Friday, December 04, 2009

Security Management Web Highlights for December 2009

If you experience problems viewing this email, try the web version.
Security Management

Monthly Web Preview

December 2009


HOME | THE MAGAZINE | NEWS | BEYOND PRINT | MARKETPLACE | EVENTS | FORUM | CONTACT US


Security Management cover

SUBSCRIBE
ADVERTISE
READER SERVICE CARD
MARKETPLACE
 

HEADLINE NEWS

Secret Service Takes Blame for Security Breach at White House
State Dinner

Dec 04, 2009 - The head of the Secret Service went before Congress yesterday and accepted full responsibility for the security breakdown last week that allowed an uninvited, attention-seeking couple to crash President Barack Obama's first state dinner.

Watchdog: DHS Should Test Feasibility of 100 Percent Cargo-
Scanning Mandate

Dec 03, 2009 - DHS says it can't satisfy Congress' mandate of 100 percent scanning of U.S.-bound shipping containers by 2012. Finding little progress, GAO now says DHS must examine whether that goal is feasible at all.

Terrorists Inside U.S. and Planning to Strike, Says DHS Secretary
Dec 03, 2009 - Home-based terrorists are currently inside the United States and are looking to strike American targets here and abroad, the Secretary of Homeland Security Janet Napolitano said in a speech last night.

Security Guards Protect Against Teen Suicide at Railroad Crossing
Dec 03, 2009 - A rash of teen suicides has led the Palo Alto Police Department to hire private security to patrol a train crossing where the suicides occurred, reports The San Jose Mercury News.

Napolitano Outlines Homeland Security Measures to Combat IEDs
Dec 02, 2009 - A recent terrorism plot foiled by federal and state law enforcement iilustrates the threat the United States faces from terrorists trying to export the use of improvised explosive devices (IEDs) from the battlefields of Afghanistan and Iraq to the homefront, said Secretary of Homeland Security Janet Napolitano during a speech yesterday.

Lawsuit Seeks Information on How Government Uses Social-
Networking Sites

Dec 02, 2009 - A prominent hi-tech civil liberties organization has filed suit in federal court yesterday to impel a half-dozen government agencies to disclose the policies and procedures that govern how they access, collect, and store information from social networking Web sites.

Hear About a Court Ruling on "Suicide by Cop" and other issues from the December Podcast
Dec 02, 2009 - Join editor Laura Spadanuta as she talks with staff editors and security practitioners about issues covered in this month's magazine, including the problems encountered when someone decides to commit "suicide by cop" and how stores are using technology to fight loss from internal and external theft.

 

HOT DOCUMENTS

Security of Air Cargo During
Ground Transportation
:

The Department of Homeland Security Office of Inspector General says that the Transporation Security Administration needs to improve its air cargo security procedures after vulnerabilities were discovered that could allow a terrorist to introduce a bomb into cargo before it was loaded onto a passenger plane.

ID Requirements for
Airport Checkpoints
:

The Transportation Security Administration Web site lists the identification materials necessary for air travelers to pass through security and board their airplane.

NRF 2009 Organized Retail
Crime Survey
:

The National Retail Federation's annual survey on organized retail crime found that 9 out of ten retailers surveyed reported their companies were victims of ORC in the past year. That was up 8 percent from the prior year.

Acting Under Secretary for Intelligence and Analysis Bart R. Johnson Speech at National Homeland Defense Foundation Symposium:
Bart R. Johnson, a high-ranking official at the Department of Homeland Security, explains how DHS will support the nation's rapidly expanding network of state-based intelligence fusion centers created to share information across all levels of government to help prevent terrorist attacks.

Securing the Mobile Workforce:
The majority of employees at approximately three out of four organizations could not work remotely if they had to, according to a Cisco survey. It validates concerns that U.S. organizations, both public and private, could not continue operating if major business interruptions occurred, such severe weather, mass illness, major road closings, or public transit strikes.

 

NEW ONLINE THIS MONTH

1. December Podcast
2. ONLINE EXCLUSIVE: Security in India

FROM THE PRINT EDITION

3. COVER FEATURE: Shrinking Shrink
4. Seminar Highlights
5. Information Sharing
6. Aid in Afghanistan
7. Reputation Management
8. Read All About It
9. Question of the Month

1. December Podcast: Suicide by Cop, Retail Shrink, Overseas Security, Information Sharing, and Online
Reputation Management

Join editor Laura Spadanuta as she talks with staff editors and security practitioners about issues covered in this month's magazine, including how stores are using technology to fight loss from internal and external theft, how the U.S. government's Overseas Security Advisory Council (OSAC) is helping non-governmental aid groups that operate in risky environments, how the United States and the European Union are trying to work through privacy concerns to facilitate information sharing about possible terrorists, what companies can do about scurrilous comments online, and the difficulties police confront when someone decides to commit "suicide by cop."

@ Listen in at Security Management's Podcasts page.


2. ONLINE EXCLUSIVE: Security in India Today

When a team of security directors from Hong Kong and New York visited India to assess the security of their company's Mumbai office, they understood that the different culture and customs would make a huge difference in their recommendations. Their plans for dealing with terrorism, crime, emergencies, personnel security, IT security, and physical security were tailored to the needs and habits of the local people.

