Search This Blog

Monday, October 05, 2009

Security Management Web Highlights for October 2009

If you experience problems viewing this email, try the web version.
Security Management

Monthly Web Preview

October 2009


HOME | THE MAGAZINE | NEWS | BEYOND PRINT | MARKETPLACE | EVENTS | FORUM | CONTACT US


Security Management cover

SUBSCRIBE
ADVERTISE
READER SERVICE CARD
MARKETPLACE
 

HEADLINE NEWS

New York City's Ring of Steel Gets Wider
Oct 05, 2009 - The network of surveillance cameras; license-plate readers; and chemical, biological, and radiological sensors that protect lower Manhattan will expand to cover mid-town, Mayor Michael Bloomberg and Police Commissioner Raymond Kelly announced yesterday.

Hackers Using Fake Facebook Profiles to Peddle Fake Antispyware
Oct 02, 2009 - Hackers have discovered a way to automate the creation of fake Facebook pages to peddle fake antispyware, underlining once again the threats organizations face that let their employees use social networking sites, a security researcher warned.

Well-Dressed Prisoner Escapes from NYC Courthouse; Reapprehended 36 Hours Later
Oct 02, 2009 - The New York City Department of Correction has ordered a top-to-bottom review of its security procedures and staffing levels after a dapper prisoner in a three-piece suit slipped out of court after claiming he was a lawyer.

DHS to Create New Office to Support Intelligence Fusion Centers
Oct 01, 2009 - The Department of Homeland Security will establish a new office to support the nation's rapidly expanding network of fusion centers.

Worries Arise Over Homegrown Terrorism at Homeland Security Hearing
Oct 01, 2009 - A Senate hearing on homeland security yesterday worried about the threat of homegrown terrorists, radicalized immigrants, and lone wolves after federal authorities recently broke up three different alleged bombing conspiracies.

 

HOT DOCUMENTS

Homeland Security: Actions Needed to Improve Security Practices at National Icons and Parks
The GAO says the National Park Service does not have a systematic approach to risk management, which could leave the hundreds of millions of people who visit national parks and icons vulnerable to terrorist attack and other criminal activities.

Homeland Security Advisory System Task Force Report and Recommendations: September 2009
A bipartisan task force tells the Department of Homeland Security that the color-coded terrorism alert system has worked well for institutions but poor for the public. If DHS should keep the alert system at all, the department should reexamine how it communicates terrorism threats to the American public.

Combating Nuclear Terrorism: Preliminary Observations on Preparedness to Recover from Possible Attacks Using Radiological or Nuclear Materials
The GAP warns Congress that the Federal Emergency Management Agency (FEMA) has not developed a comprehensive recovery strategy to help cities and states across the United States recover from a dirty bomb or improvised nuclear device attack.

Special Security Report: The Militant Threat to Hotels
Terrorist attacks against hotels have become more frequent and deadly since the events of September 11, 2001, says STRATFOR, a private intelligence firm.

Fitness of Pandemic H1N1 and Seasonal influenza A viruses during Co-infection
Researchers from the University of Maryland experimenting with various flu strains in ferrets found no evidence that a super-virulent hybrid flu strain could arise but did discover that swine flu out competes other flu strains.

 

NEW ONLINE THIS MONTH

1. October Podcast
2. ONLINE EXCLUSIVE: Border Security

FROM THE PRINT EDITION

3. COVER FEATURE: Fire Preparedness
4. Fusion Centers
5. Aviation Security
6. Iraqi Oil
7. New Investigation Tools
8. Read All About It
9. Question of the Month

1. October Podcast: Tech Trends, Data Privacy, Expert Witnesses, Keylogging, Investigations, and Malware

Join Host Editor Laura Spadanuta as she talks with security professionals and editors for highlights from this month's topics, including tech trends from the ASIS Seminar Exhibit Hall, possible changes to come in what the European Union requires businesses to do to ensure data privacy, court cases on the use of expert witnesses and keylogging software, how social networking and Internet search capabilities are helping investigators in cases involving missing persons and cold cases, and a site to see to help you block malware.

@ Listen in at Security Management's Podcasts page.

Let us know what you think of our monthly Security Management podcasts. Email Editor-in-Chief Sherry Harowitz with your comments or rate us on iTunes.


2. ONLINE EXCLUSIVE: Border Security

The Department of Homeland Security is working to deter terrorists before they threaten U.S. shores. U.S. Customs and Border Protection employs three main strategies—screening cargo at its port of origin, screening people at their airport of departure, and biometrically identifying people upon arrival in the United States. Several programs contribute to these strategies, which strengthen U.S. borders while saving money for both the government and companies with international cargo.

@ Brion Gilbride of the Department of Homeland Security leads readers through the various programs in "Protecting the Nation From a Distance." Find the article only at www.securitymanagement.com.



FROM THE PRINT EDITION

3. COVER FEATURE: Fire Preparedness

In the 1974 movie The Towering Inferno, a faulty circuit-breaker on the 85th floor of a high-rise ignites a fire, trapping 300 dignitaries at a party on one of the top floors. It might have been fiction, but the peril of fire in a skyscraper is real. Security managers can prepare for such challenges by reaching out to local first responders and conducting joint exercises. That's just what happened in Dallas last spring when the Dallas Fire Department worked with the Renaissance Tower to conduct a fire training exercise.

