Magazine article Security Management

Home on the Page @ WWW.Securitymanagement.Com

Magazine article Security Management

Home on the Page @ WWW.Securitymanagement.Com

Article excerpt

Continually on the lookout for more value for our readers, the editors of Security Management recently rolled out SM Daily and SM Weekly, summaries of and links to the security articles most pertinent to protection professionals. SM Online picks up where the daily news leaves off, serving as your hub of security information in the cyberworld. References to the site in the print publication can be found wherever you see an @ symbol. Some of the newest additions to the site are as follows.

Counterfeiting. If you're wearing clothing by Armani or Burberry, carrying a bag by Coach or Louis Vuitton, or wearing a watch by Cartier or Rolex, you might want to take a closer look. These are a few of the most frequently knocked-off brands based on incidents compiled by counterfeit-intelligence analysts Gieschen Consultancy of Canada. In the last quarter of 2004, Gieschen tracked more than 560 incidents in 52 countries, worth about $1.15 billion.

In more than half the cases, China was the country cited as the source of counterfeit goods, but other countries distinguished themselves as well. Finland reported the most incidents of counterfeit toys, India tallied the highest number of counterfeit perfumes and cosmetics, Russia notched the largest financial loss as a result of counterfeit drugs and industrial goods, and South Africa and the United States tied as being "the most diverse dumping ground for counterfeit goods from multiple countries of origin," according to Gieschen.

Financial instruments, such as cash and checks, were the most profitable items to counterfeit ($642 million), followed by medications ($215 million), digital entertainment and software ($119 million), other documents such as tickets and degrees ($98 million), and electronic equipment and supplies ($26 million). Read more via SM Online.

Biological attacks. Within five years, high-value buildings may be able to deploy biological-detection systems that can identify a broad spectrum of agents in one minute or less, with very few false alarms. So says the Committee on Materials and Manufacturing Processes for Advanced Sensors at the National Research Council, which recently issued a 209-page document that explores the various technologies and applications that can make this possible.

According to the paper, the most promising strategy is a layered approach. One layer will be a nonspecific bioaerosol detector that can detect all biological elements and is suitable to defend against medium and large attacks. Today's most promising second layer is structure-based detection, or immunoassays, which will be able to identify 10 or 20 of the leading threat agents, even in small amounts.

The third layer would consist of polymerase chain reaction (PCR) technology, which would definitively confirm an attack and identify the agent used. Although these are the most promising technologies, the committee notes that new superior technologies may emerge, and it thus recommends establishing a technology "watch list" to keep an eye on laboratory mass spectrometry, ribosomal RNA assays, and other approaches. The paper, which also discusses protecting military bases from biological attack, is at SM Online.

MANPADS. Up to half a million shoulder-fired rocket systems, also known as manportable air defense systems or MANPADS, exist in the world today, according to the U. …

Search by... Author
Show... All Results Primary Sources Peer-reviewed


An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.