Magazine article Security Management

Home on the Page @ WWW.Securitymanagement.Com

Magazine article Security Management

Home on the Page @ WWW.Securitymanagement.Com

Article excerpt

Eight years and counting. That's how long security professionals have been relying on Security Management Online to bring them the latest news, reports, legislation, model documents, case law, and surveys, among a multitude of other materials. The approach remains the same: SM Online finds the nuggets and saves you time. Below are a few of the recently posted online documents. Others can be found throughout the magazine where you see the @ symbol. Don't forget to check out ASIS International news, events, announcements, and programs via


Chemical plants. Nuclear power plants are often mentioned as a potential target for terrorists, but chemical facilities are much more vulnerable to attack, says a report from the Center for Strategic and International Studies (CSIS), a public policy research organization. The CSIS report chronicles a tabletop exercise called "Silent Vector" that was conducted in October 2002 by high-level government and ex-government officials to deal with a simulated threat of attack on the energy infrastructure on the east coast of the United States.

"The chemical industry presents a very complex control problem because of the multiple producers, transporters, and storage locations, both public and private, spread across the nation," according to the 33-page report. Moreover, industry security measures are not necessarily designed to guard against terrorism. Recommendations made at the seminars included specifying the roles and responsibilities of each federal agency partnering with the chemical industry, legislating a requirement that chemical facilities quickly assess vulnerabilities and address them, and developing information-sharing mechanisms. The CSIS report, which also suggests improvements in other infrastructure areas of concern, is available via SM Online.

Interviews. In cop shows on television, investigators in an impromptu standoff with a suspect on a busy street invariably get the suspect to crack through the use of bravado. But that tactic is more likely to contaminate the fact-finding process in a real case, explains FBI Special Agent Vincent A. Sandoval in an article in the FBI Law Enforcement Bulletin. "Contamination occurs when investigators impede or negatively influence the interview process, thereby causing the subject to provide inaccurate information," Sandoval writes. In the cop show example, interviewing a subject on a busy city street with multiple onlookers is problematic, in part because the interviewers may misinterpret a reaction to a distraction as a reaction to a question. In addition, Sandoval writes, use of multiple interviewers often inhibits candid answers. While working in pairs can be effective, this technique must be thought through first. Also, detectives' use of aggressive behavior and an abrasive vocal tone often puts suspects on the defensive, Sandoval writes. He lays out a "funnel" model for interrogations that starts with open-ended questions, followed by specific closed questions. The full approach is explained in the article, which can be reached via SM Online.

Hotel security. Even after 9-11 and the October 2002 terrorist attack in Bali, many four- and five-star hotels have done little to augment their security, according to an online survey conducted by HOTEL AsiaPacific magazine and Pertlink, a hospitality technology consulting firm. (The survey was conducted worldwide, but 60 percent of the approximately 200 respondent properties are in the Asia Pacific region. …

Search by... Author
Show... All Results Primary Sources Peer-reviewed


An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.