Monday, June 08, 2009

Security Management Web Highlights for June 2009

Security Management

Web Highlights

June 2009


HOME | THE MAGAZINE | NEWS | BEYOND PRINT | MARKETPLACE | EVENTS | FORUM | CONTACT US


Security Management

SUBSCRIBE
ADVERTISE
READER SERVICE CARD
MARKETPLACE
 

HEADLINE NEWS

Engineer Allegedly Offered Drug Smugglers Remote-Controlled Semi-Submersibles
Jun 08, 2009 - A Washington Post story from Saturday provides more evidence that narcotraffickers are looking to build remote-controlled self-propelled semi-submersibles to smuggle drugs risk-free from Colombia into the United States.

Napolitano Swears in Hacker on Homeland Security Advisory Council
Jun 08, 2009 - One of the 16 homeland security advisors sworn in by homeland security chief Janet Napolitano on Friday is a world-renowned hacker, reports CNET News.com.

China Eyes Cheaters
Jun 05, 2009 - Big Brother's about to look over the shoulder of millions of Chinese students taking their college entrance exams next week, according to the BBC.

Airline Employee Helps Roommate Smuggle Handgun
Jun 05, 2009 - The U.S. Airways employee carried the bag with the handgun inside through an employee entrance before handing it to his friend.

The Melding of Technologies: IT and Security
Jun 05, 2009 - In this Security Management online exclusive, SM teamed up with Strauchs LLC to survey 100 large corporations and gauge how well they've dealt with "convergence." You may be surprised how well the melding process is going considering all the buzz surrounding the topic.

 

HOT DOCUMENTS

The Web's Most Dangerous Search Terms:
McAfee, a security technology firm, analyzed the most popular key word searches and variations to find out what searches are the most risky on the Web.

Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure:
The product of President Obama's 60-day review of the federal governments' cybersecurity defenses, the report recommends creating a cybersecurity coordinator to protect government and civilians networks, create private-public partnerships to defend U.S. networks, and organize a public education campaign devoted to IT security literacy.

MessageLabs Intelligence: May 2009:
Symantec's Message Labs discovers that nine out of ten e-mail messages in May were spam and that spammers work American schedules.

Domestic Extremism Lexicon:
The leaked, and then quickly retracted, controversial internal intelligence document dealing with the threats posed by domestic extremists from the Department of Homeland Security.

Review of Web Applications Security and Intrusion Detection in Air Traffic Control Systems: Federal Aviation Administration:
The Department of Transportation Inspector General's Office discovered hackers had successfully breached FAA systems and fear a hacker could wrestle control of critical air traffic control systems if cybersecurity vulnerabilities aren't patched.

 

NEW ONLINE THIS MONTH

1. June Podcast
2. Convergence Survey

FROM THE PRINT EDITION

3. Maritime Drug Trafficking
4. Crisis Planning
5. Campus Network Security
6. Rail Contractor Screening
Securing India
8. Read All About It
9. Question of the Month

1. June Podcast: Disaster Preparedness, Drug Trafficking, Internet Phone Tapping, and Guns at Work

Join host editor Laura Spadanuta as she talks with contributing authors and editors for this month's podcast on topics ranging from the challenges of managing people and resources in a disaster to the controversy over whether law enforcement should have the right to "tap" into phone conversations conducted via Voice over Internet Protocol. Also discussed are court cases on the right to store firearms on company property and a highly effective tactic in the drug wars—the use of hard-to-detect, self-propelled, semi-submersible watercraft by drug cartels smuggling cocaine from South America to the United States.

@ Listen in at Security Management's Podcasts page.


2. ONLINE EXCLUSIVE: Convergence Survey

"Convergence" is a word that's sure to provoke a reaction in security circles today. Security Management surveyed security pros to determine the current status of the integration of physical and logical security. Security Consultant John J. Strauchs, CPP, analyzed the responses from 100 large corporations, and he reports on the results in "The Melding of Technologies: IT and Security."



3. COVER FEATURE: Maritime Drug Trafficking

Colombian drug traffickers have developed a new way to smuggle contraband into the American marketplace: self-propelled semi-submersibles (SPSSs). Built in the jungles of Colombia, SPSSs are hard to detect as they travel just beneath the waves. U.S. officials fear SPSSs could also be used to smuggle terrorists or weapons of mass destruction into the United States.

@ Associate Editor Matthew Harwood explores the challenges of SPSS interdiction in "Drug War's Rough Waters."


