THE MAGAZINE

May 2008

REDUCING CRIME AT WORK

Plus: Video Vulnerabilities • Security Assessments • Artful Interviewing

COVER STORY

Where Criminals Fear to Tread

By Glen Kitteringham, CPP

Use well-established environmental crime principles to make criminals conclude that it’s too risky to commit crimes on your property.

FEATURES

Digital Video Vulnerabilities

By Jason Schmitt

Companies that implement networked video must recognize the exposures that are created and implement the appropriate measures to protect the data from hackers.

HOMELAND SECURITY

A New Plan for National Response

By Joseph Straw

A revamped plan to guide the federal government in emergency response stresses aid to state and local agencies.

Conventional Weapons, Unconventional Threat

By Joseph Straw

The RAND Corp. analyzes what would happen if terrorists got their hands on hi-tech weaponry.

State Perspective—South Carolina

By Joseph Straw

Interview with Ronald C. Osborne, director of the South Carolina Emergency Management Division

Worldwide Terrorism by Tactic

By Mike Moran

Quarterly tactic data on terrorist incidents from the MIPT Terrorism Knowledge Base.

PRINT EDITION ONLY

Discouraging Loiterers by Design

By Mike Fenton, CPP, PSP

Urban properties that face challenges from loiterers, such as the homeless, can use crime prevention through environmental design principles to solve the problem.

Secrets of a Successful Self-Assessment

By Kerrie L. Kavulic

Contractors that handle classified materials must self-assess to ensure that they meet government standards. These tips reveal how to get support from the staff being evaluated.

Industry News

By Ann Longmore-Etheridge

ASIS establishes two awards to honor the late Roy N. Bordes, and Frederick A. Coe, Jr., CPP, is profiled.

College Football's Crime Connection

By Laura Spadanuta

New research indicates that communities that host college football games experience more assaults on game day, especially if the home team loses.

Will Your Vote Count?

By Laura Spadanuta

Academic and state studies find that electronic voting machines are vulnerable to tampering.

Homeland Security Hits High Schools

By Laura Spadanuta

The Department of Homeland Security has sponsored a program that teaches high school students how to deal with fires as well as the science behind them.

Legal Report

By Teresa Anderson

Rulings on discrimination, retaliation, and mental health in the workplace; plus legislation on national security, courthouses, and whistleblowers.

The Art of Interviews

By Thea Bournazian

In any investigation, the only way to get the full picture is by knowing how to coax witnesses into sharing what they know.

 

The Magazine — Past Issues

EDITOR'S NOTE

Don’t Shoot the Messenger

By Sherry Harowitz

Whistleblowers deserve protection.

CYBERSECURITY

Social Sites: More Foe than Friend?

By John Wagley

Senior executives are increasingly targeted by phishing scams, and social networking sites may be behind the trend.

Canada’s Privacy Best

By John Wagley

Of all North American and European companies, Canadian firms have the strongest and most consistent privacy policies.

Site to See: XSSed.com

By John Wagley

XSSed.com offers free e-mail alerts to notify companies when they receive a vulnerability affecting their Web site.

Behind the Numbers: Top 5 Drivers for Corporate Privacy Measures

By Forrester Research, Inc.

In Plain Text: Wireless Hacking Exposed

By Johnny Cache and William Liu; Reviewed by Lewis E. “Lew” Wagner III, CPP, CAS

Learn the dos and don'ts of using wireless infrastructures so hackers can't compromise your personal data.

Worth a Look: IronKey USB Drive

By John Wagley

The IronKey USB drive combines combines a sturdy exterior with its biggest differentiator:  numerous onboard privacy and security features.  

INTERNATIONAL

São Paulo Makes Headway Against Crime

By John Barham

More police on the street, a focus on hotspots, and better equipment are among the factors helping this Brazilian state reduce its murder rate.

Spike in Fake Euros Raises Concern

By John Barham

Thought immune to counterfeiting, police in the European Union are seizing more and more fake euros.

Reclaiming Stolen Assets from Corrupt Autocrats

By John Barham

Anti-corruption advocates are finding international opposition to legal regimes to reclaim looted assets, but the tide may be turning.

Numbers

93

The percentage of the world’s opium poppies grown in Afghanistan last year, according to the U.S. government’s International Narcotics Control Strategy Report. Poppy production soared in the southern provinces, where Taliban-led insurgents use drug trafficking to finance their operations. Poppy cultivation is declining in poorer, but more secure, northern and central provinces.

INDUSTRY NEWS

Top 10 Performing Security Industry Stocks for February

By SecurityStockWatch.com

Top 10 Security Industry Private Investments for February

By Venture Business Research

Certification Profile

By Vicki Moeser, ASIS Public Relations Manager

This month's certification profile is Frederick A. Coe, Jr., CPP, security director for the Massachusetts Army National Guard.

CASE STUDY

Parking Snatcher Solution

By Ann Longmore-Etheridge

When homeowners faced frustration due to unauthorized parking in a private lot, officials found a Web-based reservation system to help control access.

BOOK REVIEWS

Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies

By Brian A. Jackson et al; Reviewed by Paul D. Barnard, CPP, CISM

The United States and other nations continually deploy new tactics and techniques to combat terrorists and disrupt their operations. The enemy, however, has responded to counterterrorism efforts with their own countermeasures and counter- countermeasures.

Police Analysis and Planning for Homicide Bombings, 2nd Edition

By John W. Ellis; Reviewed by Terry V. Cochran, CPP

Using the more accurate concept, homicide bombing, this work is a superior foundation for security professionals who seek to prevent, or prepare to respond to, terrorist bombings.

Security Design Consulting

By Brian Gouin; Reviewed by Susan Gallagher

Find the basics of security design consulting in this book.

Document Security: Protecting Physical and Electronic Content

By Roger L. Mendell; Reviewed by Arian A. Barnie, CPP, CFE

Document security has evolved with technology, but the most critical element is still the human one.

 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.