@ E. Floyd Phelps, CPP, a member of the ASIS International Fire and Life Safety Council, witnessed the drill and described it in "Exercising is Good for Everyone."


4. Fusion Centers

Nowadays, terrorist threats can crop up in driver's license applications, bank transfers, and tour buses. Because no one—not even one agency—can be everywhere, information-sharing efforts in the United States rely on the country's network of intelligence fusion centers. These groups mine federal, state, and consumer databases for threat information, sift through the data, and work with local law enforcement agencies. They walk a fine line between protecting a person's privacy and protecting the nation from a possible threat. Other challenges include protecting classified information, convincing agencies to communicate with their fellow agencies, sharing data with the private sector, and funding the work.

@ Assistant Editor Joe Straw interviewed fusion center officials and other stakeholders in a dozen states to uncover the real issues and describe how "Fusion Centers Forge Ahead."


5. Aviation Security

Do you remember when air travel was fun? Today passengers must pack items according to Transportation Security Administration (TSA) standards, arrive well before departure time to undergo security checks, and be wary of abandoned packages. The additional stress puts some people on edge and makes others suspicious of fellow travelers. The government is working to improve this atmosphere with better passenger prescreening, more effective detection technologies, public education, and training for security employees.

@ October's "Homeland Security" looks at aviation security from three perspectives. "Passenger Screening Progress?" examines prescreening programs; "Scanning Crowds for Bombs" describes the search for a technology to detect improvised explosive devices (IEDs); and Assistant Editor Joseph Straw interviews TSA official Lee R. Kair.


6. Iraqi Oil

If you need a reminder that security is one of the prerequisites for business success, take a look at Iraq. When the country's oil industry opened up after nearly 40 years of nationalization, 35 international companies descended on Baghdad to take part in an auction for development rights to oil and gas fields. The result: only one deal was struck. Companies are wary of security problems, but political strife and crumbling infrastructure are other considerations. Iraq has the world's third largest proven oil reserves, so observers believe international investment will pick up, because the potential profits are there.

@ Assistant Editor Stephanie Berrong reports on oil prospects in Iraq in this month's "International." She also covers the legal framework for data protection in the European Union and nuclear energy concerns in the United Arab Emirates.


7. New Investigation Tools

Looking for an address, a phone number, a diagnosis, a recipe, a bargain—people increasingly turn to the Internet. So it's not surprising that a New York City investigations firm is using the net to investigate cold cases. The group is working with social media, posting videos on YouTube, and creating Facebook pages for missing persons. Google Alerts also inform the firm when relevant words or phrases appear on other Web sites.

@ In this month's "Technofile," Associate Editor John Wagley describes the use of social networking and other Web tools by investigators. Other topics in October include employee monitoring policies and encryption.


8. Read All About It

Before deciding to use informants or undercover agents, investigators must weigh the risks and rewards. Informants and Undercover Investigations: A Practical Guide to Law, Policy, and Procedure provides a comprehensive overview of the most critical concerns surrounding these aggressive investigative techniques. Author Dennis G. Fitzgerald's research is impressive and digs through layers of policy and procedural rubrics to provide the reader with a thorough understanding of the issue's dynamics. The book reinforces policy by providing succinct examples of case law and law enforcement guidelines

@ Professor Vincent Wincelowicz of Johnson and Wales University reviews this book in the October edition of Security Management. Other reviewers examine books on SWAT units, risk management, information security, and changing jobs from the public to the private sector.


9. Online Discussion Forum: Question of the Month

Visit the Forums on SM Online to share information and experiences with your peers. Here's a question recently posed by one visitor:

Is there anyone with information on how many officers per square foot would be needed to staff a hospital?

Leave an answer/comment about this post.

@ Register and participate in the Forums. It's free!


Because you are a valued subscriber to Security Management magazine, we would like to welcome you to the Security Management Online Product Information Service. You can instantly request product and service information from our most recent issue.

Select one or more categories of interest to view the advertisements and product announcements for the selected categories. Request more information about products and services using our reader service Web site.

Product Info


Also New Online:


Don't forget to go to www.securitymanagement.com on a daily basis to get the latest news from "Today's Headlines."


Subscribe to the print edition for additional, valuable information about important issues. This month, for example, includes the following:

  • Malware detection
  • Terrorism financing
  • Public surveillance studies
  • Gaming solutions
  • Security awareness training
  • Reducing gun violence


We welcome comments about content from the Web site or the print magazine, as well as suggestions regarding topics for future coverage. Send e-mail to:

Sherry Harowitz
Editor
Security Management
sharowitz@asisonline.org


Thank you for signing up to receive the SM Online E-News, an informal periodic alert to make you aware of breaking security news and upcoming monthly features that you can read by going to SM Online. (You will only receive this alert if you requested it. If you wish to leave the list, see the instructions at the end.)

This mail is never sent unsolicited. You have subscribed to receive this information. To unsubscribe from this e-letter, please click here.


 

 

 

 

 

 

 

 

 

No comments: