Columns

Best Practices - page 5

// by Homeland Security Today

Why Some Suspicious Activity Reports Can Be Suspect

Suspicious Activity Reporting (SAR) has drawn the attention of law enforcement across the nation because of its ability to capture, categorize and catalogue important data for analysis of specific patterns of criminal activity as it occurs and during its planning stages. Determining when non-suspect activity becomes suspect activity can be difficult to ascertain, however. For example,… Keep Reading

// by Homeland Security Today

Guards, Gates and Technology: Protecting the Nation’s Critical Infrastructure

The nation’s critical infrastructure includes facilities and core assets that are essential to our society and economy. And you may be surprised at the number of industries on a national, regional and local level that may fall into this category: Energy and utility companies; telecommunications; water supply systems; agriculture and food production and distribution supply… Keep Reading

// by Homeland Security Today

How Video Analytics Provide Extra Security and Better ROI

Video analytics have entered the mainstream, and, increasingly, intelligent functionality is inside the camera. Video content can now be analyzed using various computer algorithms to identify specific user-defined content and to trigger an alarm or response automatically. The range of video analytics functionality can include identification, behavioral analysis and situational awareness. Video analytics were first… Keep Reading

// by Homeland Security Today

Eliminating Gaps in Perimeter Video Security Coverage and Achieving Video Security Accuracy

A perimeter security system based on video analytics operates by automatically detecting a target that moves through a camera’s detection area. By taking a best-practice approach, you can ensure that an intruder cannot enter your perimeter undetected. And when a smart camera perimeter system sends an alert, you also need fast, accurate details about what… Keep Reading

// by Homeland Security Today

Developing a Local Disaster Response Partnership and Testing Capabilities

On Feb. 5, 2008, two F4-strength tornadoes tore a path of destruction through Jackson, Tenn., damaging several communities and completely destroying a college dormitory on the campus of Union University. One of the two area hospitals also sustained damage and was forced to activate a Code Black. The radio tower at the hospital was badly… Keep Reading

// by Homeland Security Today

Countering Trade-Based Money Laundering: A New Data Mining Frontier

Shortly after the Sept. 11, 2001, terrorist attacks, a Pakistani businessman involved with the underworld of crime in South Asia and the Middle East asserted, “Don’t you know that criminals and terrorists are moving money and transferring value right under your nose? The West doesn’t see it, though. Your enemies are laughing at you.” These… Keep Reading

// by Homeland Security Today

Protecting Our Nation’s Critical Infrastructures Through Information Assurance

Cyber-physical Systems (CPS) are systems that feature the coordination of both physical and computational elements. A common example would be a pacemaker; the device combines battery power and wiring to interact with elements of an existing environment – in this case, the human body – to keep the heart pumping. Another example would be a… Keep Reading

// by Homeland Security Today

Rule Breakers, Benders and Bureaucrats: Security Profiling of Airport Employees

People don’t always follow the rules. It’s a fact of life – even among airport employees – and one security planners will need to address in their continuing efforts to enhance airport security. Airport security integrates advanced technology with a system of laws, rules and protocols for employees to follow during routine, as well as… Keep Reading

// by Homeland Security Today

Predictive Analytics and Geospatial Tools for Crime Forecasting

Crime forecasting – while a cliché term – is the talk of the town right now, and law enforcement agencies are looking for ways to provide this kind of analysis. Predicting crime allows resources to be better allocated to the areas of likely crime. In practice, we are not so much predicting as identifying the… Keep Reading

// by Homeland Security Today

Fusion Centers and Suspicious Activity Reports – Best Practices

The Nebraska Information and Analysis Center (NIAC) recently became one of the first law enforcement fusion centers to apply advanced processes for managing Suspicious Activity Reports (SARs). The data collection side of the initiative is the Nationwide SAR Initiative (NIS), where law enforcement agencies share these SARs. There are several key things to consider, such… Keep Reading

