INFORMATION

Site Map - Research & Studies

Cruise Line Security

- The cruise industry and federal agencies have implemented 11 of 15 of the Cruise Vessel Security and Safety Act provisions introduced in 2010. A report by the Government Accountability Office examines the delay in regulations and policy for the implementation of the remaining four provisions, including man-overboard technology.

Document Destruction

- A joint study conducted in January by the Ponemon Institute and Cintas shows that one-third of businesses do not have a policy for secure document destruction. Of those organizations that do have a policy, more than half say the guidelines do not cover the secure destruction of hard drives. Read about these and other findings in the full report.

Corruption

- A new report from the Center for Strategic and International Studies (CSIS) highlights corruption as a priority area for both the private sector and development implementers. The report, The Costs of Corruption: Strategies for Ending a Tax on Private-sector-led Growth, says that reducing corruption should be a major focus of development assistance and diplomacy, but of trade coalitions and business community efforts as well.

Cybersecurity

- The National Institute of Standards and Technology (NIST) has released the preliminary version of its cybersecurity framework for critical infrastructure. The voluntary guidelines were crafted by NIST with the help of private sector input and engagement with industry stakeholders. The final version of the framework is due in April.

Organized Crime

- Organized crime groups have adopted cyber tactics to bring their organizations into the 21st century and to further their reach. EUROPOL’s EU Serious and Organized Crime Threat Assessment and Threat Assessment: Italian Organized Crime both outlined new ways that organized crime is using the Internet to recruit members, distribute products, and launder money in new markets.

Security Clearances

- More than 4.9 million federal government and contract employees hold, or are eligible to hold, a security clearance in 2012. However, according to a report by the Government Accountability Office, there is no clear defined policy guidance for determining when a federal position needs a security clearance.

School Security

- Video Insight and STANLEY Security offer grants to schools for security equipment. Video Insight donates equipment to one school each month, and STANLEY Security provides four grants at the end of the year, based on a contest held in the autumn.

Border Security

- The Department of Homeland Security is upgrading the TECS Modernization system (TECS Mod) to improve screening of foreign visitors to the United States. A recent GAO report found that TECS Mod, which has already incurred costs upwards of $1.5 billion, is unlikely to meet its 2015 deadline.

Canine Evidence

- The Supreme Court ruled in Florida v. Harris that drug- or bomb-detection dogs can give police probable cause to search private property if they alert officers to potential illegal activities and are properly trained.

Officer Oversight

- The Department of Homeland Security’s Federal Protective Service, which contracts approximately 13,500 security officers at federal facilities, was found to lack oversight procedures in training officers for active-shooter scenarios and x-ray scanner usage in a report by the GAO.

Data Breaches

- In 2012, federal agencies reported 22,156 data breaches, an increase of 111 percent from 2009. The Government Accountability Office (GAO) found that while most federal agencies have policies for responding to a data breach, all of those policies are different. The GAO made 23 recommendations to update and standardize federal agency response.

Explosives Detection Standards

- An agency has developed training aides for explosives-sniffing dogs.

Homeland Security: An Introduction to Principles and Practice, Second Edition

- The work is a well-organized, thought-provoking manual that is far superior to most references on the topic. Each chapter presents a distinct aspect of homeland security written in an easy-to-understand format.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.