After Hostage Standoff, Discovery to Boost Physical Security at HQ

The Maryland cable network company wants to install a high gated fence in its public garden and divide its lobby to create separate entrances for employees and visitors, according to a press report.

Science and Technology of Terrorism and Counterterrorism, Second Edition.

While a daunting read at first glance, Science and Technology of Terrorism and Counterterrorism is worth the effort.

NCTC Releases Interactive Counterterrorism Calendar for 2011

The National Counterterrorism Center (NCTC) has released a solid interactive primer on international terrorism at its Web site.

Morning Security Brief: U.K. Terrorist Raid, Suspicious-Activity Database in U.S., and Cell Phone Data Ruling

U.K. arrests suspected terrorists in largest raid for months. The Washington Post continues its investigation into what it calls Top Secret America. And a court says cell-phone data retrieval requires a warrant.

Morning Security Brief: Indian Bioterror Fears, Holiday Terror Advisory, Radicalization, Counterradicalization, & Ecoterrorism

State Department cable tells of Indian bioterrorism fears. FBI and DHS send out terrorism advisory alert for holidays. Incoming chairman on House Homeland Security Committee will explore Muslim radicalization. Scholar argues Britain's Prevent program is counterproductive. Federal appeals court upholds longest ecoterrorism sentence in U.S. history.

Opposites Agree on Data Mining's Importance and the Need for Controls

Data mining, critical in the fight against terror, needs both an image makeover and a government-wide policy to ensure transparency and protection of civil liberties, according to a panel of experts from across the ideological spectrum.

Perfect Enemy: The Law Enforcement Manual of Islamist Terrorism

Dean Olson's Perfect Enemy provides an in-depth view of how religious fundamentalism evolves into terrorism.

TSA Chief Looks Forward to Less Invasive Security Screening Technology

Automated target recognition could provide a screening solution that doesn't upset privacy concerns, but it's not ready for prime time, TSA chief testifies.

The Security Implications of Social Networks

Whether online or in the real world, social networks have real implications and applications for security professionals.

Fending Off Pirates Through Robust Risk Management Programs

Ships transiting pirate-infested waters need a comprehensive risk management program to adequately defend themselves against attack.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.