Brian Michael Jenkins is one of the world’s leading authorities on international terrorism, currently serving as senior advisor to the president of the think tank RAND Corp. He recently published Unconquerable Nation: Knowing our Enemy, Strengthening Ourselves, and Security Management. Assistant Editor Joseph Straw talked with him about the book, terrorism generally, and private security’s role.
It stands to reason that California’s Silicon Valley would lead the country in establishing a network of interoperable communications for first responders. And it does—but not for the technological reasons you might think.
According to statistics from the National Fire Protection Association (NFPA), a fire breaks out in a building every 60 seconds in the United States. Automatic sprinklers can play a vital role in saving lives and preservation of property.
Critics of sanctuary cities argue that such policies provide cover for terrorists. Law enforcement officials disagree.
PRINT EDITION ONLY
The New "Need to Know"
By Joseph Straw
The intelligence community is slowly learning the value of sharing the data it gathers, but barriers to good information flow remain.
A Guide to the 2007 ASIS Seminar and Exhibits
Check out the exhibitors at the ASIS International 53rd Annual Seminar and Exhibits.
Never Bet Against Security
By Ann Longmore-Etheridge
An old Florida parimutuel adapts to the demands of new surveillance regulations.
The Many Faces of Malware
By Mary Alice Davidson
In the past, cyberthreats fit into discrete categories, such as being virus or phishing. Today, lines are blurred and malware is multifaceted and multiplying, creating a challenge for companies trying to defend against such threats.
Security's Secret to Success
By William Cottringer, Ph.D, CHS-III
The successful manager knows the value of building a diverse team, facing conflict, and properly planning policy implementation.
By Ann Longmore-Etheridge
ASIS International announces the winner of its school security essay competition, the seminar and exhibits wins a tradeshow award, and U.S. Air Force Lt. Col. Joseph L. Rector, CPP, PCI, PSP, is profiled.
Suspicious Activity Reports' Effectiveness is Questioned
By Laura Spadanuta
The role of banking regulations in fighting counterfeiting.
Fingerprint Advances Could Aid Investigators
By Laura Spadanuta
The latest in fingerprinting technologies.
By Teresa Anderson
Rulings on a zero tolerance policy for workplace violence and sexual harassment; federal guidance on avoiding family-obligation discrimination; plus legislation on gun control, courthouse security, and privacy.
A data breach can badly bruise a company’s reputation. But when companies work hard to convince their customers that their private information is protected, it can be a boon to customer loyalty and a firm’s bottom line.
After an incident several years ago in which a manager sold some of the company’s intellectual property to a competitor, the executive search firm Sterling-Hoffman did some brainstorming on ways to fortify its data protection. The company, based in Mountain View, California, decided to go with a software solution that would secure the data no matter the format or storage location.
Aid workers, who render assistance to the most vulnerable populations in the least hospitable regions of the world, have long operated with protected status under international humanitarian law. Combatants, nevertheless, increasingly ignore this protection.
The number of European countries that have admitted to allowing the CIA to operate secret prisons or conduct extraordinary rendition in their countries, according to a recent report issued by the European Parliament. The CIA flew more than 1,000 secret flights into European airports from 2001 to 2005, the report states.
Author James Brown says “the mark of a good bodyguard is that he keeps a level head in a crisis, reassesses the situation, and then embarks on the correct next course of action.” That quote constitutes the thesis of The Bodyguard’s Bible, a well-written book with 38 chapters that flow nicely, informing the reader and maintaining his or her interest. Brown does an excellent job of disassociating “bouncers” from security professionals who protect the rich, famous, and powerful. To that point, he notes that the term Close Protection Officer (CPO) is replacing the term “bodyguard” in the field.
In today’s uncertain world, those responsible for the safety of travelers are always on the lookout for good security tools and resources to aid that mission. The tools offered by the Safe Passage Travel Companion provide basic, necessary security information for both the novice and the seasoned traveler.
With the technological advances and world events of the past 25 years, security management has evolved greatly and become both a vital business function and an academic discipline. Recognizing this, Robert D. McCrie has wisely chosen to update this classic reference source for students, practitioners, and business managers alike.
This book takes on the ambitious goal of bridging the gap between theory and reality in risk-assessment-based security management—and achieves it handily. The author emphasizes the fundamental responsibilities of today’s security managers: to assess risks, demonstrate them to justify costs, and accurately measure security’s effectiveness to manage it properly.
The period from the late 1990s into the early years of the 21st century is likely the best-documented era of corporate scandal in history. In Corporate Crooks, Greg Farrell, an investigative reporter for USA Today, offers a simple primer on the subject.