INFORMATION

Site Map - Contingency Planning \ Disaster Management

Terrorist tactics

- “Coordinated Terrorist Attacks: Implications for Local Responders,” an article in a recent FBI Law Enforcement Bulletin, explores these types of attacks and provides advice for first responders. The prospect of coordinated attacks makes it advisable for responders to decentralize equipment and personnel, say authors Brian K. Houghton and Jonathan M. Schacter. Further, responders should avoid deploying all their resources after an attack, lest they be targeted by a secondary attack or be needed elsewhere. Responders should also anticipate being attacked, say the authors, and work with law enforcement to establish a secure perimeter far from the site of the first attack, to sweep for secondary devices, and to monitor bystanders who may be witnesses or terrorists themselves.

Larstan’s The Black Book on Corporate Security

- Jim Kennedy’s chapter, “Business Continuity and Disaster Recovery,” deserves special mention because it is an excellent overview of the changes to traditional disaster planning brought about by the World Trade Center attacks. Less successful is a chapter entitled “Blending Corporate Governance with Corporate Security,” which discusses Sarbanes-Oxley. The author asserts that Section 404 of the act deals with “systems of control,” which he says are by their very nature computer information systems. Yet Section 404 does not specifically mention computer systems, and any security requirements beyond those necessary to ensure accurate financial accounting and reporting are beyond the scope of Sarbanes-Oxley. To flatly state that increased information security measures are required under this law is misleading.

Preparing Places of Refuge

- Problems with the Louisiana Superdome raise questions about how evacuation sites are chosen.

Distilled Protection

- One chemical manufacturer discusses how it protects its facilities.

Fraternité, Sororité, Fire Safety

- The University of Florida has developed a scoring system that has led to fire-safety improvements in Greek fraternity and sorority housing.

How Safe Are Our Labs?

- Before they receive government authorization, labs handling dangerous biological specimens must show they have incident response plans.

No Lights, No Camera, Just Action

- Emergency response and disaster management plans shouldn't be filed away until the day they are needed, but tested regularly to identify weaknesses and improve plans. Learn the eight major areas that must be tested and how to stage an exercise.

A Secure Backup Plan

- Through the company’s Internet service provider, Ladd learned about Arsenal Digital Solutions, a North Carolina company offering a number of storage and disaster-recovery solutions. Ladd looked at one solution, ViaRemote, and did a cost-benefit analysis that showed that Strahan would save enough on Ladd’s labor alone to pay for it. He decided a day later to give ViaRemote a try.

Hospitals Join EOC Teams

- Florida, which has a lot of experience with hurricanes, has found a way to improve the coordination of healthcare services in such events.

Too Much Focus on Terrorism?

- A recent GAO report that predated Katrina is nonetheless right on point in looking at the dangers of a federal response effort that focuses too heavily on terrorism.

Information Sharing Through Fusion Centers

- When Massachusetts opened its Fusion Center in October 2004, it became the seventh state to set up this type of information-sharing facility, intended to improve cooperation among federal, state and local agency personnel in the state. Major Robert Smith, deputy commander in the Massachusetts State Police, talked with Security Management about information sharing. Following are highlights from the conversation. (His remarks have been paraphrased to accommodate the magazine’s space limitations.)

State Perspective - Pennsylvania

- Interview with James F. Powers, Pennsylvania’s director of Homeland Security

Collapse and Consequences

- The collapse of the I-35 bridge in Minneapolis was a reminder that 72,000 bridges in this country are structurally deficient. How did we get here? By using the wrong infrastructure management model.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.