Doug Bedell — May 4, 2016, 9:54 am

Safety and Security Require Continually Renewed Awareness

Whatever the size of your organization, it needs to have safety and security built into its structure. Sadly, Washington’s Metro subway provides an example of what might happen if that’s not assured.

Steve Bittenbender, editor of Government Security News, provides a report on why, “Safety is still not institutionalized as a core value at WMATA (the Washington Metropolitan Area Transit Authority),” which carries 700,000 riders a day.

Pay constant heed to safety and security procedures in your own organization.

Doug Bedell — May 2, 2016, 4:01 pm

PRO-Gate Provides Routine Access at Public Settings

PRO-Gate Vertical Pivot Arm
PRO Barrier Engineering is extending its vehicle access control product line. The company has supplemented its array of barriers for blocking hostile vehicle entries (anti-terrorism barriers) with a new line of beams and gates, dubbed PRO-Gate. The PRO-Gate barriers are for blocking roads and controlling routine vehicle entries at airports, stadiums, parking facilities, office complexes, military bases, toll roads, and other public settings.

There are three PRO-Gate configurations: a vertical lift fence, a vertical lift beam (photo above), and a unique-to-the-industry vertical lift beam that can withstand repeated vehicle impacts without damage to either the barrier or the impacting vehicles (photo below). It accomplishes this by pivoting (swiveling) away from the impact.

PRO-Gate Pivot (pivoted position)

Like all of PRO Barrier’s vehicle access control products, the PRO-Gate line features a robust design with minimal moving parts and high reliability. The PRO-Gate barriers are available in a range of open/close speeds, materials of construction, motor powers, and in widths for blocking one or two traffic lanes.

Further information on the PRO-Gate vehicle barriers can be obtained by contacting PRO Barrier Engineering at 717-944-6056, at, or by visiting

Doug Bedell — April 27, 2016, 8:11 am

‘Cicada’ Drones Raise a Possible New Security Concern

The U.S. is turning to mini-drones – named Cicadas, for Close-In Covert Autonomous Disposable Aircraft – to target terrorists abroad, advises In Homeland Security. They look like birds flying high.

How long will it be, we wonder, before Cicadas have civilian market counterparts that will prompt new concerns over security breaches?

Doug Bedell — April 25, 2016, 9:26 am

Consider Using Virtual Reality As a New Security Tool

Figure out how to apply virtual reality techniques to your security challenges. The U.S. Navy has. The Office of Naval Research is advising that personnel at Pearl Harbor (certainly an appropriate location) are using virtual reality gear in simulated combat.

“’This is the future of training for the Navy,’ Dr. Terry Allard, head of the Warfighter Performance Department at ONR, said in a release. ‘With simulation, you can explore endless possibilities without the expense and logistical challenges of putting hundreds of ships at sea and aircraft in the sky.'”

Doug Bedell — April 21, 2016, 11:16 pm

Airport Security Provides Exemplary Discipline

Protect an airport well and you can protect just about anything. That’s the feeling you get from reading A SecurityInfoWatch post on airport security. The Transportation Security Administration definitely has a challenging job seeking to insure the safety of the nation’s airports.

Yet securing any location has its own problems and issues. The need is to approach them systematically, think them through and act accordingly. We can’t simply assume physical security, it needs to be thought realistically through. SecurityInfoWatch provides a helpful exercise in that regard.

Doug Bedell — April 20, 2016, 2:15 pm

Maintaining Electronic Security – “A Lot Like Having Kids”

Protecting computer-based data and the security systems – physical as well as electronic – that it supports “is a lot like having kids,” says Hans Holmer of the Security Industry Association (SIA). Really?

Yes, indeed. “You child-proofed your home before your child was born, and you probably still worry for your kid(s) even now when they are bringing up their kids.” Probably, in other words, we’re never completely secure. But if we keep the need unfailingly in mind, we’ll be more secure. Which is the point of it all. And, of course, check out SIA’s PDF document “Beginners Guide to Product and System Hardening,” which lists the “top 10 causes of cybersecurity failure in systems.”

Doug Bedell — April 18, 2016, 11:27 am

A Future of Digital Security Challenges

InfoWorld Advises – Get ready for the security challenges of the future. They’re going to become increasingly digital, frequent and hard to anticipate. It could be an anxious time.

Doug Bedell — April 15, 2016, 11:11 am

ISO Security Standards Developed With Hacker Cooperation

Katie Moussouris on Threat Post Op-Ed discusses developing vulnerability standards on the Internet. They’ve been advanced by “working cooperatively with the hacker community.” Presumably, that’s the friendly hacker community.

Doug Bedell — April 12, 2016, 7:19 pm

Lotteries Require Luck, and Trust In the Operators

Bruce Schneier comes up with a post that leaves you wondering whom you can trust – not the former security director of the U.S. Multi-State Lottery Association, for example.

That gentleman, Eddie Tipton, Schneier advises, “installed software code that allowed him to predict winning numbers on specific days of the year, investigators allege. The random-number generators had been erased, but new forensic evidence has revealed how the hack was apparently done.”

Read on in Schneier’s post, realizing that winning a lottery may, indeed, involve lots of luck, along with managerial integrity.

Doug Bedell — April 8, 2016, 9:10 am

Curiosity and ‘Found’ USB Drives – Don’t Open Them

People have insatiable curiosity, sometimes unfortunately. As when they pick up a USB drive that someone else may have discarded or lost and plug it into their computers – just to see what’s there.

Almost half of the USB drives that were discarded in a test at the University of Illinois, reports Naked Security, were plugged in and could have readily infected their new “home” computer with malware. So don’t view a found USB drive as a “gift”. Turn it into a lost-and-found or let it be.