INFORMATION

Site Map - SM Online

School Counseling

- In light of the Virginia Tech tragedy, the RAND Corp. provides a tool-kit for school-based mental healthcare for students recovering from a traumatic event.

RFID

- The government has developed guidelines and a set of best practices for RFID use in federal agencies and private corporations. The best practices are intended to reduce the privacy and security risks associated with RFID.

Background Screening

- Six DHS background screening programs are examined by the GAO and found to be duplicative of one another, resulting in widespread redundancies and other inefficiencies.

Piracy

- For every two dollars worth of software purchased legally in 2006, one dollar's worth was stolen according to a new piracy study by BSA and IDC.

Keeping Investors Terror-Free

- Now the Washington, D.C.-based Conflict Securities Advisory Group, Inc., offers the Global Security Risk Monitor, a service that lets fund managers screen out companies doing business in countries designated as sponsors of terrorism.

Terrorism

- Soon after convening in January, the House of Representatives approved H.R. 1, a bill that would implement the recommendations of the 9/11 Commission that were not enacted in the prior Congress. While the 9/11 Commission had much support, concerns about the costs and practical challenges of implementing all of its recommendations remain. For that reason, this bill is not expected to sail as expeditiously to passage in the Senate.

Communications

- The Department of Homeland Security (DHS) has announced that it will require those municipalities that have grants from the department to have interoperable communications systems implemented by the end of 2007.

Background Screening

- The Nuclear Regulatory Commission (NRC) has issued a final rule requiring that those who have access to nuclear safeguards information - defined as sensitive, unclassified, security-related data - be fingerprinted and undergo an FBI criminal records check. Under the rule, those who have completed a background check within the past five years or who have an active security clearance need not be rescreened at this time. The fingerprinting requirement is required under the Energy Policy Act of 2005, and is effective immediately. The NRC is currently working on a more comprehensive rule addressing the other issues set out in the act. The upcoming rule will address issues such as security precautions to preserve the integrity of safeguard information and how often employees must be rescreened. Read the rule.

Airport Security

- The Transportation Security Administration (TSA) has pushed back two deadlines for conducting background checks on workers who handle air cargo. The original deadline to screen all such workers was December 1, 2006. However, the deadline has now been extended to March 15, 2007 for the staff of U.S. aircraft operators and foreign air carriers. An even later deadline - June 15, 2007 - has been set for employees of indirect air carriers. These are companies that contract with air carriers to perform a security-related service such as storing cargo or moving it from a warehouse to the airport. Read the regulation establishing these new deadlines.

Identity Theft

- The Department of the Treasury, along with several other agencies, has issued a proposed rule that will require financial institutions and creditors to establish a program to reduce identity theft.

Nuclear Facility Security

- The Nuclear Regulatory Commission (NRC) has issued a proposed rule requiring that nuclear facilities conduct risk assessments, implement training exercises, and enhance security programs.

Numbers

- 7 million dollars has been recovered from funds originally paid out in potentially improper or fraudulent payments by the federal government for Hurricanes Katrina and Rita.

Insights on Internet Investigations

- The National Institute of Justice has issued another in its series of reports on investigating high-tech crimes. It provides guidance on such issues as tracing an Internet address to its source. It also looks at specifics with regard to various issues such as Web site capture tools and Web archiving sites that may help an investigator determine the content of a site at the time the crime was committed. It likewise discusses the unique concerns involved in investigations of instant messenging (IM), chat rooms, and Internet Relay Chat. It notes, for example, "Service providers are not required to retain IP address information. Therefore, when an IM program is involved, time is of the essence." Read the complete report.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.