Sunday, August 5, 2007

Pew Global Attitudes Report – Brits Reaffirm Support for Palestinians; Middle East and Asia Divided on Iran’s Right to Acquire Nuclear Weapons

The US-based Pew Research Center has just released its annual Global Attitudes Report. As in previous years, the report makes uncomfortable reading not just for the US, but for many of its allies.

When used in conjunction with previous years’ Pew reports, trends and changes in the data can provide a very useful tool for strategic risk analysts.

To download the full report go to:

http://pewglobal.org/reports/display.php?ReportID=256

Half of All Employees Begin Their New Jobs Using Competitive Information Taken from Their Old Jobs, Report Alleges

In research carried out earlier this year 85% percent of employees claimed that they could easily download competitive information and take it with them to their next job, in spite of 74% of these companies having a policy that specifically states that company personnel are not allowed to take company information out of the office.

The main “crime facilitators” are laptops and USB data sticks, which, in many companies, are subject to few data protection controls. Advice on how to secure information on IT systems can be found in ARC Training’s new IT Security Handout, available free on request to all past delegates of Security Management Stage 1.

More on this story and advice on how to apply better security can be found at the following link
http://www.securitypark.co.uk/article.asp?articleid=27023&CategoryID=57

CCTV Facial Recognition - Coming of Age?

In recent trials of CCTV facial recognition at a major airport an 85% success rate was achieved. Logica, the company behind the trials, found that faces could be successfully identified in a crowd from a distance of several meters 85% of the time, even when volunteers disguised themselves.

During the trial, volunteers’ photographs were put on a database’s suspect list, along with thousands of other photographs. The volunteers mixed with passengers at the airport and a biometric identification algorithm was used to analyse the faces in the crowds for a match.

According to Logica, the technology could be used for airport and border control security. It also has a number of other possible applications - facial recognition technology is already used by casinos in Las Vegas to spot cheats.

Meanwhile, the BKA (German equivalent of the FBI) recently spent €200K on trials of L-1 Identity facial recognition CCTV technology at Mainz railway station. The system returned just a 30% success rate under normal lighting conditions and, according to Der Spiegel, was declared useless as an investigative tool.
The myths and realities of CCTV, and how to specify CCTV systems, will be one of the subjects addressed in the new Specifying Security Technology Course, due for launch in 2008. Contact David for details.

Email Monitoring Could Breach Human Rights Law

Earlier this year a college in Wales was found in breach of human rights law when it monitored an employee's email, web and telephone activity in 1998 and 1999; the employee who took the colleage to court was awarded 3000 euro in damages for stress and anxiety.

Nearly half of UK organisations risk breaching human rights legislation by monitoring employee emails without following proper policies. Up to 44 per cent of large UK companies are potentially breaching a range of laws governing email monitoring, including the Human Rights Act 1998, the Data Protection Act 1998, the Regulation of Investigatory Powers Act 2000, and the Telecommunications Regulations 2000 because they monitor emails without explaining their reasons to staff.

If your organisation routinely monitors emails for discipline purposes, or you monitor "live" emails as part of your proactive secuirty management programme, you are advised to seek guidance from your legal and HR departments. Seizing computer evidence (including old emails) for analysis in investigations, however, is generally not a breach of legislation.

The legal implications of computer evidence is one of many subjects addressed on the forthcoming IT Security and Incident Response Course, 9-10 October, led by author and broadcaster Ed Wilding.

Copper Theft Rise Sparks Warning of Potential for $millions in Consequential Losses

Police across the world are warning of a dramatic rise in theft of copper, which has recently increased threefold in value, making it an attractive target for thieves. Copper ground wire is a particular target, and in some instance thieves have cut through high voltage cable!

The theft of a few hundred dollars worth of wire can have potential consequential losses in the millions of dollars. In 2006 hundreds of trains were disrupted in Italy and a quarter of a million passengers were disrupted when thieves stole copper wires serving signalling equipment.

In the US last week thieves stole copper pipe from a freezer at Indiana's largest food bank, wasting nearly half a million dollars worth of food for the poor.

Security managers are urged to identify any critical dependencies on copper, especially that which runs outside the perimeter, and take steps to better protect it with strong physical security and, where possible, anti-tampering technology to detect voltage changes associated with cutting.

Warning of Bogus Callers to Chemical Plants Attempting to Solicit Security Information

The FBI is investigating reports that a number of US chemical plants have received telephone calls from bogus callers claiming to be making a survey for an industry trade group. The American Institute of Chemical Engineers has issued an immediate warning not to divulge safety and security information to any caller.

The American Institute of Chemical Engineers warned its members on 27th July that in the light of recent terrorist activity this may be an attempt to determine security vulnerabilities in the chemical process. When traced, the numbers used by the callers were found to have been disconnected.

Spreading Security Management Best Practice

Fifteen security professionals from nine different countries (Azerbaijan, India, Kazakhstan, Nigeria, Qatar, Russia, Saudi Arabia, Switzerland and the UK) are currently studying corporate security management best practice at ARC Training under the guidance of the redoubtable Phil Wood MBE CPP.

Representing such diverse sectors as oil and gas, banking, police, civil service, agribusiness and security services provision, delegates have spent the first week of the two-week programme learning the key core skills areas of risk management, operations management, security design, perimieter and buildings security, personnel security, information security, CCTV and security surveying.

Week two of this university-accredited Security Management Stage 1 programme will focus on Protection against Explosive Devices, Crisis Management, Investigating Skills, Drug and Alcohol Misuse, Management and Leadership, and completion of the course project – a plan to secure a major critical infrastructure facility in a high-risk area.

By the end of the programme delegates should have mastered the key skills necessary to manage a security management programme in an international environment.

The next Security Management Stage 1 course takes place 19-30 November 2007. Contact Janet to reserve your place.