January 2008


Plus: School Safety • Facility Protection • Strategic Planning


Fighting Terrorism in the U.K.

By Matthew Harwood

The U.K. is engaging in a difficult balancing act—trying to win the hearts and minds of its Muslim citizens while simultaneously having police aggressively patrol for suspicious activity.


A Strategic View

By Ann Longmore-Etheridge

Timothy L. Williams, CPP, ASIS International’s 2008 president, plans to focus his year on  the importance of aligning the goals of security and business.

Access Emergency

By Tom Chronister, CPP

While doors, walls, gates, and fences do a great job of keeping the bad guys out, they can also stop the good guys from getting in. (Online Exclusive)


State Perspective - Oregon

By Joseph Straw

Interview with Ken Murphy, director of Oregon Emergency Management.

Scouting for Signs of Pandemic

By Joseph Straw

By pooling and analyzing information from various sources, a newly launched program can spot a disease outbreak before it becomes a crisis.

Border Disorder

By Joseph Straw

America's vulnerabilities at the border keep growing, but experts say securing the U.S.-Canada border is both financially prohibitive and practically impossible.

Factors Driving Data Center Disaster Recovery Preparedness

By Forrester Research, Inc.

Worldwide Terrorism by Region

By Mike Moran

Quarterly region data on terrorist incidents from the MIPT Terrorism Knowledge Base.



The number of fugitive-operation teams now in the U.S. Immigration and Customs Enforcement (ICE) Office, up from 15 in 2005. The increase has helped ICE catch 35,000 fugitive aliens.


Will Use of UAVs Take Off?

By Laura Spadanuta

Tests are underway to assess whether unmanned aerial vehicles could be safety used by police in metropolitan areas.

An Intelligence Sharing Success Story?

By Laura Spadanuta

The Homeland Infrastructure Threat and Risk Analysis Center has been helping the United States make important headway in information sharing between the federal intelligence community, private sector infrastructure stakeholders, and local and state law enforcement officials.

The Value of Exercises

By Laura Spadanuta

Scenario-driven exercises continue to prove their worth as a way to test plans internally and among organizations that will have to coordinate their actions in a crisis.

Guarded Diplomacy

By Andrew Turk, CPP

The charge of strengthening diplomatic and humanitarian locations is complicated by the need to secure vulnerabilities and ensure that the facilities are welcoming to visitors.

Legal Report

By Teresa Anderson

Rulings on concealed weapons and campus security; plus legislation on terrorism insurance, explosives, and food safety.

Industry News

By Ann Longmore-Etheridge

ASIS International supports global standards and Sanjay Bahl is honored for his work in using convergence to reduce security risks.

Managing Work Anxiety

By Marvin Weisbord and Sandra Janoff

Everyone feels anxiety, but managers cannot afford to succumb to it. Here's how to manage and minimize it.


The Magazine — Past Issues


Balancing Faith and Skepticism

By Sherry Harowitz

Do we expect too much from technology?


Vein Recognition Use Grows

By John Wagley

A biometric technology that identifies users by the unique vein pattern on their fingers or hands is becoming more popular.

Cell Phones Secure Online Banking

By John Wagley

Bank of America has rolled out a new form of Internet authentication, already popular overseas, for its online banking services.

Inside the Numbers: Instant Messaging Vulnerabilities

The National Vulnerability Database reported a 200 percent increase in vulnerabilities in popular IM applications in 2007.

Quick Bytes: Upcoming Threats

By John Wagley

The Georgia Tech Information Security Center outlines the top five areas of security concern and risk for consumer and enterprise Internet users for the year ahead.



The percentage of organizations that had experienced insider abuse of network access or e-mail, according to the most recent Computer Security Institute annual Computer Crime and Security Survey. That compared to 52 percent reporting virus incidents.


Quick Bytes: Tech Spending Up

By John Wagley

Spending on security technology, training, assessments, and certification now constitutes 20 percent of organizational IT spending, according to the Computing Technology Industry Association.


Flying Safer Skies?

By John Barham

Flying has never been safer, but there are still parts of the world where flying can be risky.

Pirates Beaten Back

By John Barham

Despite a recent uptick, piracy incidents are down significantly from a decade ago due to better intelligence and a greater use of technology.

Ranking Global Cybercrime

By John Barham

Even as banks ramp up their IT defenses, cybercriminals go where the money is.


School Improves Image

By Ann Longmore-Etheridge

A new digital camera system has helped administrators at one Canadian school identify thieves and vandals while keeping students safe.


Encyclopedia of Security Management, Second Edition

By John J. Fay, CPP, editor; Reviewed by Thomas W. Leo, CPP

In today’s rapidly expanding and increasingly complex security environment, practitioners need all the help they can get. Because of that, there is an ever-increasing tendency to call outside consultants who specialize in specific fields for their advice and counsel.  This book will save security professionals both phone calls and consultant fees, placing the experts’ know-how within reach.

Terrorism and Counterterrorism: Understanding the New Security Environment, Readings, and Interpretations

By Russell D. Howard and Reid L. Sawyer; Reviewed by Glen Kitteringham, CPP

No matter what view you take on the West's current approach to countering terrorism, you will be challenged by this text.

Countering Terrorism and WMD: Creating a Global Counter-Terrorism Network

By Peter Katona, et al, editors; Reviewed by Mayer Nudell, CSC

Learn how informal international networks trump formal international ones in the battle against terrorism and WMDs.

Closed Circuit Television, Third Edition

By Joe Cieszynski; Reviewed by Susan Gallagher

Want a good overview of CCTV systems, their history and their evolution? Then this book is for you.

Biometric Technologies and Verification Systems

By John R. Vacca; Reviewed by Col. Kulijeet Singh, CPP

Security professionals looking for texts on the cutting edge of technology often find few on the shelf. They will, however, benefit from this finely honed text by John R. Vacca.

Homeland Security, 2nd Edition

By Thomas J. Badley, editor; Reviewed by John S. Belcastro, M.A., CHS - III

A collection of 41 articles that provides a variety of opinions and points of view on an extremely broad and controversial topic, making the format an excellent fit for the subject matter.


Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.