SUBSCRIBE ADVERTISE READER SERVICE CARD MARKETPLACE HEADLINE NEWS The Next Big Thing in VIP Protection: Bulletproof Fashion Wear Feb 04, 2010 - In Bogota, Colombia, Miguel Caballero has found a fashion niche that may make him the choice tailor to VIPs around the world. Congressman Admonishes DHS for Neglecting Public Concerns Over Screening Technology Feb 03, 2010 - The Department of Homeland Security (DHS) must pay closer attention to whether passengers are comfortable with future screening technologies before they are deployed to airports, a lawmaker said today. Obama Requests $1 Billion to Protect the Airline Industry and Its Passengers in 2011 Feb 02, 2010 - In its proposed 2011 budget for the Department of Homeland Security (DHS), the Obama Administration has requested nearly $1 billion to secure the nation's airports from terrorism-related threats on the heels of Christmas Day's botched attack by a young jihadist from Nigeria. CIA Human Lie Detectors Moonlight for Corporate America Feb 01, 2010 - Some of the CIA's best and brightest have the opportunity to moonlight their unique talents to the highest bidder in the private sector, reports Politico. HOT DOCUMENTS Bryan v. McPherson, U.S. Court of Appeals for the Ninth Circuit, No. 08-55622, 2009 The Ninth Circuit Court of Appeals ruled in December that a local California police officer violated the constitutional rights of an unarmed, passive man when he tased him after a routine traffic stop, allowing the aggrieved man to continue his lawsuit against the offending officer. Release of the Security Review Conducted After the Failed Christmas Terrorist Attack In the aftermath of the botched Christmas Day terrorist attack, the White House released a public summary detailing the counterterrorism (CT) community's failure to stop a 23-year-old jihadist from boarding the flight and detonating an explosive device. Preventing Burglary in Commercial and Institutional Settings: A Place Management and Partnerships Approach While burglary rates continue to slide internationally, the crime continues to victimize businesses disproportionately despite simple and cost-effective ways to protect shops and facilities, according to a new CRISP report from the ASIS Foundation. Protecting the Force: Lessons from Fort Hood The Pentagon's independent inquiry into the Fort Hood shootings reports that the military's ability to identify internal threats and report information up the chain of command must be improved to prevent radicalized individuals from carrying out attacks on military posts. Al Qaeda in Yemen and Somalia: A Ticking Time Bomb The Senate Committee on Foreign Relations warns that approximately 72 American citizens, some ex-convicts, have disappeared into the ungoverned spaces of Somalia and Yemen and may pose a jihadist threat to the United States. | NEW ONLINE THIS MONTH FROM THE PRINT EDITION 1. February Podcast: Poison Pen Letters, Computer Security, Pandemic Preparedness, Intellectual Property Theft, and More Join Host Editor Laura Spadanuta as she talks with contributing authors and editors about this month's topics, including how companies should handle threatening anonymous correspondence directed at executives, what to do if you think your office is bugged, how studying the past may help improve future maritime security efforts, what we've learned so far about pandemic preparedness, and how the courts have responded to some cases concerning bank customer-record-protection liability and computer security policies. @ Listen in at Security Management's Podcasts page. 2. ONLINE EXCLUSIVE: COMMENT - Counterterror, Technology, and Reaction The rush to deploy full body scanners at airports after the botched terrorist attack on Christmas is one more example that the United States government puts too much faith in technology to protect civilians from terrorists. Rather than always reacting to last attack, the United States must leverage intelligence to take the fight to jihadist terrorists before they can step foot inside an airport. @ Robert Raffel, associate professor of homeland security at Embry-Riddle Aeronautical University, argues a successful counterterrorism strategy must involve intelligence. Read "Counterterror, Technology, and Reaction" only at www.securitymanagement.com. FROM THE PRINT EDITION 3. COVER FEATURE: Homeland Technology Always on the lookout for ways to deter and respond to terrorist threats, the Science and Technology Directorate (S&T) at the U.S. Department of Homeland Security is investing in cutting-edge research and technology. Among the ideas currently moving toward reality are a device to help firefighters orient themselves in smoke-filled structures, a sensor array that could detect intent to harm based on body movements, tunnel detection that could help thwart underground border crossings, and a tool that remotely senses whether a victim is alive. @ Assistant Editor Joseph Straw describes the accomplishments of the S&T in "From Research to Reality." 