Commentary

Public-Private Partnerships - Ensuring the Safety of the Public

by Susan Collins -

Events such as the Boston Marathon bombing highlight the need to prepare for the unexpected. On 3 April 2014, the United States Park Police held a first-of-its-kind tabletop exercise with event organizers of the Credit Union Cherry Blossom Ten Mile Run. This podcast provides insights on the importance of bringing external partners to the table during the special event planning process.

Security Training - From World Cup to Olympic Games

by Richard Schoeberl -

Mass protests, incomplete venues, and infrastructure concerns are just a few of the issues that Brazilian security personnel will face during the 2014 World Cup soccer tournaments. The question remains whether the training has been sufficient for personnel to protect the tournament venues while continuing to address common security threats such as: petty thefts, disorder, vandalism, public intoxication, and traffic control.

Airport Security - Beyond the Perimeter

by Andrew Saxton -

Although the primary objective of a security system is to prevent crimes, some technologies provide limited information only after a security breach occurs. Information gaps can occur when detection and identification are limited to a specific moment in time. The solution is a layered approach using radar, thermal imaging, and other technologies.

Mexican & U.S. Aviation Security

by Clay W. Biles -

The airport security environment, especially in the United States, has changed significantly since 9/11. Technological advances have helped raise the standards at security checkpoints around the world, but technology is not infallible. Maintaining a high standard of security requires a balance between technology and human intelligence.

Nuclear Preparedness: Is the United States Ready

by Craig DeAtley -

To address the gaps and concerns revealed in a recent article and the flash poll, subject matter experts who warned of the dangers in 2009 reunited five years later to address the issues that are still as real now as they were five years ago. Although there have been some improvements, much more is still needed.

Preparing for the Unthinkable

by Catherine Feinman -

An article, a flash poll, and a podcast each addressed the same topic: Is the United States prepared for a nuclear detonation? Each came to the same conclusion, "No, not as prepared as it needs to be." The threat of a nuclear attack did not disappear with the Cold War, but the lessons learned are fading.

The 'Dirty' Details About Explosive Devices

by Courtney Gavitt -

The 2013 Boston Marathon bombings caused confusion, frustration, and anger when race marshals abruptly ended the event. The consequences, though, could have been much greater had the initial reports been true. Knowing what makes a dirty bomb "dirty" is the first step to ensure the health and safety of all those who are near the detonation.

The 'Day After Disaster,' Revisited

by Craig DeAtley -

In the first 72 hours following a nuclear blast, survivors would face many challenges - communication, evacuation, sheltering, response, and incident command. Scenario 1 (Nuclear Detonation - Improvised Nuclear Device) of the National Response Framework was depicted in the History Channel's "Day After Disaster" in 2009. Five years later, is the United States prepared?

FINAL REPORT: Support to Local Authorities (When They Are Overwhelmed)

by H. Steven Blum -

Local authorities must continue to prepare for disasters, despite cuts in grant funding. To address this topic, LTG H. Steven Blum, (Ret.) USA, led a discussion with subject matter experts at the U.S. Air Force Academy's Falcon Club in Colorado. That discussion and survey results from a nationwide audience of preparedness professionals provided content for this report.

The Real NCIS: An Interview With Thomas Betro

by Aaron Sean Poynton -

The Naval Criminal Investigative Service's (NCIS) former Director Thomas Betro provides insights on how to keep the U.S. homeland safe from both physical threats and cyberthreats. He shares information specific to NCIS's responsibilities, technologies, and efforts to protect against cyber, piracy, and insider threats.