Will Rage Turn to Rampage?
October 2005

Quick Bytes: Spoof proof.

By Peter Piazza

Phishing and pharming scams typically rely on Web-site spoofing, where fraudulent but realistic-looking versions of real sites trick customers into providing sensitive information to con artists. Because financial institution Web sites are typically the ones that get spoofed, the Office of the Comptroller of the Currency (OCC) has released a paper to help banks respond to spoofing incidents. @ The OCC bulletin is available through SM Online.


One-On-One Protection

By Robert D Bond

Knowing the environment and anticipating the protectee’s needs are two of the challenges facing protection professionals, who must often work alone.


Protecting Malls from a Terrorist Threat

By Marta Roberts

Shopping malls have always been vulnerable to traditional crimes due to the lack of controls at entrances. The shooting of two people at an upstate New York shopping center earlier this year, though not a terrorist incident, again raised questions about whether mall security could respond adequately to a terrorist attack or suicide bomber.

Mail Handling Reviewed

Mail handling procedures at the U.S. Postal Service need improvement, according to an analysis of the Postal Service’s handling of the October 2003 incident in which an envelope marked “Caution: Ricin Poison” was discovered in an airmail facility.

Procurement Problems at DHS

By Marta Roberts

Critics say that proposed restructuring does not address contracting issues.



By Michael A. Gips

142 ½

Number of Arizonans per 100,000 population who had their identities stolen last year, the highest rate in the United States, according to the Federal Trade Commission. The lowest rate of victimization, 23.2 per 100,000 residents, was in South Dakota.

Legal Report

By Teresa Anderson

A transit company is not liable for hiring an employee who raped a customer. Also, federal legislation on making the Patriot Act permanent, fighting counterfeit drugs, and tracking radiation sources.

Jargon Watch

By Michael A. Gips

Everyone is familiar with the abbreviations HUMINT and SIGINT. Now “MULTI-INT” is gaining currency. MULTI-INT refers to the process of gathering and rapidly transmitting information from various sources in an attempt to detect a threat scenario. The term, which the RAND Corporation’s Gregory Treverton has called a current intelligence community “buzzword,” refers to collecting and assimilating various types of intelligence—human, signal, telemetry, and so on.

Do London Bombings Signal a New Course?

By Michael A. Gips

Two weeks after suicide bombers killed more than 50 commuters on the London subway and a bus, a near-identical attack struck that same transportation system, though the second round of bombs didn't go off as planned. The second attack seems to mark the first time that a group affiliated with or inspired by al Qaeda has hit the same type of target twice within a few weeks.

Preparing Places of Refuge

By Michael A. Gips

Problems with the Louisiana Superdome raise questions about how evacuation sites are chosen.

Industry News

By Ann Longmore-Etheridge

Three of ASIS International’s guidelines become resources on the U.S. Chamber of Commerce’s Web page devoted to homeland security; and Lynne T. Sienon, CPP, is profiled.

Leading by Example

By Charles W. Lutz

Managers who want to motivate their teams need a positive attitude, a clear vision, good communication skills, and integrity.

Distilled Protection

By Dorothy Kellogg and Kate McGloon

One chemical manufacturer discusses how it protects its facilities.

How to Handle Disability Issues

By Stephen W. Lyman

Here’s what your company needs to know to avoid charges of disability discrimination.


The Magazine — Past Issues


Defining Moment

By Peter Piazza

Security as a Governance Concern

By Peter Piazza

Saying that the basis of a good IT security program is effective enterprise security governance smacks of business-school jargon. After all, what exactly is effective enterprise security governance?

New in plaintext: Firefox secrets revealed

By Peter Piazza

The number of users of alternative Web browser Firefox is growing steadily; while Microsoft’s Internet Explorer still dominates the market, some analysts put the number of Firefox users at more than 64 million. If you are one of those users, you’ve probably spent some time with the basics—learning how to use tabs and themes, for example.

Worth a Look: Cyberwear

By Peter Piazza

At first glance it may seem odd that this month’s “Worth a Look”  item is not a computer accessory or high-tech gadget, but rather a jacket. But it’s no ordinary jacket; it’s made to meet all the needs of cybersavvy travelers as well as physical security professionals who need a way to stow all their gear, from PDAs and cell phones to anything else that needs to be holstered.

Quick Bytes: Measuring risk

By Peter Piazza

 Fifty-eight percent of businesses rank reducing network risk as their number-one concern, but half of these businesses have no effective way to measure or report on network security risk.

Market Forces vs.Legislation: What’sYour View?

By Peter Piazza

In the wake of multiple high-profile thefts of consumer information, the protection of personal data held in business databases has become a hot topic. Some legislators have introduced bills that would hold companies liable for inadequately guarding sensitive data as one way to encourage greater security.

The All-Seeing Eye in the Sky

By Peter Piazza

Some high-profile or high-risk companies now worry about having strangers take photographs of their buildings for fear they might be criminals or terrorists surveilling the property. The real threat, however, may be from above—from the eyes in the sky.

Quick Bytes: Homeland security.

By Peter Piazza

Many core components of the Department of Homeland Security (DHS) have weak information-security practices and controls in areas such as risk assessment, security testing and evaluation, and remedial action plans, according to a Government Accountability Office report.


Fune Tuning E-mail Control

Smart solutions to security problems


Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.