Archives: October, 2012

Doug Bedell — October 31, 2012, 6:59 am

New Weapon: An Electronic Pulse From the Sky

Boeing has successfully tested a new weapon that has decided security implications. It’s a missile-borne electronic pulse that disables  electronic equipment as it’s flown overhead. The National Terror Alert Response Center reports that tests of  the new gear “proved it to be even more potent than expected.” The Counter-electronics High-powered Advanced Missile Project, or CHAMP, […]

Doug Bedell — October 29, 2012, 9:15 am

Information Security Part of Overall Site Protection

Information technology (IT) is a key part of any security system these days. To help insure that your IT systems are woven well with your other security activities, we recommend becoming familiar with the Science and Technology Directorate (S&T) of the Department of Homeland Security (DHS). Dr. Tara O’Toole, DHS undersecretary for S&T, explains in […]

Doug Bedell — October 24, 2012, 7:04 pm

Threat Management: Keep a Sharp Focus On What Remains to be Done

Threat management can become highly bureaucratic. But the murk might be minimized if awareness of clear and pressing goals is maintained. The Naval Postgraduate School Center of Homeland Defense and Security recently posted a report on predicting violent behavior.  It shows how much there is to keep track of to do effective anti-violence management.  But […]

Doug Bedell — October 22, 2012, 9:47 am

Secretary Panetta Voices an IT Warning

Security from the Internet and other forms of information technology (IT) is becoming as pressing as physical security, if not more so. Physical security involves a given locale, but IT security can challenge vast systems. U.S.Defense Secretary Leon Panetta put it this way last week, according to In Homeland Security: “The collected results of these […]

Doug Bedell — October 19, 2012, 10:57 am

Security Threats on the IT Front

PRO Barrier Engineering deals in countering physical security threats at front gates (or back ones, for that matter). There are other threats, however, that aren’t so apparent but need to be recognized too. Some come from information technology – call them IT threats. The Risk Management Monitor blog provides a report on such risks, and […]

Doug Bedell — October 16, 2012, 10:32 am

A ‘Cheery’ New Book on Avoiding Disasters

We’re not book reviewers, not really. But here’s a new title that caught our eye, and we’ll let Amazon’s synopsis serve as a review for what seems a highly pertinent new work: Bak’s Sand Pile: Strategies for a Catastrophic World. The author, Ted G. Lewis, holds that dire happenings, or Black Swan, events are “really […]

Doug Bedell — October 11, 2012, 12:16 pm

Security Settings Matter as Much as Gates and Guards

Security isn’t only about gates and guards. It’s about trends and climate, too, an overall setting. That becomes apparent from a Danger Room posting on the hearing yesterday by the U.S. House Oversight Committee on the Sept. 11 attack on the American mission in Benghazi, Libya, in which four Americans were killed, including the U.S. […]

Doug Bedell — October 8, 2012, 10:28 am

A Primer on CCTV

The CCTV Systems & Technology blog provides a primer on selecting and installing a closed-circuit TV monitoring system. If you or someone else in your organization has been considering CCTV as part of your security setup, there’s useful information here for getting the lay of the land.  And it doesn’t take a lot of time […]

Doug Bedell — October 5, 2012, 10:32 am

Guidance on Adding Video to Perimeter Security

The American City & County site has a good post on adding video to a perimeter surveillance system – “Seven video surveillance best practices.”  You probably realize, for example, that an operator can’t remain alert for long watching video screens on which nothing is happening. So what do you do about that?  Have the camera […]

Doug Bedell — October 3, 2012, 10:15 am

Tips For Insuring the Security of Perimeter Fencing

Vehicle access control barriers work, of course, only at vehicle entry points. There may be lengthy perimeters between vehicle entrances. How to insure they are secure? Video is commonly used for surveilling perimeters. Security magazine suggests seven ways to make video viewing of perimeter fences as effective as possible. There’s a lot involved in enhancing […]