Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

News & Notes

August 1, 2004
The security bill to protect this year’s Olympic Games will be more than a billion dollars.

2004 Olympics Heavy on Security

In the first summer games following Sept. 11, organizers for the 2004 Summer Olympics, to be held this month in Athens, Greece, are taking security more seriously than at any time since the first modern Olympics took place in that city in 1896. Possessing a budget now nearing $1.5 billion, security forces at the games will feature a staff of over 70,000 military and police, well over the $450 million and approximately 15,000 officers deployed for the 2000 Summer Games in Sydney, Australia. Athletes will be under heavy and constant protection, while NATO planes patrol the no-fly zone above the games.

In comments published by the BBC, International Olympic Committee president Jacques Rogge noted, “everything that’s humanly possible has been put in place. If it means more security checks, if we see more armed forces and measures have to be taken, then let it be.” For its part, the United States – part of the seven-nation Olympic Advisory Group that provided resources and consultation for security at the games – donated over $26 million for state-of-the-art radiation detection equipment.

Protecting Lady Liberty

irst, she was a symbol of interminable friendship between the United States and France. But before her bronze visage could fade to green, Lady Liberty had become an icon of American freedom – an emblematic gatekeeper to a welcoming, open and democratic nation. And as the statue base and inner grounds reopen to the public this month for the first time since Sept. 11, she will have taken on a tertiary meaning as a showcase for American ingenuity, specifically, security technology.

Identified as a likely terrorist target, the Statue of Liberty was closed immediately following the Sept. 11 terrorist attacks until it could be determined that the building was secure. While Liberty Island reopened in December 2001, access to the pedestal, museum and star-shaped Fort Wood, the base upon which the statue was assembled, has only just recently become feasible – thanks to a $20 million renovation effort that included installation of new stairways and exits, an overhaul of the building’s fire prevention system and a new visitor screening process.

E-mail Brian Feeney at brian_feeney @nps.com or call (718) 354-4606.

Mark Henderson of DMP showed off his firm’s technologies and products to engineers and specifiers at the AMAG Techology’s conference.

Security Experts Gather for AMAG Conference

Leading security consultants from across the United States converged in Scottsdale, Ariz., recently to participate in AMAG Technology’s third annual Security Technology Conference. For three days, conference attendees were exposed to the latest developments in a range of electronic security technologies, including hands-on demonstrations of advanced systems integration capabilities.

Representatives from a select group of companies belonging to AMAG’s Technology Partner Network educated conference attendees about their latest technologies and related application trends. NEC Solutions America demonstrated their new High Availability / Disaster Recovery Server, Verint teamed up with Object Video to give attendees a glimpse at recent advances in surveillance technologies while Recognition Systems and Bioscrypt discussed emerging biometric identification technologies and applications. Visit www.amagaccess.com.

FKI Logistex Wins $2 Million Project for JAX RFID Upgrade/Retrofit

FKI Logistex has won a contract from Jacksonville International Airport (airport code: JAX) for the retrofit and upgrade of the airport’s RFID baggage identification system. The contract is valued at an estimated $2 million.

The project will retrofit the airport’s existing RFID arrays to EPC Global compliant equipment and systems from Matrics Inc. and enhance the airport’s systems so that every piece of luggage will eventually get an RFID tag for baggage tracking, tracing and sorting.

Visit online, www.fkilogistex.com, www.jaxairports.org, www.tsa.gov and www.matrics.com.

PEOPLEOnTheMove Sales Exec at

Protection Bureau Jim Arizini has joined the Protection Bureau as sales and marketing manager. Arizini brings over 25 years of experience in all areas of security with particular expertise in intrusion detection, fire life safety, digital video and access control.

Chambers at DVTel

DVTel recently added security industry veteran Ian Chambers to its senior management staff. Chambers was appointed vice president of business development for the Paramus, N.J. company.

BusinessNews

Backup Hosting Brivo Systems has established a second hosting center in Elmhurst, Ill. to serve as a redundant backup hosting facility for the Brivo® Access Control System. A basic replica of the company’s primary hosting center located in Northern Virginia, the new hosting facility offers favorable geographic diversity in the event of major manmade or natural disasters in the greater Washington, D.C. metro area. Visit www.brivo.com.

Digital Video in the Schools

GE Infrastructure, Security says that the Arlington Independent School District of Texas is using GE digital video surveillance equipment throughout its campuses and on several buses to monitor and protect students, staff and district assets. Located in the heart of the Dallas-Ft. Worth area, the district currently has more than 62,000 students enrolled in more than 74 facilities, making it the ninth largest school district in Texas.

The district is upgrading from 16- and 32-camera mixed systems to 48-camera, standardized GE configuration systems on its campuses. Visit www.GESecurity.com.

DoD Seeks Anti-Terror Tech

Speaking at a luncheon in Washington, D.C. last April, Peter F. Verga, principal deputy assistant secretary of defense for homeland defense, announced that the Department of Defense is actively seeking new technologies from the private sector that could help with the War on Terror. He noted that the DoD invests approximately $100 million annually in its Technical Support Working Group (TSWG), a departmental forum that identifies, prioritizes and coordinates interagency and international R&D.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Person holding cellphone

Millions of Android, iPhone Users Could Be Sending Data to China

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • News & Notes: Business News

    See More
  • News & Notes

    See More
  • News & