Search This Blog

Monday, January 11, 2010

Security Management Web Highlights for January 2010

If you experience problems viewing this email, try the web version.
Security Management

Monthly Web Preview

January 2010


HOME | THE MAGAZINE | NEWS | BEYOND PRINT | MARKETPLACE | EVENTS | FORUM | CONTACT US


Security Management cover

SUBSCRIBE
ADVERTISE
READER SERVICE CARD
MARKETPLACE
 

HEADLINE NEWS

Hot Docs: Christmas Day Terrorist Attack Edition
Jan 08, 2010 - A quick compendium of documents and statements released on the intelligence failures leading up to the botched terrorist attack on Christmas Day as well as the corrective actions necessary to prevent similar attacks in the future.

Declassified Report Lists Intelligence Failures Leading Up to Botched Terrorist Attack
Jan 07, 2010 - The White House today released a public summary detailing the counterterrorism (CT) community's failure to stop an alleged terrorist from boarding a U.S.-bound flight on Christmas.

Christmas Day Bomber Indicted
Jan 07, 2010 - The Department of Justice charged the 23-year-old Nigerian yesterday with trying to blow up an airliner on Christmas Day.

Is Whole Body Imaging the Answer to Passenger Screening?
Jan 06, 2010 - A rising chorus of government officials and security experts say yes, but one aviation security analyst argues the technology is only as good as the human manning it.

Security Cameras Not Recording During Breach at Newark Airport
Jan 06, 2010 - The Transportation Security Administration has revealed that security cameras positioned at a terminal's exit were not recording on Sunday when a man breached security at Newark Liberty International Airport, according to CNN.com.

 

HOT DOCUMENTS

Security of Air Cargo During Ground Transportation
The Department of Homeland Security Office of Inspector General (IG) reports says that the Transportation Security Administration (TSA) "could improve its efforts to secure air cargo during ground handling and transportation" before it's loaded onto a passenger aircraft.

Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers
The Government Accountability Office (GAO) has recommended that DHS evaluate whether 100-percent scanning is feasible regardless of the time frame.

Are We Winning? Measuring Progress in the Struggle Against Al Qaeda and Associated Movements
Last year saw both victories and setbacks in the fight against Islamist terrorism as al Qaeda suffered serious blows while Islamist terrorism rose dramatically in Afghanistan, Pakistan, and Somalia, according to a new report from the American Security Project, a U.S. national security think tank.

Quon v. Arch Wireless, U.S. Court of Appeals for the Ninth Circuit, No. 07-55282, 2008
The U.S. Supreme Court agreed to hear oral arguments in a case brought by police officers who claim that their employers illegally read their private text messages. A federal appeals court has ruled that a police department violated the privacy rights of its officers when it obtained transcripts of text messages sent and received via a service purchased by the city.

DHS Statement on REAL ID
The Department of Homeland Security (DHS) has pushed back a pending deadline for state compliance with the REAL ID Act to May of 2011, averting the chaos that would have erupted Jan. 1 if people carrying newer, noncompliant state-issued IDs were unable to use them for federal purposes, like boarding commercial airline flights.

 

NEW ONLINE THIS MONTH

1. January Podcast
2. ONLINE EXCLUSIVE: Women in Security

FROM THE PRINT EDITION

3. COVER FEATURE: Stopping Bank Robbers
4. ASIS President Profile
5. Crisis Leadership
6. Global IP Protection
7. Small Business Fraud
8. Read All About It
9. Question of the Month

1. January Podcast: Security Layers, Islamic Terrorist Trends, Meta-Leadership, Whistleblowers, and Information Protection

Join Host Editor Laura Spadanuta as she talks with security professionals and editors about topics online and in this month's print edition, including a look at the problems that layers of security measures can create, a report on radical Islamic groups, the benefits of meta-leadership for homeland security, court cases on negligence and whistleblowers, and a reasonably priced way to protect data on a thumb drive.

@ Listen in at Security Management's Podcasts page.


2. ONLINE EXCLUSIVE: Women in Security

Although the public may perceive of security as the purview of men with backgrounds in the military or law enforcement, women are steadily gaining ground in the industry. Security is one of the world's fastest-growing professions, opening up career prospects for everyone. Women frequently come to the industry by nontraditional paths, such as through human resources or background screening services. They still constitute a minority in the field, but there are plenty of accomplished women who are serving as role models for aspiring female security professionals.

@ Mimi Lanfranchi, senior vice president with AlliedBarton Security Services, talked with other leading female security pros to learn about their progress in the industry. Read "Women in the Security Sector" only at www.securitymanagement.com.



FROM THE PRINT EDITION

3. COVER FEATURE: Stopping Bank Robbers

Banks make attractive targets for thieves: they have to be welcoming to the public, and they also contain large amounts of easily disposable assets. To discourage would-be criminals, banks are working with law enforcement and their peers to spot trends and patterns. They are also designing their facilities for deterrence and using updated technologies to catch the culprits. One remarkably successful tactic is to employ greeters to welcome customers to the bank.

