INFORMATION

Site Map - Research & Studies

Online Pharmacies

- One estimate suggests that there were over 36,000 rogue Internet pharmacies in operation as of February 2014, and these rogue sites violate a variety of federal laws, according to a government report. The report also discusses the substantial challenges investigating and prosecuting those involved with rogue Internet pharmacies, which are often complex, global operations.

Infrastructure Protection

- To address additional security concerns facing critical infrastructure, the Department of Homeland Security has issued an updated version of the National Infrastructure Protection Plan (NIPP). The new NIPP outlines how the government and private sector in the critical infrastructure community can work together to manage risks in the 16 critical infrastructure sectors.

Airport Screening

- A Government Accountability Office report recommends that the Transportation Security Administration no longer fund its behavior detection programs because they are generally ineffective. Its meta-analysis of hundreds of studies found that the ability of human observers to accurately identify deceptive behavior based on behavioral cues is the same as or slightly better than chance.

Data Protection

- The IT Risk/Reward Barometer, conducted by the nonprofit global association ISACA, examines the gaps between what people believe and what they do when it comes to the Internet and sharing information online. For example, people tend to fear that their information is at risk, but most continue to be careless with their passwords.

Cruise Line Security

- The cruise industry and federal agencies have implemented 11 of 15 of the Cruise Vessel Security and Safety Act provisions introduced in 2010. A report by the Government Accountability Office examines the delay in regulations and policy for the implementation of the remaining four provisions, including man-overboard technology.

Document Destruction

- A joint study conducted in January by the Ponemon Institute and Cintas shows that one-third of businesses do not have a policy for secure document destruction. Of those organizations that do have a policy, more than half say the guidelines do not cover the secure destruction of hard drives. Read about these and other findings in the full report.

Corruption

- A new report from the Center for Strategic and International Studies (CSIS) highlights corruption as a priority area for both the private sector and development implementers. The report, The Costs of Corruption: Strategies for Ending a Tax on Private-sector-led Growth, says that reducing corruption should be a major focus of development assistance and diplomacy, but of trade coalitions and business community efforts as well.

Cybersecurity

- The National Institute of Standards and Technology (NIST) has released the preliminary version of its cybersecurity framework for critical infrastructure. The voluntary guidelines were crafted by NIST with the help of private sector input and engagement with industry stakeholders. The final version of the framework is due in April.

Organized Crime

- Organized crime groups have adopted cyber tactics to bring their organizations into the 21st century and to further their reach. EUROPOL’s EU Serious and Organized Crime Threat Assessment and Threat Assessment: Italian Organized Crime both outlined new ways that organized crime is using the Internet to recruit members, distribute products, and launder money in new markets.

Security Clearances

- More than 4.9 million federal government and contract employees hold, or are eligible to hold, a security clearance in 2012. However, according to a report by the Government Accountability Office, there is no clear defined policy guidance for determining when a federal position needs a security clearance.

School Security

- Video Insight and STANLEY Security offer grants to schools for security equipment. Video Insight donates equipment to one school each month, and STANLEY Security provides four grants at the end of the year, based on a contest held in the autumn.

Border Security

- The Department of Homeland Security is upgrading the TECS Modernization system (TECS Mod) to improve screening of foreign visitors to the United States. A recent GAO report found that TECS Mod, which has already incurred costs upwards of $1.5 billion, is unlikely to meet its 2015 deadline.

Canine Evidence

- The Supreme Court ruled in Florida v. Harris that drug- or bomb-detection dogs can give police probable cause to search private property if they alert officers to potential illegal activities and are properly trained.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.