. You have subscribed to receive this information. To unsubscribe from this e-letter, please click here. |
No comments:
Post a Comment