@ Associate Editor Laura Spadanuta describes the various ways security professionals can protect assets and employees in "Robbery Risk Reduction."


4. ASIS President Profile

Joseph R. "Bob" Granger is the 2010 president of ASIS International. The native Floridian has had a fascinating and varied career in the military, law enforcement, and the private sector, giving him an inside view of most aspects of the security profession. He currently serves as security director of the United Space Alliance, the prime contractor on the shuttle program for NASA. An enthusiastic member of ASIS since 1985, he is an active proponent of security education, certification, and standards.

@ Learn more about President Granger and his vision for the Society in "Rising to New Heights" by Associate Editor Ann Longmore-Etheridge.


5. Crisis Leadership

When a crisis mobilizes multiple individuals and agencies, an exceptional leader can make all the difference. Management experts have identified and studied "meta-leaders" in emergencies such as 2001's anthrax scare and 2005's Hurricane Katrina. Those leaders exert influence beyond their authority to further a shared goal. Now the National Preparedness Leadership Initiative and the CDC Foundation are spreading the word on creating such leaders.

@ January's "Homeland Security" takes a look at the qualities of meta-leaders and how they can be learned. This month's column also contains an update on chemical security standards and an interview with Rich Flannery, a Virginia regional homeland security official.


6. Global IP Protection

Protecting intellectual property (IP) around the world is subject to the laws and their enforcement in multiple jurisdictions. The U.S. government is stepping up efforts to protect IP worldwide with the recent appointment of the first intellectual property enforcement coordinator, in addition to eight IP attaché positions and two IP law enforcement coordinators. The GAO recently examined IP issues in three countries—China, India, and Thailand—where pirating of IP is particularly egregious.

@ Assistant Editor Stephanie Berrong reports on worldwide IP protection measures in this month's "International." She also looks at Mexico's decision to decriminalize small quantities of illicit drugs and how that will affect companies doing business in Mexico.


7. Small Business Fraud

Fraudsters are increasingly attacking small and medium-sized businesses (SMBs) through phishing scams and malware that capture passwords and other information during online financial transactions. Besides recommending use of layered defenses and monitoring of financial statements, some analysts suggest that SMBs utilize a standalone operating system for financial use, separating those transactions from other business functions.

@ In this month's "Technofile," Associate Editor John Wagley describes fraud prevention measures for SMBs. He also looks at a new encrypted flash drive that also serves as an encryption system.


8. Read All About It

A year ago, experts believed that the first flu pandemic in more than four decades would result from a deadly strain of avian influenza. Instead, that pandemic has come from a highly contagious strain of the H1N1 swine flu. Pandemic Influenza: Emergency Planning and Community Preparedness may appear dated with its emphasis on the avian flu, but its lessons apply to the pandemic currently circling the globe and to any other large-scale disease outbreak.

@ Bob Sena, CPP, director of emergency preparedness for a chapter of the Red Cross, reviews this book in the January edition of Security Management. Other reviewers examine books on security operations, data mining, and Web security, plus a training video on chlorine security.


9. Online Discussion Forum: Question of the Month

Visit the Forums on SM Online to share information and experiences with your peers. Here's a question recently posed by one visitor:

Our department is looking for other higher educational institutions that have credentialed staff for emergency management access to campus. If there are others out there who have a model, I'd be interested in reviewing their systems for implementation here.

Leave an answer/comment about this post.

@ Register and participate in the Forums. It's free!


Because you are a valued subscriber to Security Management magazine, we would like to welcome you to the Security Management Online Product Information Service. You can instantly request product and service information from our most recent issue.

Select one or more categories of interest to view the advertisements and product announcements for the selected categories. Request more information about products and services using our reader service Web site.

Product Info


Also New Online:


Don't forget to go to www.securitymanagement.com on a daily basis to get the latest news from "Today's Headlines."


Subscribe to the print edition for additional, valuable information about important issues. This month, for example, includes the following:

  • Pitfalls of layered security
  • Targeted training
  • Citywide surveillance
  • Perceptions of risk
  • Online neighborhood watch


We welcome comments about content from the Web site or the print magazine, as well as suggestions regarding topics for future coverage. Send e-mail to:

Sherry Harowitz
Editor
Security Management
sharowitz@asisonline.org


Thank you for signing up to receive the SM Online E-News, an informal periodic alert to make you aware of breaking security news and upcoming monthly features that you can read by going to SM Online. (You will only receive this alert if you requested it. If you wish to leave the list, see the instructions at the end.)

This mail is never sent unsolicited. You have subscribed to receive this information. To unsubscribe from this e-letter, please click here.


 

 

 

 

 

 

 

 

 


Click here to unsubscribe

No comments: