Search This Blog

Friday, September 04, 2009

Security Management Web Preview for September 2009

If you experience problems viewing this email, try the web version.
Security Management

Monthly Web Preview

September 2009


HOME | THE MAGAZINE | NEWS | BEYOND PRINT | MARKETPLACE | EVENTS | FORUM | CONTACT US


Security Management cover

SUBSCRIBE
ADVERTISE
READER SERVICE CARD
MARKETPLACE
 

HEADLINE NEWS

NYC Rabbi Teaches Synagogue Self-Defense
Sep 04, 2009 - A New York City rabbi has developed a 100-hour counterterrorist security course to protect synagogues during the forthcoming Jewish High Holy Days, The New York Post reports.

Fifth of Jobs Government Will Hire for Between 2010 and 2012 Will be Security-Related
Sep 04, 2009 - Nearly 20 percent of all the jobs the federal government will be hiring for in between 2010 and 2012 will be security-related, reports the Washington Business Journal.

Who Will Guard the Guards? More Guards
Sep 03, 2009 - The State Department has assigned diplomatic security staff to watch over ArmorGroup security contractors in Kabul as new allegations surface that the company retaliated against one of its whistleblowers.

Do Gangs Get Too Much of the Blame for Street Violence?
Sep 03, 2009 - Some criminologists suggest the violent crime we blame on gangs may be obscuring an even scarier reality.

Chertoff: Threat Level System May Be Too Ingrained to Change
Sep 03, 2009 - Current DHS Secretary Janet Napolitano has consulted both Chertoff and his predecessor, Tom Ridge, in a reassessment of the agency's five-level, color-coded alert system.

Google Analyzes Flu Web Searches to Create Early Warning System
Sep 03, 2009 - As the Northern Hemisphere gears up for flu season amid the H1N1 pandemic, companies are analyzing Web activity to create early warning systems, reports The Washington Post.

 

HOT DOCUMENTS

Where the Jobs Are 2009: Mission-Critical Opportunities for America:
The Partnership for Public Service projects the federal government will fill 270,000 positions from October 2009 until 2012, with nearly 20 percent of those jobs in security and protection. The organization breaks down what departments and agencies are hiring, what the security-related jobs are, and how many positions they need to fill.

Fitness of Pandemic H1N1 and Seasonal influenza A viruses during Co-infection:
A research team at the University of Maryland reports that while it sees no evidence that the H1N1 virus, known as swine flu, will merge with seasonal flu strains to produce a "superbug," swine flu is a stronger virus than seasonal strains.

CBP Border Search of Electronic Devices Containing Information:
The Department of Homeland Security's new guidelines and standard operating procedures for Customs and Border Protection agents when searching electronic devices at border crossings.

"Brain biomarkers for identifying excited delirium as a cause of sudden death":
A controversial new study published in Forensic Science International argues that people tased by or subdued by police did not die due electric shock or physical restraint, but from a rare condition known as "excited delirium." Critics say excited delirium is a fake disorder manufactured to cover up police brutality.

On Locational Privacy, and How to Avoid Losing it Forever:
A report from the Electronic Frontier Foundation, a civil liberties group for the electronic age, warns that Americans are losing their privacy as they travel through public space due to location-based technologies and services such as EZ Pass and cellphones.

 

NEW ONLINE THIS MONTH

1. September Podcast
2. ASIS Seminar Preview

FROM THE PRINT EDITION

3. Event Security
4. California Challenges
5. Evacuation Solutions
6. Undeleted Data
7. Social Engineering
8. Read All About It
9. Question of the Month

1. September Podcast: Counterfiet Drugs, Data Protection, Evacuations, and More

Please join Laura Spadanuta as she talks with editors about this month's hot topics, including the challenges of curtailing worldwide counterfeit drug operations, a study on recidivism rates among ex-cons, a new twist on data protection, software solutions that can help companies prepare for evacuations, how a business improvement district in Hollywood helps hold down crime, and why the high court found a school's search for drugs unconstitutional.

@ Listen in at Security Management's Podcasts page.

This is the ninth podcast since the series officially launched in January. We'd welcome some feedback, so please let us know what you find most useful and interesting or what you'd like podcasts to include in the future. E-mail your comments to the Editor-in-Chief Sherry Harowitz.


2. SEMINAR PREVIEW ONLINE: ASIS International 55th Annual Seminar and Exhibits

The 55th Seminar and Exhibits offers a smorgasbord of ideas, people, and products to expand your security horizons. Security Management's Seminar Web site highlights some of the offerings that will be available there. Included are interviews with presenters of educational sessions, articles about the events and people you'll find there and previews of innovative new products.

@ Read these exclusive items only at www.securitymanagement.com/seminar/2009.



FROM THE PRINT EDITION

3. COVER FEATURE: Event Security

When protesters tried to disrupt the Democratic National Convention in Denver last summer, they were foiled by a cooperative effort that police had developed with private security forces over the previous year. The Denver Public-Private Partnership used that time to implement and fine-tune information sharing and planning for just such disruptions. In addition to worst-case-scenario exercises, they trained on how to recognize bombs and suspicious behavior.