// by Homeland Security Today

Asymmetric Cyberwarfare: Cyber-threats, Information Warfare and Critical Infrastructure Protection

The past year we’ve begun to witness what’s only a foretaste of a future that increasingly will be plagued by a progressively more dangerous and escalating world of asymmetric cyberwar. Asymmetric warfare is war between combatants whose relative power differs significantly or whose strategies or tactics differ significantly. On Tuesday, April 26, 2011, the authenticity… Keep Reading

Placeholder
// by Homeland Security Today

Using Threat Analysis in Border Tunnel Detection

Recently there’s been a lot of attention directed at the problem of detecting tunnels under the US-Mexican border. And for good reason; more than 700 tunnels were found during the last eight years, all of which were detected by conventional law enforcement practices once the tunnels were completed. Indeed. In general they were discovered through informants… Keep Reading

Placeholder
// by Homeland Security Today

Three Homeland Security Careers in Strong Demand

The Department of Homeland Security (DHS) is one of the fastest-growing agencies in the federal government, due in large part to the increased need for professionals in many areas of specialization. With more than 200,000 employees, DHS is fast becoming one of the federal government’s largest employers. National border security, immigration and cybersecurity are just… Keep Reading

// by Homeland Security Today

Improving the Fire Safety of Buses and Motorcoaches

About 1 percent of all buses suffer some form of fire incident each year. And some of these fires have serious consequences. A recent example is the tragic bus fire near Hannover, Germany in November 2008 that killed 20 people, making it the worst bus accident in Germany in 16 years. Another example is the… Keep Reading

// by Homeland Security Today

Incorporating Human Geography Into Intelligence to Combat Asymmetric Threats

“And just like their allies in Al Qaeda, this new Taliban is more network than army, more a community of interest than a corporate structure,” – Retired Gen. Stanley McChrystal, former Joint Special Operations Command Commander, commander US, NATO forces in Afghanistan. Network Centric Warfare is nothing new. Lt. Col. Jeffrey Witsken explained Network-Centric Warfare… Keep Reading

// by Homeland Security Today

Unique Mass Transit Rail Tunnel Fire Tests Performed in Sweden

This past September, the Department of Fire Technology at the SP Technical Research Institute of Sweden undertook full-scale fire tests in a mass transit rail-type environment using commuter rail cars as part of its “Metro” project to obtain better information about the differences in fire behavior between older- and newer-type rail cars. Explosion tests also… Keep Reading

Placeholder
// by Homeland Security Today

How Prepared Will You Be for the Next Cyberrevolution?

It is a truism that we increasingly are living our lives partly in real space and partly in the new virtual domain we call cyberspace. We communicate with each other, engage each other socially, do our banking, buy things, pay our bills, get educated, play games and work together with our hands on a keyboard… Keep Reading

// by Homeland Security Today

How New Technology Can Offer Safeguards Against Fake IDs

These days, a driver’s license does more than just let you drive. It gets you through airport security checkpoints, past the lobby guard in secure buildings, and lets you cash a check. And when someone wields a fake license, the consequences can be tragic. On 9/11, the hijackers carried licenses that had been fraudulently obtained;… Keep Reading

// by Homeland Security Today

When It Comes to Air Cargo Security, We Need a Strong Global Supply Chain

Last October’s interception of parcel bombs sent from Yemen to synagogues in the United States marked the first time since the Sept. 11, 2001 attacks that there had been an attempt to use air cargo for terrorist purposes. Immediately following the incident, several countries banned shipments from Yemen and Somalia, banned shipments of printer cartridges… Keep Reading

// by Homeland Security Today

9/11 Brought Changes to Skyscrapers and High Rises

CHICAGO (AP) — What if it happens again? A decade after 9/11, could any of the nation’s 21,000 high-rises withstand an attack like those that caused New York’s twin towers to collapse? Could the thousands of people inside find a way to safety? At Chicago’s Willis Tower, like other skyscrapers around the country, much has… Keep Reading

1 3 4 5 6 7
Go to Top
X
X