INFORMATION

Site Map - Homeland Security

Calculating the Margin of Terror

- A new behavioral modeling software program tries to predict how a terrorist organization will act given an environmental variable.

Probing Ports' Murky Depths

- A new sonar array installed at a port in New Hampshire monitors underwater areas for suspicious activity.

Worldwide Terrorism by Tactic

- Quarterly tactic data on terrorist incidents from the MIPT Terrorism Knowledge Base.

State Perspective—South Carolina

- Interview with Ronald C. Osborne, director of the South Carolina Emergency Management Division

Conventional Weapons, Unconventional Threat

- The RAND Corp. analyzes what would happen if terrorists got their hands on hi-tech weaponry.

A New Plan for National Response

- A revamped plan to guide the federal government in emergency response stresses aid to state and local agencies.

Food Testing Trends

- Emerging technology may help food-safety testing meet the challenges of today's fast-paced global supply chain.

Protecting the Brand

- It is crucial for companies to develop strategies to protect their reputations, which includes preventing and responding to incidents involving food products.

Worldwide Terrorism by Target

- Quarterly target data on terrorist incidents from the MIPT Terrorism Knowledge Base.

State Perspective - Ohio

- Interview with William F. Veda, Jr., executive director of Ohio Homeland Security .

Driver's License Rule Improved, but Imperfect

- States that want their citizens to be able to use driver’s licenses as federal identification now have a limited timeframe in which to institute far more thorough methods for vetting the vital documents used to apply for those licenses and to take other steps to ensure that the entire process is more secure.

Learning Bomb-Making Secrets

- A Web portal sponsored by the government provides IED techniques to qualified bomb technicians.

Teaming Up to Reduce Risk

- Universities are using threat assessment teams to help identify at-risk students and keep them from harming themselves or others.Sidebar: Navigating Privacy Protections
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.