Friday, November 06, 2009

Security Management Web Highlights for November 2009

If you experience problems viewing this email, try the web version.
Security Management

Monthly Web Preview

November 2009


HOME | THE MAGAZINE | NEWS | BEYOND PRINT | MARKETPLACE | EVENTS | FORUM | CONTACT US


Security Management cover

SUBSCRIBE
ADVERTISE
READER SERVICE CARD
MARKETPLACE
 

HEADLINE NEWS

FAM Whistleblower Appeals His Termination; Says He Protected National Security
Nov 06, 2009 - A former federal air marshal received his day in court to appeal his termination by the Federal Air Marshal Service (FAMS) three years ago for disclosing sensitive information to the media.

Internet Posting by Alleged Ft. Hood Killer Showed Sympathy with Suicide Bombers
Nov 06, 2009 - Before entering the Ft. Hood Soldier Readiness Center and murdering 13 soldiers and wounding 30 more yesterday afternoon, the alleged killer may have already been on law enforcement radar for online postings he made, according to the Associated Press.

Ft. Hood Gunman Alive After Killing 12, Wounding 31 in Shooting Rampage
Nov 05, 2009 - The shooter, Malik Nadal Hassan, was an Army psychiatrist about to be deployed to Afghanistan or Iraq.

India: Prime Minister's Security May Have Led to a Death By Slowing Access to Hospital Services
Nov 05, 2009 - The visit of Indian Prime Minister Manmohan Singh to a hospital convocation on Tuesday led to the death of a desperately ill man, after Singh's security detail blocked the car holding the man from entering the hospital gates.

Retail Industry Presses Congress to Pass Bills to Fight Organized Retail Crime
Nov 04, 2009 - A congressman, a police officer, and representatives from the retail sector today called on Congress to pass federal legislation to close loopholes that allow organized criminal gangs to resell massive amounts of stolen goods from retailers for hefty profits across state and national boundaries.

Dog-Scent Lineups Called Junk Science
Nov 04, 2009 - Dogs, especially their noses, have been an important law enforcement tool for ages, whether its scent tracking or sniffing out drugs or explosives. But one use has come under harsh criticism recently: the dog-scent lineup, reports The New York Times.

 

HOT DOCUMENTS

Global Fraud Report Annual Edition
A new report on global fraud, conducted by the Economist Intelligence Unit and commissioned by Kroll, finds that incidence of fraud year-over-year from the 2008 survey is about the same, but average loss per company has edged up from $8.2 million to $8.8 million.

Dog Scent Lineups: Junk Science Injustice
The Innocence Project of Texas, a legal aid organization for the wrongly convicted, argues that the use of dog-scent lineups to build a case against suspects have led to wrongful convictions of the innocent. The organization recommends Texas prohibit the use of dog-scent lineups during investigations.

FY2010 Conference Summary
Homeland Security Appropriations: The U.S. Senate Committee on Appropriations outlines fiscal year spending for the Department of Homeland Security and prohibits the transfer of Guantanamo detainees to U.S. states and territories while placing conditions on the construction of the new National Bio and Agro-defense Facility in Manhattan, Kansas.

Software Piracy on the Internet
A Threat to Your Security: The Business Software Alliance (BSA) is sending a growing flurry of takedown notices to peer-to-peer (P2P) networks and online auction sites in an effort to fight piracy. The organization says 41 percent of the software used on personal computers worldwide is illegitimate, resulting in about $53 billion in industry losses.

Vulnerabilities Highlight the Need for More Effective Web Security Management
A newly released report from the Department of Homeland Security's internal watchdog says that the department and its member agencies' public-facing Web sites are vulnerable to attack that could leave them open to defacement, service interruption, and resource loss.

 

NEW ONLINE THIS MONTH

1. November Podcast
2. ONLINE EXCLUSIVE: Perimeter Security

FROM THE PRINT EDITION

3. COVER FEATURE: Border Controls
4. Private Sector Biometrics
5. Emergency Communications
6. ATM Crime
7. Low-Tech Compliance
8. Read All About It
9. Question of the Month

1. November Podcast: Data Champions, Workplace Surveillance, Premises Liability, Emergency Communications, and Biometrics

Join Host Laura Spadanuta as she talks with Security Management editors about highlights from this month's issue, including a look at how data champions can help companies protect information and meet regulatory requirements, court cases on workplace surveillance and premises liability, technological progress in first-responder emergency communications, and how businesses are getting results from the use of biometrics for security applications.

@ Listen in at Security Management's Podcasts page.

Let us know what you think of our monthly Security Management podcasts. Email Editor-in-Chief Sherry Harowitz with your comments or rate us on iTunes.


2. ONLINE EXCLUSIVE: Perimeter Security

Protecting facilities from vehicle bombs has become routine following terrorist attacks such as those in Oklahoma City, at the Khobar Towers in Saudi Arabia, and in various locations throughout the world. To determine the appropriate protection for a building or campus—and the people therein—requires risk assessment, vehicle traffic analysis, blast analysis, and the selection of the right barrier system.

