In the social media world, individuals are encouraged to readily serve up personal data about where they are, who they are with, and when. But cartel members who use Facebook or similar social sites, for target selection can easily exploit this information to establish behavior patterns. (ONLINE EXCLUSIVE)
PRINT EDITION ONLY
Bully for You
By Laura Spadanuta
Bullying has gone virtual, and schools need to know how to develop policies that address cyberbullying while respecting students’ rights to free speech and other issues.
Fusing Intelligence Resources
By Tommy J. Burns, CPP
Learn how a one-of-a-kind public-private partnership is helping to protect Las Vegas.
By Teresa Anderson
Find out how Philadelphia’s City Center District helps coordinate police activities with business interests to reduce crime and make the city more attractive to businesses and tourists.
By John Wagley
Carnegie Mellon University is thwarting phishing attacks with a software program that teaches members of the campus community how to spot suspicious e-mails.
A Preliminary Guide to the ASIS International Exhibits
Check out this preliminary guide to the exhibits at the ASIS 58th Annual Seminar and Exhibits being held this month in Philadelphia.
By Teresa Anderson
Courts announce decisions on concealed weapons, detention of terrorism suspects, and healthcare privacy, while lawmakers consider bills on border security, counterfeit drugs, and campus security.
By Ann Longmore-Etheridge
ASIS releases a physical security standard, DHS establishes the Rescorla Award, and Joseph C. Nelson, CPP, is profiled.
By Philip S. Deming, CPP
By developing good data and focusing on broader business objectives, security managers can increase the odds of getting funding.
By Franz Bolz, Jr., Kenneth Dudonis, and David Schulz; Reviewed by Christopher Eger
The book overall is well presented with an audience of security and law enforcement professionals in mind. Its point of view is not from a single author, but from a panel of experts, and their specialization shows.
By Glenn McGovern; Reviewed by Ross D. Bulla, CPP, PSP
Author Glenn McGovern introduces the concept of protective operations as a continuum, ranging from situational awareness, at its most basic level, to protective details, safe houses, and new identities, at its increasingly complex levels.