INFORMATION

Site Map - International

Pakistani Tribes May Be Recruited to Help U.S. Against al Qaeda

- The U.S. may use a similar strategy it used in Anbar Province, Iraq, to fight al Qaeda terrorists.

Understanding Terror Networks

- The book reflects a systematic and pragmatic approach based on Sageman's personal experiences and research. Blending his training as a forensic psychiatrist, his experience as a diplomat dealing with Afghani mujaheddin, and his proficiency with various social science methodologies, Sageman has put together an excellent snapshot of the dangers posed by contemporary Islamic terrorists that is a blend of network theory, modeling, empirical analysis, and historical review.

U.S. Military Sees Drop in IEDs in Iraq

- Top U.S. official attributes the drop in the weapons' use to Iran.

Port security

- Exactly one year after 9-11, ABC News reported that a steel pipe containing a 15-pound cylinder of depleted uranium arrived from Istanbul, Turkey, in the United States, undetected by U.S. Customs and Border Protection (CBP). On the second anniversary of 9-11, ABC News reported that the same cylinder again eluded the CBP, this time arriving from Jakarta, Indonesia. The Inspector General of the Department of Homeland Security (DHS) was asked to investigate. The Inspector General found that CBP officials followed protocols and procedures that were "not adequate to detect the depleted uranium." An unclassified, abbreviated version of the report can be found on SM Online.

Terrorism data

- From 1968 through November 15, 2004, international terrorists most frequently targeted private citizens, businesses, and property. Of the 19,383 total incidents of terrorism around the world in that period, 3,192 hit private citizens and property. Business targets were a close second, with 3,065 incidents. Among targets hit, transportation was victimized 821 times, utilities 554 times, and airports and airlines 798 times. After al Qaeda, the most lethal group during these years was Hezbollah, causing more than 800 deaths. These statistics come from the Terrorism Knowledge Base of the National Memorial Institute for the Prevention of Terrorism, a nonprofit organization funded by the U.S. Department of Homeland Security with the mission of preventing or minimizing terrorist attacks on U.S. soil. Among other things, the Knowledge Base is a repository of incidents arranged by type, perpetrator, date, location, and other factors. It also contains overviews of terrorist groups, legal cases involving terrorism, information resources, and other valuable materials for terrorism researchers. Users can create graphs of incidents by group, incident, and other factors, and they can search terrorist organizations by ideology, such as antiglobalization, environmental, and right-wing reactionary. Link to the database via SM Online.

Islamist Cleric Can be Extradited to the U.S.

- Abu Hamza al-Masri, if extradited, will face 11 charges, including the establishment of a terrorist training camp in Oregon.

Financial Firms Face Infosec Perils

- A British financial services firm discovered that a fake Web site bearing its name had been set up, presumably to "phish" for customer passwords and account information. Unfortunately, it took ten days before the firm could find out a way to have the site taken down. (They ultimately went to the U.S. Secret Service for help in getting the American Internet service provider to take down the site.)

Cyberpros on the March

- The number of security professionals will nearly double, rising to 2.1 million by 2008, predicts the International Information Systems Security Certification Consortium, or (ISC)2. The rate of growth will vary by region, however, according to the group's Global Information Security Workforce Study. For example, growth of about 12 percent annually is anticipated in the Americas, while growth of about 18.3 percent is expected in the Asia/Pacific region.

United Kingdom to Beef up Security Once Again

- Prime Minister Brown's new counterterrorism plan seeks to protect the nation's transportation infrastructure.

Financial Firms Face Infosec Perils

- A British financial services firm discovered that a fake Web site bearing its name had been set up, presumably to "phish" for customer passwords and account information. Unfortunately, it took ten days before the firm could find out a way to have the site taken down. (They ultimately went to the U.S. Secret Service for help in getting the American Internet service provider to take down the site.) @ Countering Financial Crime Risks in Information Security: Financial Crime Sector Report is available through www.securitymanagement.com.

Cyberpros on the March

- The number of security professionals will nearly double, rising to 2.1 million by 2008, predicts the International Information Systems Security Certification Consortium, or (ISC)2. The rate of growth will vary by region, however, according to the group's Global Information Security Workforce Study. For example, growth of about 12 percent annually is anticipated in the Americas, while growth of about 18.3 percent is expected in the Asia/Pacific region. The study, conducted by market intelligence firm IDC, was based on a questionnaire filled out by 5,371 respondents from more than 80 countries.

Privacy

- Malaysia and Japan use video surveillance to oversee public places. Italy uses the technology to monitor transportation. And Germany uses it to collect tolls. That's just a small sample of countries adopting public-area surveillance, notes an annual report by watchdog group Privacy International.SM Online takes you to the report.

Did You Know That?

- Saudi Arabia holds one-quarter of the world's proven oil reserves, making security of its oil infrastructure essential to the global economy. A report by the Center for Strategic and International Studies cites the kingdom's "weakest link" as its 10,700 miles of pipeline. Still, security is taken so seriously there that "most foreseeable assaults are likely to be quickly confined and any resulting damage is likely to be repaired relatively quickly," says the report. @ Read it at SM Online.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.