Site Map - Physical Security

Security equipment

- Several bills introduced in the 108th Congress would have given companies tax breaks or incentives to purchase security equipment. Such equipment included physical security devices and fire-safety technology. 

Aviation security

- Two bills (S. 957 and H.R. 1889), introduced by Sen. Barbara Boxer (D-CA) and Rep. Nita Lowey (D-NY) respectively, would have required that aircraft cabin-crew members be certified and trained on security and safety procedures. Despite bipartisan support, neither bill garnered committee approval.

Function Over Form

- The form of corporate assets is less important than their function and value, and the only way to protect assets in any form is to coordinate IT and physical security.

Background checks

- Another new Louisiana law (formerly S.B. 140) will require that background checks be completed for anyone seeking employment with agencies that care for the infirm, such as nursing facilities, healthcare centers for the mentally retarded, adult residential-care facilities, and adult day-care centers.

Premises liability

- (Mae Belle Lane v. St. Joseph's Regional Medical Center, Indiana Court of Appeals, No. 71A05-0310-CV-525, 2004)

Lock problems.

- Some types of cylindrical locks, including those used to safeguard laptop computers, can be compromised with nothing more than a ballpoint pen.

Tough Track for Railroads

- Passenger and freight railroads face an uphill battle in their efforts to secure the line.

Physical security

- A new Florida law (formerly S.B. 124) requires that the state's chief of domestic security initiatives work with state agencies, universities, and community colleges to conduct security assessments for all of the buildings, facilities, and structures operated by these groups. With the assistance of employees within these groups, the chief will compile the assessments and present them to the governor and to lawmakers. The governor and lawmakers must also be informed if any state agency, university, or community college fails to cooperate with the assessment process. The law allows the chief to conduct follow-up assessments to ensure that the security assessments remain current.@ Under the law, the chief is also mandated to work with local governments and private industry to develop security assessments. The assessments are mandatory for state-funded agencies and organizations; however, private industry and local municipalities have the option of conducting assessments with the chief's help. The costs must be borne by the local government or the private company involved.


- The New York high court has ruled that an employer who has provided adequate safety devices cannot be sued by an employee who failed to make use of these devices. (Cahill v. The Triborough Bridge and Tunnel Authority, New York Court of Appeals, No. 174, 2004)

Physical security

- Los Alamos National Laboratory has rolled out the Journal of Physical Security, a scholarly, peer-reviewed publication that publishes articles which "use the scientific method or other rigorous approaches to understanding, modeling, developing, testing, or evaluating any aspect of physical security." The inaugural issue offers five papers. Electronic subscriptions are free. SM Online has more information on subscribing.UPDATE: The Journal of Physical Security is now published by Argonne National Laboratory.

Container security.

- Survey respondents cite problems with container tracking, such as a lack of standards.

RFID: A Primer

- Radio frequency identification (RFID) technologies are evolving to meet a growing list of applications that range from tagging livestock to tracking pharmaceuticals to securing shipping containers. To understand the many aspects of RFID technologies, security professionals can turn to Radio Frequency Identification Technologies: A Workshop Summary. This 39-page document, from The National Academies Press, provides an overview of RFID technologies and applications, and it outlines common objections, such as privacy concerns, and responses--including strikes, boycotts, and protests against businesses such as Benetton that have decided to implement RFID. The book was written after a workshop held by the Computer Science and Telecommunications Board of the National Research Council, which brought together industry, academic, government, and other organizations to explore RFID and the technological, social, and policy issues surrounding it. @ Read the book online or purchase PDF copies of it via SM Online.

Staging Security in a Theater of War

- One manager shares the lessons learned in leading personnel into Iraq to help rebuild the country's infrastructure.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.