daniel-benjamin

State Department Launches Counter-Terror Bureau For Threats Abroad

Amanda StricklandSecurity Program Development

If the definition of terrorism is the use of violence and threats to intimidate or coerce for political or other reasons, then awareness is critical to counterterrorism. We know you are in risk overload, but the fact that the federal government has created a Bureau of Counterterrorism beginning January 4, 2012, tells you that the threat is so great that …

dont-click

Don’t Click that Link!

Christine L. Peterson, CPP, ISPSecurity Program Development, Training

NCMS (National Classification Management Society) is a society that provides training and guidance to private sector firms who are industrial contractors to the federal government on classified contracts. As a member of the national organization and the Carolinas Chapter, RMA has access to some excellent and timely training. “Don’t Click That Link!” came from another member and is a good …

Question Mark Key on Computer Keyboard

Inaccuracies in Background Checks

Amanda StricklandBackground Investigation

AP IMPACT: When your criminal past isn’t yours Out of work two years, her unemployment benefits exhausted, in danger of losing her apartment, Casey applied for a job in the pharmacy of a Boston drugstore. She was offered $11 an hour. All she had to do was pass a background check. It turned up a 14-count criminal indictment. Kathleen Casey …

Painful Lessons from Leland

Christine L. Peterson, CPP, ISPBackground Investigation

SBI investigates Leland’s former Asst. Town Manager Excerpts from article: Michelle Cox was hired by the Town of Leland in January, and left after about six months on the job. During that time she was the highest ranking female employee in Leland, and was assigned to investigate claims of sexual harassment filed by Officer Sherry Lewis. About the same time, …

FBI says hackers hit key services in three US cities

Billy Gordon Green, Jr. M.Ed., CPP, CHSNews

Everybody is preoccupied with chemical, biological, radiological, and nuclear devices (CBRNE) and vehicle-borne improvised explosive devices (VBIED) while the hackers are practicing to really take us down hard. In our opinion, this is the new “front line” in security and counterterrorism. How do we get the great unwashed to understand that passwords are not just there as a nuisance? Gives …

smartphones

‘Dirty Dozen’ Unsecured Smartphones

Billy Gordon Green, Jr. M.Ed., CPP, CHSNews, Security Program Development

On November 21, 2011, Bit9 released its ‘Dirty Dozen’ of unsecured smartphones for 2011. The following is an excerpt of that news release: New Report on Most Vulnerable Mobile Platforms Reveals Orphaned Android Phones Pose Serious Risk to Privacy and Security… 11.21.11 – Waltham, Mass. – Bit9, the market leader in advanced threat protection and server security software, today published …

gavel law books

Penn State: Clery Act Implications

Amanda StricklandCompliance

Earlier this month, the U.S. Department of Education (DOE) announced that it would launch its own investigation into the now infamous Penn State football scandal. This investigation will focus on whether the university failed to comply with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (the Clery Act) – the federal law which, among other …

A thief sifts and examines shredded documents

Protecting Competitive Intelligence

Christine L. Peterson, CPP, ISPIntellectual Property

As the holiday season approaches, Hollywood will begin to bombard us with movies that depict good looking men, beautiful women, and fancy cars or other electronics in romantic stories of intrigue and espionage. As Americans, we love these stories where the main characters wear beautiful clothes and against all odds, often times with cutting edge electronics or personality, save the …

Loose Lips Sink Ships

Amanda StricklandIntellectual Property

The security manager receives a call from the front desk receptionist. She tells him that during lunch, the fill-in receptionist received a call from an individual who identified himself as a volunteer for Good Charity. The volunteer wanted to send an invitation for their annual fundraiser to the vice president, but he didn’t have the home address. He also asked …