4. Crisis Planning

Security practitioners often say about emergencies, "not if, but when." Planning for crises—whether they're natural disasters or terrorist actions—involves five major operational issues: communication, chain of command, use of volunteer resources, establishment of priorities, and media relationships. Managers must be sure that everyone involved understands what the priorities will be in a disaster. Employee awareness sessions and training exercises are key to success when the time comes.

@ In "Don't Let the Plan Be the Disaster," William M. Lokey, program director for James Lee Witt Associates, spells out the elements of a successful disaster. Consultant Robert F. Littlejohn, CPP, CFE, illuminates the necessity of collaboration in "Don't Silo Crisis Solutions."


5. Campus Network Security

A computer network on a college campus is a special challenge. The large variety of student computers creates a breeding ground for viruses and other cyber ills when they are connected to each other. Norwich University, a private military college in Vermont and a Center of Excellence in Information Security Education, had to protect the network and all the computers connected to it. To accomplish this, the college chose a Cisco software application that checks each student's computer for updates to the antivirus program and other applications.

@ This month's "Case Study" by Associate Editor Ann Longmore-Etheridge examines how the college decided on its plan and other strategies for protecting the network.


6. Rail Contractor Screening

In the years since 9-11, government mandates have helped the transportation sector mitigate potential threats within its work force. For example a Transportation Worker Identification Credential is required for port workers and hazmat truck drivers are subject to criminal background checks. Yet one major personnel security initiative was industry-driven: the e-RAILSAFE program. North America's Class I lines use this program not only to vet and credential contract workers but also to administer mandatory security awareness training.

@ Assistant Editor Joseph Straw evaluates the program in the June "Homeland Security." He also looks at air cargo screening and interviews West Virginia's top homeland security official.


7. Securing India

Even before terrorists attacked soft targets in Mumbai last year, India's private security industry was experiencing an annual growth rate of 25 percent due primarily to the country's infrastructure development. According to Col. Jagat Trikha, executive director of the Central Association of Private Security Industry, the annual growth rate now approaches 40 percent.

@ Read about the industry's efforts to improve screening, training, and professionalism for security guards in "International" by Assistant Editor Stephanie Berrong. Also covered in this issue are terrorist financing and securing personal data in the global environment.


8. Read All About It

While the title Counterterrorism Strategies for Corporations indicates a book focused solely on terrorist threats, author Mike Ackerman tackles a wide range of problems facing any business operating globally. He begins with nine key principles for applying security measures to international business and demonstrates their use in problems from street crime to kidnapping.

@ Patrick Kane, CPP, senior director of security for a U.S. cargo airline with worldwide operations, reviews this book in the June edition of Security Management. Other reviewers examine books on radical Islamic terrorism, IT security policies, and the philosophy of security.


9. Online Discussion Forum: Question of the Month

Visit the Forums on SM Online to share information and experiences with your peers. Here's a question recently posed by one visitor:

What are some methods that you recommend for an intruder alert for office environments? We have approximately 400 offices and need a method to alert our folks internally (with no central hubbing office or operators).

@ Register and participate in the Forums. It's free!


Because you are a valued subscriber to Security Management magazine, we would like to welcome you to the Security Management Online Product Information Service. You can instantly request product and service information from our June 2009 issue.

Select one or more categories of interest to view the advertisements and product announcements for the selected categories. Request more information about products and services using our reader service Web site.

Product Info


Also New Online:


Don't forget to go to www.securitymanagement.com on a daily basis to get the latest news from "Today's Headlines."


Subscribe to the print edition to get even more valuable advice. This month features articles about:

  • Risk management at Dover Speedway
  • How to create resilience
  • Preventing crime in business districts
  • How to implement a hotline

Click here to subscribe.


We welcome comments on content from the Web site or the print magazine, as well as suggestions regarding topics for future coverage. Send e-mail to:

Sherry Harowitz
Editor
Security Management
sharowitz@asisonline.org


Thank you for signing up to receive the SM Online E-News, an informal periodic alert to make you aware of breaking security news and upcoming monthly features that you can read by going to SM Online. (You will only receive this alert if you requested it. If you wish to leave the list, see the instructions at the end.)

This mail is never sent unsolicited. You have subscribed to receive this information. To unsubscribe from this e-letter, please click here.


 

 

 

 

 

 

 

 

 

No comments:

Post a Comment