As you read this, you already may be walking a show floor somewhere, finding out about the latest technology or learning new ways to apply your electrical contracting expertise with the help of educational seminars and conference sessions. There is plenty coming your way, including the International Security Conference & Exposition East (ISC East), scheduled for Sept. 11–12, 2007, in New York at the Jacob Javits Convention Center.
This is the second year ISC East will join with Infosecurity, New York, the information technology (IT) side of the business, to provide a rounded approach to the physical and logical sides of protection and detection. ISC East is the only physical security event offering IT solutions through this concurrently scheduled show.
If you are involved in the public/cultural market, then you will not want to miss the special area at ISC East devoted to Urban Security. This “show within a show” features the emerging products that protect cities and commercial properties, including perimeter and barrier protection; port and cargo security; detection technologies and a host of related services.
Looking ahead to Oct. 5–8, 2007, the National Electrical Contractors Association will host its annual show in San Francisco at the Moscone Convention Center. Visit www.necaconvention.org for details. ¶
A growing number of incidents of theft, illegal export and import and illicit trafficking of cultural property such as artifacts, artwork, rare books and antiquities are reported around the world. Although statistics are hard to come by, many experts believe the majority of these thefts are inside jobs.
“According to the FBI and Interpol, theft from collections in cultural institutions is thought to be the third-
largest international crime,” said Wilbur Faulk, executive vice president of the Cultural Property Protection Group based in Northridge, Calif.
Technology plays a vital role in combating this type of crime. “There are a wide variety of notification, technology and audit tools that are available,” Faulk said. “More and more stand-alone systems are now being integrated in a way to enhance economy and efficiency as well as ease of use for personnel operating the equipment.”
Dual technologies are being used by a growing number of cultural institutions. “For example, art storage areas have had lock and key access for many years,” Faulk said. “Now, many institutions have two or more ways of authenticating an individual seeking access, including a card reader.”
Many cultural institutions are using camera systems that memorize the contents of a room. When any movement or change in the room is noticed, an alarm is activated.
According to Faulk, neither the use of security personnel or technology alone is adequate to combat theft. “The combination of both of these elements is what will lead to success,” he said.
Protecting library services and data and the privacy of library users against hacking, worms and viruses has become a paramount concern. Although these kinds of threats have existed for more than a decade, the sophistication of the attacks has been increasing in recent years. The result is lost data, interrupted services and compromised privacy of library patrons.
“Libraries’ databases with names, addresses and phone numbers of patrons are vulnerable, and we take that very seriously,” said Marshall Breeding, director of innovative technologies and research at Vanderbilt University Library in Nashville. “We want to make sure that a hacker or worm does not lead to exposure of that information.”
Hackers regard library systems as an easy mark and a jumping-off point to other networks or computers, he said.
Libraries around the country have developed new strategies to safeguard their security. “There’s been an evolution from departmental capacity to enterprise capacity in universities and municipalities,” he said. “We rely a lot more on a broader security architecture of our host institutions, rather than trying to do everything ourselves.”
Many libraries are using a multilevel approach that incorporates tools such as desktop-level virus software and firewalls on the edge of their networks, especially surrounding data centers.
Breeding predicts hackers will have diminishing success in attacking libraries’ databases. According to him, libraries are becoming increasingly well guarded.