4. Risk Communication Keeping the public apprised of a potential crisis is critical to weathering the storm—or the pandemic. The U.S. government received both thumbs-up and thumbs-down ratings for its communications regarding this season's H1N1 outbreak. In the plus column, agencies unified their message and gave an honest assessment of the disease's contagion and virulence. On the other hand, agencies fell short in communicating accurate information about the availability, timing, and safety of a vaccine for the disease. @ February's "Homeland Security" evaluates the quality of risk communications and examines lessons learned. Also in this issue is an interview with MaryAnn Tierney, an executive in emergency management for the City of Philadelphia. 5. Data Protection While data breaches continue to make news, one global organization is effectively protecting personal information of its clients. The Graduate Management Admissions Council—which owns the Graduate Management Admissions Test (GMAT)—recently won an International Association of Privacy Professionals award for its data protection and privacy program. The organization appointed a chief privacy officer, reduced the personal data it collected, and augmented security awareness training for employees, among other things. @ Assistant Editor Stephanie Berrong reports on these measures in this month's "International." She also looks at a new database that documents naval conflicts in the Indian Ocean. 6. Corporate Espionage Along with tougher economic times comes a greater risk of corporate spying. One popular way to learn industrial secrets is to tap conversations via bugging devices, which have become smaller and less expensive. Foiling these bugs is the purview of Technical Surveillance Countermeasures (TSCM) experts. Successful bug sweeps require expensive equipment, but it is experience that makes the difference. @ In this month's "Technofile," Associate Editor John Wagley describes the new tapping technology and how to counter it. He also reports on how to avoid social networking pitfalls and reviews a Web site that helps users surf the Internet anonymously. 7. Read All About It The threat of abduction is a constant one. Security professionals responsible for personal protection, particularly in high-risk countries like Mexico and Nigeria, understand that better than most. Richard P. Wright's Kidnap for Ransom: Resolving the Unthinkable is a book for the real protection manager facing real abduction threats. Wright depicts the subject matter both historically and conceptually. In this book, a security professional will find a ready template for his or her own kidnapping incident procedures. @ Paul H Aube, CPP, reviews the book in February's Security Management. He is a member of the ASIS International Council on Global Terrorism, Political Instability, and International Crime. 8. Online Discussion Forum: Question of the Month Visit the Forums on SM Online to share information and experiences with your peers. Here's a question recently posed by one visitor: What's in a name? We are looking at the right title for our safety and security staff. "Security officer" is the current title, but we are looking for something that more closely resembles a park ranger role. Does anyone have an example to share? Leave an answer/comment about this post. @ Register and participate in the Forums. It's free! Because you are a valued subscriber to Security Management magazine, we would like to welcome you to the Security Management Online Product Information Service. You can instantly request product and service information from our current issue. Select one or more categories of interest to view the advertisements and product announcements for the selected categories. Request more information about products and services using our reader service Web site. Also New Online: Don't forget to go to www.securitymanagement.com on a daily basis to get the latest news from "Today's Headlines." Subscribe to the print edition for additional, valuable information about important issues. This month, for example, includes the following: - Dealing with threatening mail
- Biometrics use in Europe
- Eyewitness identification
- Global risk alerts
- Online rants vs. privacy
We welcome comments about content from the Web site or the print magazine, as well as suggestions regarding topics for future coverage. Send e-mail to: Sherry Harowitz Editor Security Management sharowitz@asisonline.org Thank you for signing up to receive the SM Online E-News, an informal periodic alert to make you aware of breaking security news and upcoming monthly features that you can read by going to SM Online. (You will only receive this alert if you requested it. If you wish to leave the list, see the instructions at the end.) This mail is never sent unsolicited. You have subscribed to receive this information. To unsubscribe from this e-letter, please click here. |
No comments:
Post a Comment