Is it “swine flu” or “H1N1”? You see the new flu strain identified both ways, and remember that there’s an earlier one as well, and start getting confused as to which flu is which. We’re noting this subject because it’s timely in health and security terms, but partly to introduce you to John Solomon and […]
Archives: October, 2009
PRO Barrier isn’t in the debunking business, but we thought we’d share this myth-busting item with you simply because it’s interesting. You hear occasionally that spy satellites work at resolutions so sharp they can read the numbers on a car’s license plate. Not so, says the NerdModo blog. The Hubble telescope has a maximum resolution […]
Wow! Talk about a handy reference. Infrastructure Defense Technologies has created a Perimeter Security Glossary of terms pertinent to site security – hundreds, maybe more (we haven’t counted them). This is a reference tool from a competitor that we’re pleased to note and recommend. Good job, guys!
Techniques for securing large public events are becoming standardized, so much so that Wellesley Consulting Services in Toronto, Canada, offers a “Mass Event Security Template” for the guidance of event security planners. An event security plan, notes Wellesley, should have these five elements: Barriers/Buffer Zones; Surveillance, both electronic and human; Accreditation/Access Control, Showing Force and […]
Newspapers and other traditional media that let missing persons trails grow cold may be upstaged by today’s new forms of social media. Investigators are seeking to refine techniques for using social media as source nodes for information on missing persons – if any such information is out there. Web search tools, like Google Alerts, along […]
Bruce Schneier, ever on the frontier of security issues, comments on pending technology that’s aimed at identifying potential evil-doers at checkpoints by monitoring eyeblinks, heart rate or even fidgeting. Schneier isn’t that impressed by the technology – called “Future Attribute Screening Technology” – being developed by Draper Laboratory and its collaborators with funding from the U.S. […]
To complement our last post on security indicators worth tracking, here’s another piece of a cohesive approach to security management: Ray Bernard in Security Technology Executive describes how to establish a security management process. Don’t chill out. A well-conceived process – not a controlling manager’s excuse for what he or she calls a process – can […]