September 2007


Plus: Infrastructure Protection • Information Sharing • Casino Security


Down and Out in Record Time

By Glen Kitteringham, CPP

Being down and out may be bad, but getting down and out of a high-rise in an emergency is critical—and getting staff to practice can make the difference in a real disaster.

Sidebar"It Does Not Pay to Delay"


What’s Wrong with the War on Terrorism?

By Joseph Straw

Brian Michael Jenkins is one of the world’s leading authorities on international terrorism, currently serving as senior advisor to the president of the think tank RAND Corp.  He recently published Unconquerable Nation: Knowing our Enemy, Strengthening Ourselves, and Security Management. Assistant Editor Joseph Straw talked with him about the book, terrorism generally, and private security’s role.


State Perspective – Kansas

By Joseph Straw

An interview with Maj. General Tod M. Bunting.

Worldwide Terrorism by Target

By Mike Moran

Quarterly target, region, and tactic data on terrorist incidents from MIPT Terrorism Knowledge Base.

The Long Road to Secure Infrastructure

By Joseph Straw

New government plans to protect critical infrastructure lack substance despite a decade-long effort by federal officials and private-sector partners.

Talk Trumps Tech in Silicon Valley

By Joseph Straw

It stands to reason that California’s Silicon Valley would lead the country in establishing a network of interoperable communications for first responders. And it does—but not for the technological reasons you might think.


The Concept of Security Providers' Accreditation

By Leonard H. Miller CPP/CFE

Why the security industry should push states to develop accreditation standards for security officers

Are Cities Sapping Immigration Laws?

By Laura Spadanuta

Critics of sanctuary cities argue that such policies provide cover for terrorists. Law enforcement officials disagree.

It Does Not Pay to Delay

By John M. Hewitt, CPP, CIPM

According to statistics from the National Fire Protection Association (NFPA), a fire breaks out in a building every 60 seconds in the United States. Automatic sprinklers can play a vital role in saving lives and preservation of property.


The New "Need to Know"

By Joseph Straw

The intelligence community is slowly learning the value of sharing the data it gathers, but barriers to good information flow remain.

A Guide to the 2007 ASIS Seminar and Exhibits

Check out the exhibitors at the ASIS International 53rd Annual Seminar and Exhibits.

Never Bet Against Security

By Ann Longmore-Etheridge

An old Florida parimutuel adapts to the demands of new surveillance regulations.

The Many Faces of Malware

By Mary Alice Davidson

In the past, cyberthreats fit into discrete categories, such as being virus or phishing. Today, lines are blurred and malware is multifaceted and multiplying, creating a challenge for companies trying to defend against such threats.

Security's Secret to Success

By William Cottringer, Ph.D, CHS-III

The successful manager knows the value of building a diverse team, facing conflict, and properly planning policy implementation.

Industry News

By Ann Longmore-Etheridge

ASIS International announces the winner of its school security essay competition, the seminar and exhibits wins a tradeshow award, and U.S. Air Force Lt. Col. Joseph L. Rector, CPP, PCI, PSP, is profiled.

Suspicious Activity Reports' Effectiveness is Questioned

By Laura Spadanuta

The role of banking regulations in fighting counterfeiting.

Fingerprint Advances Could Aid Investigators

By Laura Spadanuta

The latest in fingerprinting technologies.

Legal Report

By Teresa Anderson

Rulings on a zero tolerance policy for workplace violence and sexual harassment; federal guidance on avoiding family-obligation discrimination; plus legislation on gun control, courthouse security, and privacy.


The Magazine — Past Issues


Civic Minded or Still Crazy After All These Years?

By Sherry Harowitz, Editor-In-Chief

What part does community involvement play in terrorism prevention?


Checking IT Backgrounds

By John Wagley

As employee background checks become more prevalent, many experts are urging companies to pay particular attention to their IT staff.



The percentage of organizations reporting that they have experienced a data breach event, according to a study by the Ponemon Institute.

Sizing Up Enterprise Rights Management

By John Wagley

After an incident several years ago in which a manager sold some of the company’s intellectual property to a competitor, the executive search firm Sterling-Hoffman did some brainstorming on ways to fortify its data protection. The company, based in Mountain View, California, decided to go with a software solution that would secure the data no matter the format or storage location.

Behind the Numbers: A Surge in Phishing Attacks

In Privacy We Trust

By John Wagley

A data breach can badly bruise a company’s reputation. But when companies work hard to convince their customers that their private information is protected, it can be a boon to customer loyalty and a firm’s bottom line.


Rendering Assistance to Aid Workers

By Matthew Harwood

Aid workers, who render assistance to the most vulnerable populations in the least hospitable regions of the world, have long operated with protected status under international humanitarian law. Combatants, nevertheless, increasingly ignore this protection.



The number of European countries that have admitted to allowing the CIA to operate secret prisons or conduct extraordinary rendition in their countries, according to a recent report issued by the European Parliament. The CIA flew more than 1,000 secret flights into European airports from 2001 to 2005, the report states.

Tsunami Warning

By Robert Elliot

Due to be completed by the end of 2008, a system of buoys will provide advance warning of a tsunami to countries that border India.

Perils Amid Profits in the Niger Delta

By Matthew Harwood

Learn how companies in Nigeria can protect their employees from the country's kidnapping plague. (Online Exclusive)

China's Weapons Buildup

China’s nuclear weapons stockpile is expected to grow over the next decade.


Working in the Wild

By Teresa Anderson

If a laptop is stolen, encryption software keeps data hidden, while tracking software "phones home," making it easy to catch the crooks.


Safe Passage Travel Companion

By Richard A. Parry, CPP, CISM

In today’s uncertain world, those responsible for the safety of travelers are always on the lookout for good security tools and resources to aid that mission. The tools offered by the Safe Passage Travel Companion provide basic, necessary security information for both the novice and the seasoned traveler.

Security Operations Management, Second Edition

By Bob Sena, CPP

With the technological advances and world events of the past 25 years, security management has evolved greatly and become both a vital business function and an academic discipline. Recognizing this, Robert D. McCrie has wisely chosen to update this classic reference source for students, practitioners, and business managers alike.

Strategic Security Management: A Risk Assessment Guide for Decision Makers

By Jack F. Dowling, CPP, PSP

This book takes on the ambitious goal of bridging the gap between theory and reality in risk-assessment-based security management—and achieves it handily. The author emphasizes the fundamental responsibilities of today’s security managers: to assess risks, demonstrate them to justify costs, and accurately measure security’s effectiveness to manage it properly.

Corporate Crooks: How Rogue Executives Ripped Off Americans…and Congress Helped Them Do It!

By Dan Bergevin

The period from the late 1990s into the early years of the 21st century is likely the best-documented era of corporate scandal in history.  In Corporate Crooks, Greg Farrell, an investigative reporter for USA Today, offers a simple primer on the subject.

The Bodyguard’s Bible

By Kevin A. Cassidy

Author James Brown says “the mark of a good bodyguard is that he keeps a level head in a crisis, reassesses the situation, and then embarks on the correct next course of action.” That quote constitutes the thesis of The Bodyguard’s Bible, a well-written book with 38 chapters that flow nicely, informing the reader and maintaining his or her interest. Brown does an excellent job of disassociating “bouncers” from security professionals who protect the rich, famous, and powerful. To that point, he notes that the term Close Protection Officer (CPO) is replacing the term “bodyguard” in the field.  


Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.