@ Nicholas A. Smith, CPP, and Scott Shaw, CPP, two security directors with global experience, offer lessons learned in "Security in India Today." Find the article only at www.securitymanagement.com.



FROM THE PRINT EDITION

3. COVER FEATURE: Shrinking Shrink

Retail shrink is on the rise, but retailers continue to fight it. Some firms have deployed new technologies to hold loss to a manageable level. For example, New England supermarket chain Big Y Foods has turned to point-of-sale video analytics to discourage "sweethearting," while T-Mobile has upgraded its video surveillance technology for better criminal deterrence and investigative outcomes.

@ Associate Editor Ann Longmore-Etheridge describes the new technologies and how they are helping reduce shrink in "New Solutions to Old Problems."


4. Seminar Highlights

While the ASIS International 55th Annual Seminar and Exhibits is over, lessons and memories persist. The activities included many opportunities for networking, demonstrations of the latest products and services, keynote addresses by Condoleezza Rice and Ben Stein, and more than 160 educational sessions led by security industry luminaries. Some of the notable topics were liability, food safety, parking, information security, terrorism, executive protection, maritime security, social networking, and women in security. Attendees returned home with new insights and new contacts that will continue to help them throughout the years.

@ Security Management's editors review last September's events in "Days of Enlightenment."


5. Information Sharing

It's difficult to share threat information within a country—or even within a city—but global information sharing is crucial for stopping terrorists. The United States has signed information-sharing agreements with Canada, Australia, New Zealand, and ten individual European Union countries, but privacy concerns have stalled a formal agreement with the European Union as a whole.

@ December's "Homeland Security" examines this roadblock and its possible solutions. Also in this issue is an interview with Baltimore's top homeland security official, Robert Maloney.


6. Aid in Afghanistan

As President Obama and other world leaders concern themselves with the military operations in Afghanistan, Andrew Wilder, a Tufts University researcher, is studying the effectiveness of financial aid in securing the country. He asked Afghans and others in the country about perceptions of security and insecurity, drivers of conflict, and perceptions of aid programs and their administrators. Rather than finding humanitarian aid to be effective, he discovered that putting money into areas without proper controls leads to corruption and delegitimizes the government.

@ Assistant Editor Stephanie Berrong reports on the research in this month's "International." She also looks at the connection between Islamic extremists and engineering degrees.


7. Reputation Management

Skeptics used to say, "paper refuses no ink." Today's corollary is, "the Internet refuses no posts." Companies and even individuals need to monitor the Internet for possibly harmful statements. New services—called online reputation management or ORM—are available to remove negative information from the net, push positive information higher up on Google's search results, and generally improve a company's profile on the Web.

@ In this month's "Technofile," Associate Editor John Wagley describes how ORM services work. He also discusses application security and the market for security software.


8. Read All About It

The mission of homeland security is challenging enough for the government, let alone private sector entities, which must approach it in the context of profitability, liability, and continuity of operations. Homeland Security and Private Sector Business provides technical information and advice to help companies minimize risk and maximize preparedness. It emphasizes risk assessment, preparedness planning, and exercises.

@ Glenn W. McLea, CPP, corporate security director for Parsons Corporation, reviews this book in the December edition of Security Management. Other reviewers examine books on premises security litigation, aviation security, and employee theft.


9. Online Discussion Forum: Question of the Month

Visit the Forums on SM Online to share information and experiences with your peers. Here's a question recently posed by one visitor:

I am considering getting a degree in Organizational Security Management from the University of Phoenix. I have background in law enforcement and corrections. What kind of entry-level management position could someone with a degree and my kind of experience look forward to?

Leave an answer/comment about this post.

@ Register and participate in the Forums. It's free!


Because you are a valued subscriber to Security Management magazine, we would like to welcome you to the Security Management Online Product Information Service. You can instantly request product and service information from our most recent issue.

Select one or more categories of interest to view the advertisements and product announcements for the selected categories. Request more information about products and services using our reader service Web site.

Product Info


Also New Online:


Don't forget to go to www.securitymanagement.com on a daily basis to get the latest news from "Today's Headlines."


Subscribe to the print edition for additional, valuable information about important issues. This month, for example, includes the following:

  • Protecting electric utilities
  • Hiring and retaining security officers
  • Forensics' basis in science
  • Alarms via IP transmission
  • Suicide by cop

 


We welcome comments about content from the Web site or the print magazine, as well as suggestions regarding topics for future coverage. Send e-mail to:

Sherry Harowitz
Editor
Security Management
sharowitz@asisonline.org


Thank you for signing up to receive the SM Online E-News, an informal periodic alert to make you aware of breaking security news and upcoming monthly features that you can read by going to SM Online. (You will only receive this alert if you requested it. If you wish to leave the list, see the instructions at the end.)

This mail is never sent unsolicited. You have subscribed to receive this information. To unsubscribe from this e-letter, please click here.


 

 

 

 

 

 

 

 

 


Click here to unsubscribe

No comments:

Post a Comment