@ A team of engineers from Kal Krishnan Consulting Services has created a guide to perimeter barrier systems and the factors to consider when choosing them in "Choosing the Right Antiterrorism Crash Barrier." Find the article only at www.securitymanagement.com.



FROM THE PRINT EDITION

3. COVER FEATURE: Border Controls

Because failing to keep tabs on visitors to the United States created an environment where 9-11 could occur, the Department of Homeland Security (DHS) set out to shore up its visitor and immigration policies and procedures. One effort resulted in the U.S. Visitor and Immigrant Status Indicator Technology (US-VISIT) program, based on collection of photos and fingerprints from all foreign visitors during entry to and exit from the country. While the entry component is nearly complete, US-VISIT's exit component has stalled

@ Assistant Editor Joseph Straw evaluates the program and looks at prospects for the future in "Borderline Controls."


4. Private Sector Biometrics

While biometrics have been mandated for use in ports, border crossings, and some high-security agency facilities, more businesses are climbing on the bandwagon. Recent advancements that improve accuracy, hygiene, usability, and price have also improved enrollment rates. Retail stores, fitness centers, and fast food chains are finding biometrics especially viable for purposes such as time and attendance and to prevent abuses such as "buddy punching," in which two people share the same card.

@ Associate Editor John Wagley reviews the new trends in biometrics and looks at how two businesses have implemented their use in "Hands-On Solutions."


5. Emergency Communications

U.S. public safety agencies continue to wrestle with the problem of communications interoperability, but an equally dangerous problem threatens first responders when they work in many larger structures: the challenge of communicating through the dense infrastructure of stairwells, parking garages, and basements. The revolution in consumer wireless technology that helps keep the civilian world connected has provided a fix in distributed antenna systems.

@ November's "Homeland Security" looks at these systems and explains how they can improve in-building communication. Also in this issue are an examination of the Urban Area Security Initiative and an interview with Dennis J. Storemski, who heads homeland security efforts in Houston.


6. ATM Crime

Fraud-related ATM crimes in Europe jumped 149 percent in 2008 and resulted in more than $700 million in losses. A new white paper by the European Network and Information Security Agency (ENISA) describes common ATM fraud scams. Among them are card skimming, where perpetrators duplicate cards by reading magnetic-stripe data and PINs; card trapping, where a device that captures a card is added to an ATM; and physical attacks.

@ Assistant Editor Stephanie Berrong reports on these schemes and how financial institutions are averting them in this month's "International." She also investigates corporate privacy efforts and an apparent reduction in bullying throughout the world.


7. Low-Tech Compliance

Following a data breach, companies often look outside the company for better technology, but it can be more useful to look inside the company for policy breaches. Many organizations simply don't enforce their policies, leaving security gaps that bad guys can exploit.

@ In this month's "Technofile," Associate Editor John Wagley describes how Providence Health & Services went about improving its compliance efforts.


8. Read All About It

While security professionals manage risk and liability every day, these tasks would be far simpler if physical structures were designed with risk analysis and premises liability in mind. Author Randall Atlas believes that this can be achieved using the principles of crime prevention through environmental design (CPTED). His book 21st Century Security and CPTED covers site selection, landscapes, and parking in addition to building design.

@ Jeffrey W. Bennett, author of ISP Certification-The Industrial Security Professional Exam Manual, reviews this book in the November edition of Security Management. Other reviewers examine books on bioterrorism, risk management, and al Qaeda.


9. Online Discussion Forum: Question of the Month

Visit the Forums on SM Online to share information and experiences with your peers. Here's a question recently posed by one visitor:

What are the latest fraud prevention and security technology for merchant accounts?

Leave an answer/comment about this post.

@ Register and participate in the Forums. It's free!


Because you are a valued subscriber to Security Management magazine, we would like to welcome you to the Security Management Online Product Information Service. You can instantly request product and service information from our most recent issue.

Select one or more categories of interest to view the advertisements and product announcements for the selected categories. Request more information about products and services using our reader service Web site.

Product Info


Also New Online:


Don't forget to go to www.securitymanagement.com on a daily basis to get the latest news from "Today's Headlines."


Subscribe to the print edition for additional, valuable information about important issues. This month, for example, includes the following:

  • Parking protection
  • Detecting insider threats
  • Hospital violence
  • University access control
  • Customer service


We welcome comments about content from the Web site or the print magazine, as well as suggestions regarding topics for future coverage. Send e-mail to:

Sherry Harowitz
Editor
Security Management
sharowitz@asisonline.org


Thank you for signing up to receive the SM Online E-News, an informal periodic alert to make you aware of breaking security news and upcoming monthly features that you can read by going to SM Online. (You will only receive this alert if you requested it. If you wish to leave the list, see the instructions at the end.)

This mail is never sent unsolicited. You have subscribed to receive this information. To unsubscribe from this e-letter, please click here.


 

 

 

 

 

 

 

 

 

No comments:

Post a Comment