September 2013

Chicago’s Big Security Shoulders

By Teresa Anderson

How Chicago shoulders its broad security responsibility through strong public-private partnerships.


Assessing the State of the Security Industry

By Sherry Harowitz

A new comprehensive report prepared jointly by ASIS International and the Institute of Finance and Management provides the first big-picture look at the industry in more than 25 years.


Progress Report on Canine Training

By Lilly Chapa

Certifications for detection dogs vary widely, leading private industry and government to seek solutions.



By Peter Martin

Managers should have a comprehensive contingency plan in place to deal with potential labor disputes.

Legal Report

By Teresa Anderson

Courts rule that a company did not violate the law when it required an emplyee to undergo a psychological evaluation and that the state of Maryland may collect DNA samples from those arrested for serious offenses.

Industry News

By Ann Longmore-Etheridge

Young professionals meet at the annual seminar and exhibits; ASIS and Wharton announce upcoming program dates; and Robert McMenomy, CPP, is profiled.

A Preliminary Guide to the ASIS International Exhibits

Check out this preliminary guide to the exhibits at the ASIS 59th Annual Seminar and Exhibits being held this month in Chicago.


By Laura Spadanuta

Researchers develop blast-resistant train cars, and localities try to keep gangs out with injunctions.

Getting the Goods

By Lilly Chapa

In order for companies to make sure they get goods safely shipped through supply lines, they have to be better at “getting the goods” on cargo thieves.

A Winning Team

By Joseph Ricci and Ann Longmore-Etheridge

Training new security officers at gaming and wagering properties should result in all stakeholders winning, hands down.


The Magazine — Past Issues


FBI Opens Portal for Cyberattack Reporting

By Sherry Harowitz

Learn about the FBI’s new cyberreporting portal which it hopes will help it track down hackers.


Defending Against DDoS Attacks

By Holly Gilbert

Studies show that distributed denial of service attacks are on the rise, but there are ways to defend against them.

Behind the Numbers

By Prolexic

Denial of service attacks by country of origin.


Tier Pressure to Curb Human Trafficking

By Laura Spadanuta

Experts analyze the effectiveness of the State Department’s rankings of countries based on their efforts to combat human trafficking around the world.


School Seeks Uniformity

By Ann Longmore-Etheridge

The IT department at the Escambia County (Florida) School District has embarked on a five-year quest to unify and update the district’s access control system.


Critical Infrastructure Security: Assessment, Prevention, Detection, Response Assessment, Prevention, Detection, Response

By Francisco Flammini; Reviewed by David P. Sayer

Making sure that critical infrastructures, such as transportation, finance, telecommunications, and energy, remain operational demands a comprehensive and integrated security plan. In this book, editor Francisco Flammini brings together cutting-edge critical infrastructure security information put forth by some of the best security authors of the day.

Funding the Enemy: How U.S. Taxpayers Bank­roll the Taliban

By Douglas A. Wissing; Reviewed by Mark Beaudry, CPP

This is an alarming exposé of how the U.S. government operates in Afghanistan and the challenges it faces, even as it indirectly supports violent jihad. This well-written book exposes top personnel, agencies, and decision makers by naming names associated with the corruption going on in the midst of the Global War on Terrorism.

Close Protection: A Closer Observation of the Protection Equation

By Richard J. Aitch; Reviewed by Dan Mead

Although written from a British perspective, Close Protection is one of the best books on the subject. The various aspects of close protection (CP), including protective movements and concentric rings of defense, weapons training, driving techniques, and trauma stabilization are consistent throughout the industry in all corners of the globe.

Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger

By Harvey Molotch; Reviewed by Ben Rothke

In this book, Professor Harvey Molotch argues that the government is worrying about the wrong things, and wasting huge amounts of money in the process. With a focus on post 9-11 events, he suggests that while significantly more security measures are in place, most people do not feel safer, and it is even arguable whether we are indeed safer.

Managing the Insider Threat: No Dark Corners

By Nick Catrantzos; Reviewed by Mayer Nudell

Managing the Insider Threat applies social science research to the problem of insider threats, identifying mechanisms to reduce the “dark corners” that allow insiders to engage in damaging actions and providing guidance on how to implement mitigating strategies

From Cop to Crusader: The story of my fight against the dangerous myth of “lie detection”

By Doug Williams; Reviewed by Brian L. Royster

For many years, we have been led to believe, by the law enforcement community and daytime reality shows, that the polygraph test is a very reliable “investigatory tool” to measure someone’s honesty. Author Doug Williams dispels some of those misconceptions in his book From Cop to Crusader.

Endangered Children: Homicide and Other Crimes, Second Edition

By Lita Linzer Schwartz and Natalie K. Isser; Reviewed by Colonel Kuljeet Singh, CPP

This timely work, well-researched and brilliantly written, explores the many threats facing children and offers insight into possible remedies to them.

Clandestine Photography: Basic to Advanced Daytime and Nighttime Manual Surveillance Photography Techniques

By Raymond P. Siljander and Lance W. Juusola; Reviewed by Paul D. Barnard, CPP

This fine reference publication updates the 1975 work by Raymond P. Siljander, Applied Surveillance Photography. The earlier work filled a void at the time, and this vastly expanded later work does the same today.


Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.