Certifications for detection dogs vary widely, leading private industry and government to seek solutions.
PRINT EDITION ONLY
By Peter Martin
Managers should have a comprehensive contingency plan in place to deal with potential labor disputes.
By Teresa Anderson
Courts rule that a company did not violate the law when it required an emplyee to undergo a psychological evaluation and that the state of Maryland may collect DNA samples from those arrested for serious offenses.
By Ann Longmore-Etheridge
Young professionals meet at the annual seminar and exhibits; ASIS and Wharton announce upcoming program dates; and Robert McMenomy, CPP, is profiled.
A Preliminary Guide to the ASIS International Exhibits
Check out this preliminary guide to the exhibits at the ASIS 59th Annual Seminar and Exhibits being held this month in Chicago.
By Laura Spadanuta
Researchers develop blast-resistant train cars, and localities try to keep gangs out with injunctions.
Getting the Goods
By Lilly Chapa
In order for companies to make sure they get goods safely shipped through supply lines, they have to be better at “getting the goods” on cargo thieves.
A Winning Team
By Joseph Ricci and Ann Longmore-Etheridge
Training new security officers at gaming and wagering properties should result in all stakeholders winning, hands down.
For many years, we have been led to believe, by the law enforcement community and daytime reality shows, that the polygraph test is a very reliable “investigatory tool” to measure someone’s honesty. Author Doug Williams dispels some of those misconceptions in his book From Cop to Crusader.
By Raymond P. Siljander and Lance W. Juusola; Reviewed by Paul D. Barnard, CPP
This fine reference publication updates the 1975 work by Raymond P. Siljander, Applied Surveillance Photography. The earlier work filled a void at the time, and this vastly expanded later work does the same today.
Making sure that critical infrastructures, such as transportation, finance, telecommunications, and energy, remain operational demands a comprehensive and integrated security plan. In this book, editor Francisco Flammini brings together cutting-edge critical infrastructure security information put forth by some of the best security authors of the day.
By Douglas A. Wissing; Reviewed by Mark Beaudry, CPP
This is an alarming exposé of how the U.S. government operates in Afghanistan and the challenges it faces, even as it indirectly supports violent jihad. This well-written book exposes top personnel, agencies, and decision makers by naming names associated with the corruption going on in the midst of the Global War on Terrorism.
Although written from a British perspective, Close Protection is one of the best books on the subject. The various aspects of close protection (CP), including protective movements and concentric rings of defense, weapons training, driving techniques, and trauma stabilization are consistent throughout the industry in all corners of the globe.
In this book, Professor Harvey Molotch argues that the government is worrying about the wrong things, and wasting huge amounts of money in the process. With a focus on post 9-11 events, he suggests that while significantly more security measures are in place, most people do not feel safer, and it is even arguable whether we are indeed safer.
Managing the Insider Threat applies social science research to the problem of insider threats, identifying mechanisms to reduce the “dark corners” that allow insiders to engage in damaging actions and providing guidance on how to implement mitigating strategies