As stakeholders work to shape a new cybersecurity framework for critical infrastructure, they highlight some options and the challenges inherent in devising such standards.
PRINT EDITION ONLY
By Ann Longmore-Etheridge
John W. Howard, former prime minister of Australia, is tapped to keynote at the ASIS International 59th Annual Seminar and Exhibits in Chicago, and Eric H. Morse, CPP, is profiled.
By Teresa Anderson
A company’s drug and alcohol screening program passes judicial muster, the U.S. Supreme Court rules that police need a warrant to use drug dogs, and legislators consider bills on courthouse security, school safety, and fraud.
By Laura Spadanuta
A new approach to problem solving from the bottom up, and researchers voluntarily lift a moratorium on bird flu studies.
Is Whistleblowing Working?
By Teresa Anderson
As the Dodd-Frank whistleblower program—designed to help catch fraud at financial institutions—reaches its one year anniversary, experts look at how it is working.
Biometrics in Developing Regions
By Holly Gilbert
First-world countries have long used biometrics for security and forensics, but developing countries are using biometrics to create IDs that can be used to facilitate services like voting or the distribution of financial aid.
By Charles P. Nemeth; Reviewed by Mark Beaudry, CPP
In this provocative book, the author covers a wide spectrum of topics regarding private security law. The book excels primarily because the author continually emphasizes the overarching business imperatives while considering the applicable liabilities.
John Madinger, who has extensive experience as an IRS criminal investigator, has written an outstanding introduction to the complex world of money laundering. It includes interesting sections on the history of money and of money laundering along with other forms of financial crime.
Author Edward Amoroso proposes ideas for the implementation of a National Infrastructure Protection Criteria. The proposed framework defines 10 criteria, and then identifies functions associated with each. The 10 criteria are deception, separation, diversity, commonality, depth, discretion, collection, correlation, awareness, and response.
By Dan Burges; Reviewed by Richard E. Widup, Jr., CPP
Supply chain security has become headline news, and this book does a good job of describing the multitude of cargo theft challenges that security professionals face today. The first section of the book details the pervasiveness of the problem and its consequences.
By Chameleon Associates; Reviewed by Terry L. Wettig, CPP
Security Questioning 101 is the latest addition to the catalog of security-related courses offered by Chameleon Associates—a security training and consulting firm. Its motto, Improving Security through Intelligence, certainly comes to life in this course as the student is taught to improve intelligence through effective questioning techniques.
By Brian Loughman and Richard Sibery; Reviewed by James T. “Tom” Roberts, Jr., CPP
Bribery and corruption in international business have been part of national cultures for as long as individuals have traded goods and services. The authors of this book focus on educating business leaders and employees about how to avoid corrupt practices, and they do it very well.
By Paul Carroll and Ken Patenaude; Reviewed by James D. Brown, CPP
Law enforcement has the responsibility to arrest the guilty person and an obligation to ensure that the wrong person is not convicted of a crime. Eyewitness Identification acknowledges the increasing awareness that eyewitness identification of criminals is unreliable.