A Most Complex Fence Indeed

Zalud, Bill
April 2007
Security: Solutions for Enterprise Security Leaders;Apr2007, Vol. 44 Issue 4, p82
Trade Publication
The author reflects on security video technology in the U.S. He discusses the importance of security video technology. He added that security technology developed to fight terrorists. He also outlines that commercial technology in use or emerging are playing significant and effective roles in the complex homeland security environment.


Related Articles

  • Homeland Security Advisory System. Snyder, Lisa Beth // Soldiers;May2002, Vol. 57 Issue 5, p10 

    Presents information on the Homeland Security Advisory System created by U.S. President George W. Bush. Objectives of the advisory system; Use of a color-coded system to identify the level of terrorist threats; Procedures implemented for each level of threat.

  • Proud To Be Security: How Roles Changed After 9/11. Ritchey, Diane // Security: Solutions for Enterprise Security Leaders;Sep2011, Vol. 48 Issue 9, p38 

    The article focuses on the changes and developments in security and risk management in U.S. after the terroristic attacks on September 11, 2001. It mentions the technological transition in security industry 10 years after the tragic event such as physical security information management systems...

  • Seeing cargo more clearly. Edmonson, R. G. // Journal of Commerce (1542-3867);8/1/2005, Vol. 6 Issue 31, p24 

    Focuses on the collaboration between Science Applications International Corp., a technology company based in the U.S., and the Hong Kong Container Terminal Operators Association in testing the Integrated Container Inspection Systems (ICIS) at two terminals in Hong Kong, China. Explanation that...

  • Motion-Tracking Camera Streamlines Security.  // Journal of Property Management;Technology 2004, Vol. 69 Issue 4, p47 

    Introduces the Automatic Image Motion Seeking camera developed by a researcher from the University of Rhode Island. Functions; Features; Impact of the camera on security surveillance.

  • Kids 911. McKay, Jim // Government Technology;Sep2003 Supplement, p6 

    Provides information on the U.S. homeland security project called Kids 911, which uses a Web portal as the single source of information, enhancing the Amber Alert system. Features of the Web portal; Action taken to address inter-agency concerns and issues; Evidence of the increased demand for...

  • Security Holes. Keane, Angela Greiling // Traffic World;4/10/2006, Vol. 270 Issue 15, p13 

    The article discusses the report made by the U.S. Senate Homeland Security and Governmental Affairs Permanent Subcommittee on Investigations on the new and improved cargo security system for federal programs, dubbed the Customs-Trade Partnership Against Terrorism. The system was established to...

  • Checkpoint Security Gaps, Poor Procurement Policies and Solutions. Haber, Grant // Sheriff;Mar/Apr2007, Vol. 59 Issue 2, p30 

    The article discusses the proper way of handling security measures in the U.S. Before implementing corrective measures, it is important to first understand how security gaps at the nation's checkpoints are created, why they continue to exist, and what steps must be taken to ensure they are not...

  • Homeland Security: Risks Facing Key Border and Transportation Security Program Need to Be Addressed: GAO-04-569T. Hite, Randolph C. // GAO Reports;3/18/2004, p1 

    US-VISIT (United States Visitor and Immigrant Status Indicator Technology) is a governmentwide program to enhance national security, facilitate legitimate trade and travel, contribute to the integrity of the U.S. immigration system, and adhere to U.S. privacy laws and policies by (1) collecting,...

  • Bad timing? Luongo, Kenneth; Hoehn, William // Bulletin of the Atomic Scientists;Mar/Apr2005, Vol. 61 Issue 2, p32 

    Presents an overview of goals and target completion dates for selected threat reduction programs in the U.S. Global Threat Reduction Initiative; Elimination of weapon-grade plutonium production; Destruction and demilitarization of chemical weapons.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics