Carrot and Stick: Selling Security to Shippers

U.S. Customs Commissioner Robert Bonner is trying to fight terror with a stick and a carrot. He’s telling business leaders to batten down their supply chains, meeting standards set by Customs to secure every aspect of the way they process cargo—from manufacturing facilities to warehouses to people. The stick is

American Dynamics: LAN, Camera, Action

Traditional video-security systems are known as closed-circuit television (CCTV) for a good reason: These workhorses of perimeter security typically use dedicated coaxial cable to carry images in analog waves. They can’t hook into companies’ digital communications networks easily. Managers like Scott Morrill increasingly want to watch what happens on the

Gotcha! Secure Information Sharing

Did you know that:The main problem is sharing, at all Security and government regulations are driving law enforcement and intelligence agencies to share sensitive information over great distances, instantly. But sharing data effectively means sharing it safely. One way is with replication, creating a constantly updated copy of information on

ADT Security Services: Spread Far and Thin

Gobble up everything in sight, and you may get indigestion. Parent company Tyco International was already collecting security firms when it bought ADT in 1998—and then went right on munching. Tyco’s accounting during the growth spurt has been the subject of close scrutiny, and ADT was the source of substantial

Science Applications Int’l Corp.: Looking for Lapses

Where are the weak spots in your organization’s security perimeter? Is there a black market in your company’s access key-cards? Is your backup data center a power failure away from going dark? If your company needs answers to such pressing questions, you could do worse than to call on Science

By the Numbers: September 2003

States vs. Cyberterror:Where is it a Crime?If information security used to be about preventing teenage hackers from breaking into corporate networks, 9/11 changed that. Since 2001, 24 states have considered legislation to address “cyberterrorism.” Ten have passed laws, but there’s no consensus on what, exactly, is illegal—a curious problem for

The Cost of Containment

A “standard” shipping container is 8 feet wide, 8.5 feet high and 20 feet long. It can hold as much as 19 tons of soft and hard goods. Only about 2% of the containers that move through a port get screened. In Oakland, gamma ray scanners are used to boost

Ports of Entry: Fast In, Fast Out

Major U.S. ports, such as the Port of Oakland, are complex transportation systems that serve everything from recreational boats, to passenger ferries, to cruise ships, to giant cargo ships. Ultimately, they are designed to move materials quickly, off the water and into the interior of the nation. Their speed can

Voice of Experience: Dean Barrett, Under Controls

Dean BarrettKansas City Convention & Entertainment Centers Building Operations ManagerKansas City, Mo.www.Kcconvention.comManager’s Profile: Supervises operations and maintenance of 1.6 million-square-foot convention center. The Project: After getting complaints about wildly fluctuating room temperatures and lighting levels in the mid-1990s, Barrett helped sell the city council on a 10-year contract with Johnson

NYBOT: Going Home

In effect, Pat Gambaro began planning for this day in 1993.This month he is coming home, to new offices with a state-of-the-art trading floor for the New York Board of Trade (NYBOT), where Gambaro serves as chief operating officer. The exchange was scheduled to move back to downtown New York