A post from the Security Magazine blog reports on how security agencies in Orange County, CA, are partnering to help each other keep in trim. It’s gratifying to find testimonials like this one to what organizations can achieve by working together in less than crisis situations.
Airport perimeters are a continuing security challenge. SecurityInfoWatch advises that “there have been at least 268 perimeter security breaches at 31 major airports in the U.S. between 2004 and 2014.”
“Because of the high security measures passengers experience at checkpoints and throughout terminals,” the post notes, “it can be surprising to learn just how vulnerable airport perimeters are. While of course airports do attempt to secure their perimeters, often the technologies they employ simply aren’t up to the task.”
What’s the difference between a computer security intrusion and a breach? Richard Bejtlich discusses this important question on his TaoSecurity blog.
An intrusion is unauthorized access, a breach is actual theft, alteration or destruction of data. “One can avoid a breach following an intrusion if the security team can stop the adversary before he accomplishes his mission.”
Here, indeed, is a post that briefly outlines what’s involved in computer security strategy. Well worth reading through.
Here’s a Government Security News report on the Chattanooga terror attacks which indicates that, indeed, security is a challenging discipline.
The importance of well-trained, accountable personnel as part of an effective security system is pointed up by the report of an Integrity Advisory Panel of the U.S. Customs and Border Protection (CBP) agency noted on Government Security News.
The report recommends “specific steps CBP should take in order to increase transparency, assure integrity, and ensure compliance with the use of force policy. The recommendations include both staffing and policy changes and would require the allocation of adequate resources to attain the established goals.”
“Homegrown extremism is now the principal terrorism threat this nation faces,” as Secretary of Homeland Security Jeh Johnson stated in March. “‘We are concerned about the independent actor, the so-called lone wolf who could strike at a moment’s notice.'”
This dire advisory is provided on In Homeland Security by Jeffrey V. Gardner, an Assistant Professor of Homeland Security Studies at American Military University, a retired U.S. Army Lieutenant Colonel and Ph.D. candidate.
Government Security News advises that the U.S. Department of Homeland Security is spending millions – $9 million this year alone – on establishing three new Centers of Excellence around coastal resilience, managing risks to critical infrastructure and on border security, trade and immigration research.
Part of the anticipated benefit will be in establishing greater long-term coverage via undergraduate and graduate university courses in the three areas.
Security is a no-nonsense vigilance discipline – that is, always on, everywhere on a site. It’s instructive, therefore, to read a post by Tim Roberts of Solutionary.com on how, with a fake badge, he evaded a less than fully-attentive security system – gaining the cheery cooperation of the employees and guards. Geez!
And now, a maritime security gate: Advanced Perimeter Systems takes us to a news release on the “Frist-Ever, Fully Automated Marine Security Gate.” It’s been installed by Halo Maritime Defense Systems at a naval base in Israel, “breakwater-to-breakwater.”
“A simple push of a button,” says the release, “retracts the barrier and allows vessels to pass.”
In the context of the Charleston, S.C., killings, Philip J. Palin writes on Homeland Security Watch about grace as an anti-terrorism strategy. That is, as it’s been manifest in the forgiveness statements of the family members of the nine who were murdered.
“Since June 17,” Palin writes, “which was also the first night of Ramadan, have we encountered the most effective anti-terrorism strategy? (Something different than counter-terrorism.)…How many future terrorist actions have been prevented by the courageous integrity of the survivors?”