SUBSCRIBE ADVERTISE READER SERVICE CARD MARKETPLACE HEADLINE NEWS Justice Department: Terrorism Watch List Flawed May 07, 2009 - A review of the federal government's consolidated terrorism watch list has discovered nearly 24,000 people on the list that shouldn't be, while individuals with real connections to terrorism were left off, according to a report from the Department of Justice's inspector general. Obama Proposes $27 Billion Budget for Border and Transportation Security May 06, 2009 - The Los Angeles Times breaks down President Barack Obama's $27 billion request for border and transportation security in the proposed 2010 budget. Ships Should Provide Their Own Pirate Defenses May 06, 2009 - During two separate congressional hearings yesterday on piracy off the coast of Somalia, a U.S. defense official and a shipping executive told lawmakers that ships should provide their own security. Taliban Draws Line Between Itself and al Qaeda May 05, 2009 - Afghan Taliban tells CNN, "We are not under the command of al Qaeda." In a one-on-one interview with a top Taliban spokesperson, CNN correspondent Nic Robertson probes the group's intentions and tries to find out whether productive negotiations with Afghan officials are likely. Intelligence and National Security Industry Group Recommends Cyber Czar May 05, 2009 - Another industry group has recommended that the White House appoint a cabinet-level cybersecurity official to lead the effort to secure the nation's critical infrastructure from cyberattacks. Taliban Uses Gems to Finance Terrorism May 04, 2009 - The Taliban in Pakistan has begun to finance terrorist activities in the country by selling gems on the black market as the Swat Valley peace accord between the government and the Taliban frays. Swine Flu Infections Rise to 245; U.S. in "Upswing," CDC Says May 04, 2009 - The total number of people with confirmed swine flu infections climbed to 245 yesterday in 35 states as laboratories caught up on a backlog of lab tests, the Associated Press reports. Terrorist Incidents and Fatalities Increase Outside of Iraq in 2008 May 01, 2009 - The State Department's Country Reports on Terrorism 2008 shows security progress in Iraq in 2008 has significantly led to the decline in worldwide terrorist incidents and fatalities over 2007, but leaving out the progress in Iraq shows a steady growth in terrorism worldwide. HOT DOCUMENTS Country Reports on Terrorism 2008: The annual report from the State Department reports the number of terrorist incidents and fatalities each fell by 19 percent and 30 percent respectively. But if the security progress in Iraq is withheld from the statistics, both the number of incidents and fatalities have increased worldwide. Organized Crime in the United States: Trends and Issues for Congress: Ever evolving, organized crime threatens U.S. national security and the economy as it grows increasingly transnational, according to a new report from the Congressional Research Service. The number one organized crime threat, according to the report, emanates from Russian groups, which have spiked in number since the collapse of the Soviet Union. Indicators of School Crime and Safety: 2008: Eighty-six percent of public schools reported at least one crime during the 2005-06 school year, according to a joint report from the departments of Education and Justice. Highlights of the 2007 National Youth Gang Survey: The U.S. Department of Justice has released highlights of the Institute for Intergovernmental Research's 2007 update of the National Youth Gang Survey, which found that more than one-third of the areas studied experienced a gang problem in 2007the highest estimate since before 2000. 2009 Data Breach Investigations Report: In just 90 confirmed data breaches in its caseload last year, 285 million records were compromised, reports the Verizon Business RISK Team in its 2009 Data Breach Investigations Report.
