INFORMATION

Site Map - International

Terror in the U.K.

- British companies are more concerned about terrorism, says RAND Europe.

Bombs Away

- A look at bomb detection technologies and how they are being used.

Cargo security

- The Coast Guard authorization bill (H.R. 2443) has been approved by the House of Representatives and has been approved in a different form by the Senate. In a conference committee, which is designed to hash out differences in the two versions, lawmakers rejected a controversial provision that would have required Coast Guard representatives to review the security plans of all foreign vessels entering U.S. waters. (Under current law, the Coast Guard is required to review the security plans of domestic vessels.) At a hearing before the bill was passed, Coast Guard Commandant Thomas H. Collins contended that the agency does not have the money or personnel to complete the task, which would have required reviewing plans for more than 10,000 foreign vessels.

Al Qaeda

- Is Houston, Texas, high on al Qaeda's list of desired targets? A risk analysis report by Stratfor, a company that provides business and security intelligence, notes that Houston is a potential al Qaeda target, in part because it is home to Halliburton Co., a company that was specifically mentioned by Saudi Arabian militants in its May 27 attacks on western residential and business compounds in Khobar.

Quick Bytes: Organized scams.

- Some phishing scams may involve a "well-orchestrated, systematic criminal organization," according to Anatomy of a Phish, part of a study by the Anti-Phishing Working Group. Analysts noted, for example, that in June "identical attack methods were used to exploit two different banks, even though the phishing attacks were hosted in different locations over time," from Plano, Texas, to Uruguay and South Korea. @ Phishing Attack Trends Report, which also analyzes phishing schemes and trends from the first half of 2004, is available through SM Online.

Organized scams

- Some phishing scams may involve a "well-orchestrated, systematic criminal organization," according to Anatomy of a Phish, part of a study by the Anti-Phishing Working Group. Analysts noted, for example, that in June "identical attack methods were used to exploit two different banks, even though the phishing attacks were hosted in different locations over time," from Plano, Texas, to Uruguay and South Korea. @ Phishing Attack Trends Report, which also analyzes phishing schemes and trends from the first half of 2004, is available through SM Online.

Jurisdiction

-  A federal appeals court has ruled that a copyright infringement case based on a document that was created in France can be heard in the United States. The fact that the work was imported into the United States and was hosted on a U.S. Web site provided sufficient grounds for jurisdiction. (Palmer v. Braun, U.S. Court of Appeals for the Eleventh Circuit, No. 03-13963, 2004)

UK Security Chief Warns of Dirty Bomb Attack

- Home Secretary Jacqui Smith asked the British public to be vigilant over the holidays as Slovak police arrest three men they say had enough enriched uranium for a dirty bomb.

U.S. Should Concentrate on Border and Airport Security, Says Chertoff

- Unlike Europe, the terrorist threat faced by the U.S. comes from without rather than from within.

Did You Know That?

- Revenues from CCTV and fire-detection equipment will drive a booming industrial and commercial security market in Central and Eastern Europe through 2010, forecasts Frost & Sullivan. But security market leaders such as Siemens, Bosch, Tyco, and Honeywell "are likely to be challenged by the interest in cheaper products of lower quality offered by local and Asian manufacturers," according to a Frost & Sullivan statement.

Massive Terrorism Crackdown in Saudi Arabia

- 208 militants, forming six separate cells, were arrested for terrorist activity.

Shopping for Bombs: Nuclear Proliferation, Global Insecurity, and the Rise and Fall of the A. Q. Khan Network

- Meet A. Q. Khan, the world's most notorious nuclear proliferator.

Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis and Investigations, Second Edition

- As hate and terror organizations become more complex, investigators must collect intelligence and properly analyze it to keep pace. This book offers excellent insight into the process that professionals could apply in all investigative areas.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.