INFORMATION

Site Map - News & Trends

Numbers

- 14 Percentage of Arkansas trial court judges who said that their courthouses had written security policies and plans, according to a survey by the state’s Administrative Office of the Courts. Only 7 percent said they had written emergency plans for natural disasters.

Where Copyright Meets the Internet

- Copyright infringement on the Internet, planning for floods, space security, and stale-dated check fraud.(

DID YOU KNOW THAT?

- Detonators, rocket motors, and bulk explosive powders were among at least 410 items that Sandia National Laboratories could not account for when audited by the U.S. Department of Energy’s Office of Inspector General. Auditors found other problems with explosives handling and processing at both Sandia and Los Alamos National Laboratories, but Lawrence Livermore National Laboratory was hailed for its “robust program” for explosives handling and processing.@  Read the audit report  at SM Online.

Will You Flood?

- ASIS headquarters is at low to moderate risk for flooding. But the risk surges just a few blocks to the east, closer to the Potomac River. Want to assess the flood risk to your current or prospective sites? Check out the government’s Flood-Smart site (through SM Online), which also offers other flood-related resources for businesses and homes.

Olympics Results Not All Downhill

- Although Italy and the United States have close counterterrorism ties, U.S. agencies weren’t able to formally assess Italy’s operational security plans due to lack of access to sensitive information. They improvised by using “established relationships with their Italian counterparts to develop a working knowledge of Italy’s plans and capabilities for providing security,” according to a GAO report. @ Read the report at SM Online.

Numbers

- 52 The number of teams that DHS plans to have by year-end to find and deport illegal immigrants who have not appeared for their court hearing or for their ordered removal.

Jargon Watch

- Demystifying terms used in the security industry. SWOT Analysis: This SWOT has nothing to do with tactical assault teams, but rather strategic planning for a project or venture. In competitive intelligence, SWOT (Strengths, Weaknesses, Opportunities, Threats) Analysis is often used to turn information into actionable intelligence. According to a recent survey by the Society of Competitive Intelligence Professionals (SCIP), SWOT is one of the two analytical techniques (along with competitor analysis) frequently used by competitive intelligence practitioners.

Who’s Impersonating Hospital Inspectors?

- The fear is that the impostors are terrorists scouting hospitals for vulnerabilities, says Fred Roll, a healthcare security consultant and the president of the International Association for Healthcare Security and Safety (IAHSS).

License Plates Drive Video Improvements

- License plates drive video improvements, hurricane lessons, imposters in hospitals, susceptibility to fraud, and more

Fraud Findings.

- In a study conducted by Pratkanis for the Consumer Fraud Research Group, he writes that investment-fraud victims seemed to be actually more knowledgeable about investing than were nonvictims, supporting the adage that a little knowledge is a dangerous thing. He also describes the phenomenon of “mass customization,” in which con artists find out all they can about a customer and tailor their tactics to the person. One fraud artist who learned that a victim was religious managed to gain the woman’s trust by praying with her at the beginning of every conversation.@ The study is available via SM Online.

Bioterror Focus Changing Public Health Systems

- Every U.S. state has an agency that handles public health, but how the public health apparatus functions from state to state diverges widely. Some agencies are freestanding, others are part of a larger health and human services department. The way they deal with local health agencies varies as well: some states centralize control over local health agencies, others grant local agencies wide latitude in operations, and still other states fall somewhere in between. The services provided by these agencies are also all over the map. Does the structure matter? Not really, say researchers at the RAND Corporation who recently examined “whether there is a link between how state and local public health departments are organized and the level of their emergency preparedness.” Read the report.

Another Hidden Enemy in Iraq

- There are so many threats in Iraq that it’s hard to know where to start: foreign jihadists, Shiite radicals, Baath party loyalists, and garden-variety criminals, to name a few. Add one unexpected threat to that list: private security providers. The U.S. Government Accountability Office has warned that the lack of criminal-background data on prospective private security personnel puts U.S. military forces and Iraqi civilians at risk. The threat is mainly from Iraqi and third-country personnel, testified William Solis, GAO’s director of defense capabilities and management, before the House Committee on Government Reform’s Subcommittee on National Security, Emerging Threats, and International Relations. @ The testimony is at SM Online.

Numbers

- 11 Percentage of Security Management readers who have had business continuity planning added to their list of responsibilities in the last 12 months. Other new fields of responsibility cited in the survey were disaster preparedness and response (7 percent of readers) and risk management (another 7 percent).
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.