Rightwing Extremism: Current Economic and Political Climate Fueling Resurgence in Radicalization and Recruitment An unclassified report from the Department of Homeland Security warns that the economic crisis and the election of President Barack Obama will reinvigorate white supremacist and anti-government militia groups, who may try to radicalize returning veterans from the wars in Afghanistan and Iraq. | FROM THE PRINT EDITION 1. May Podcast Listen in as several of this month's authors and editors talk with Associate Editor Laura Spadanuta about critical issues, including how to avoid hiring mistakes, improvements in first-responder communications, the risk that a cell phone may expose executives to being tracked, and court cases on drug testing in schools and alleged malicious prosecution of a former employee. Play it on your computer or download to an MP3 or iPod to listen to at your convenience. You won't believe how much you can learn in 15 minutes! @ Listen in at Security Management's Podcasts page. 2. Cover Feature: Emergency Communications Soldiers call it the fog of war. That's when they fight ignorant of events occurring around them or cut off from their commanders. The same situation arises in emergency response, when separate agencies cannot communicate because their radio equipment is incompatible. Achieving interoperability has been a goal since 9-11. While it sounds straightforward, it has been surprisingly difficult to achieve. @ Assistant Editor Joseph Straw explores the progress towards this goal in "Communicating to Save Lives." 3. Background Checks Employers have discovered social networking sites such as Facebook or MySpace as potential sources of intelligence about applicants. But just because information is online doesn't mean that it's a good idea to use it. That's just one of the issues employers need to take into account when checking out job applicants. Other issues they should consider include the reliability of online databases, prudent use of credit reports, sources of international information, and verification of educational credentials. @ In "How to Avoid Hiring Mishaps," Attorney Lester S. Rosen directs readers around the potential pitfalls of preemployment screenings. 4. Monitoring a Pandemic While concern about swine flu increases with every new case, public health officials are still preparing for an avian influenza pandemic. The deadly H5N1 strain of avian influenza could evolve a mutated strain capable of transmission from human to human at any moment. Efforts to develop an effective vaccine are hindered by Indonesia's unwillingness to share live samples of the virus with world public heath authorities. @ Learn about the implications of Indonesia's reluctance in this month's "Homeland Security" by Assistant Editor Joseph Straw. 5. Library Access When members of the public were found in the employees-only section of the library and sexual assaults were committed at nearby libraries, the security team at Queens Library in New York City decided to replace the library's 17-year-old access control system. In the end, upgrading and then replacing proximity cards with smart cards allowed the library to meet expanding security needs without replacing its access control infrastructure. The improved system promises to ensure the safety of customers and employees in addition to protecting the library's assets and irreplaceable historical documents. @ Senior Editor Teresa Anderson describes the process of replacing the system in the May "Case Study." 6. Rail Security Cooperation In the years since terrorists attacked mass transit in Madrid and London, transportation and law enforcement agencies are recognizing the benefits of international security cooperation. For example, members of the British Transport Police (BTP) recently visited the United States to exchange railroad security and counterterrorism practices with U.S. rail service Amtrak. The objective was to exchange lessons learned and best practices for enhanced passenger screening programs. @ Read about the security exchange in "International" by Assistant Editor Stephanie Berrong. Also covered in this issue are risks to aid workers in Pakistan, the costs of data breaches in Germany and the United Kingdom, and evacuation lessons learned from the events of 9-11. 7. Read All About It Retail businesses run the gamut from local mom-and-pop stores to large chains like Lowe's and Macy's. Despite the breadth of the sector, Charles A. Sennewald and John H. Christman, along with a host of contributors, have created a work that is almost certain to become the industry's authoritative security reference. The text leaves no stone unturnedamong the topics covered are theft, surveillance cameras, guards, investigations, courtroom testimony, cybercrime, product tampering, case management, and emergency planning. @ John E. O'Rourke, CPP, a 24-year veteran of the New Jersey State Police and a member of the ASIS Crime and Loss Prevention Council, reviews this book in the May edition of Security Management. Other reviewers examine books on terrorism, immigration, cybersecurity, and preemployment screening. 8. Online Discussion Forum - Question of the Month Visit the Forums on SM Online to share information and experiences with your peers. Here's a question recently posed by one visitor: Currently we monitor our corporate executives' homes and we are looking at the possibility of outsourcing this service to an alarm monitoring company. Can anyone share the pros and cons of outsourcing this type of service? @ Register and participate in the Forums. It's free! Because you are a valued subscriber to Security Management magazine, we would like to welcome you to the Security Management Online Product Information Service. You can instantly request product and service information from our May 2009 issue. Select one or more categories of interest to view the advertisements and product announcements for the selected categories. Request more information about products and services using our reader service Web site. Also New Online: Don't forget to go to www.securitymanagement.com on a daily basis to get the latest news from "Today's Headlines." Subscribe to the print edition to get even more valuable advice. This month features articles about: - Securing health data
- Profiling terrorists
- Tips for using eyewitnesses
- How to get the boss's ear
Click here to subscribe. We welcome comments on content from the Web site or the print magazine, as well as suggestions regarding topics for future coverage. Send e-mail to: Sherry Harowitz Editor Security Management sharowitz@asisonline.org Thank you for signing up to receive the SM Online E-News, an informal periodic alert to make you aware of breaking security news and upcoming monthly features that you can read by going to SM Online. (You will only receive this alert if you requested it. If you wish to leave the list, see the instructions at the end.) This mail is never sent unsolicited. You have subscribed to receive this information. To unsubscribe from this e-letter, please click here. |
No comments:
Post a Comment