@ Read the first-hand account of the partnership's development as witnessed by Brian M. Van Hise, who was security manager of Denver's Seventeenth Street Plaza during the convention.


4. California Challenges

The ASIS International 55th Annual Seminar and Exhibits takes place in a densely populated and diverse region. Add to the commonplace security issues the challenging dynamics of an international seaport, the entertainment business, and celebrities galore. Security Management explores some local places that have solved tricky problems, including the Port of Long Beach, The Hollywood Entertainment Business Improvement District, Paramount Studios, and plumbing supply company Ferguson Enterprises.

@ Senior Editor Teresa Anderson visited them all and reports on their successes in "California Cruisin'."


5. Evacuation Solutions

In some cases, evacuations have been as dangerous as the crises that trigger them. That's why crisis managers need to plan carefully for them. Two new tools may help. The Evacuation Planning Tool is computer simulation software that attempts to factor in how people react in evacuation situations-not just their behavior during drills. The Regal Evacuation Guidance System is designed to provide active sensing of threats combined with real-time communication to guide evacuees via strip lighting on floors and walls.

@ In "Homeland Security," Assistant Editor Joseph Straw describes the two tools and evaluates their promise.


6. Undeleted Data

Once that computer is no longer needed, experts urge users to delete all data before disposing of it. Despite that widely repeated advice, international researchers who bought used computers in five developed countries found that only 36 percent of the functioning disks had been effectively wiped of all data. Compared to results found four years previously, there were more disks containing significant corporate and personal information that could expose former owners to fraud, identity theft, and blackmail. Some data appeared to be high-level government documents, security policies, and private patient information.

@ Assistant Editor Stephanie Berrong reports on the research and what steps security managers can take to avoid leaving sensitive data in discarded computers in this month's "International." She also covers foreign policy relating to the Muslim world and counterfeit drugs, which account for as much as 35 percent of the drug supply in some places.


7. Social Engineering

Why go to the trouble of hacking into a network when you can just ask for a password? And why take the risk of breaking into a building when you can just follow someone else though a locked door? Tricking people into helping penetrate a secure network or facility is social engineering. Siemens recently experimented with social engineering at a large financial firm: a consultant was able to enter the building, work in a conference room, and move freely through the building, even where confidential information was stored.

@ In this month's "Technofile," Associate Editor John Wagley reports on the threat of social engineering and some ways to combat it. Other topics in September include limiting sensitive data collection to avoid liability and the pros and cons of virtual servers.


8. Read All About It

When a teen goes to college for the first time, it's often the student's first long-term separation from family and friends. The crime prevention video training course Stay Safe at College is a resource that can help educators prepare students for the responsibility of keeping themselves safe. Available in several formats, it addresses everyday safety, protecting possessions, stalking, and commonsense self-defense. A customizable workbook and a facilitator's guide help educators make the most of the videos.

@ Thomas E. Engells, CPP, assistant chief of the University of Texas at Houston Police Department, reviews this personal safety course in the September edition of Security Management. Other reviewers examine books on workplace violence and criminal records.


9. Online Discussion Forum: Question of the Month

Visit the Forums on SM Online to share information and experiences with your peers. Here's a question recently posed by one visitor:

Is it fair for the client to charge the security company for any loss of goods that was incurred due to the negligence or poor reaction of its officers?

Leave an answer/comment about this post.

@ Register and participate in the Forums. It's free!


Because you are a valued subscriber to Security Management magazine, we would like to welcome you to the Security Management Online Product Information Service. You can instantly request product and service information from our June 2009 issue.

Select one or more categories of interest to view the advertisements and product announcements for the selected categories. Request more information about products and services using our reader service Web site.

Product Info


Also New Online:


Don't forget to go to www.securitymanagement.com on a daily basis to get the latest news from "Today's Headlines."


Subscribe to the print edition for additional, valuable information about important issues. This month, for example, includes the following:

  • Lessons learned from a campus shooting
  • Cutting employee theft at casinos
  • A guide to the ASIS exhibit hall
  • Research into recidivism
  • Replacing security guards with cameras
  • Creating a fraud-prevention program

Subscribe here.


We welcome comments on content from the Web site or the print magazine, as well as suggestions regarding topics for future coverage. Send e-mail to:

Sherry Harowitz
Editor
Security Management
sharowitz@asisonline.org


Thank you for signing up to receive the SM Online E-News, an informal periodic alert to make you aware of breaking security news and upcoming monthly features that you can read by going to SM Online. (You will only receive this alert if you requested it. If you wish to leave the list, see the instructions at the end.)

This mail is never sent unsolicited. You have subscribed to receive this information. To unsubscribe from this e-letter, please click here.


 

 

 

 

 

 

 

 

 

No comments: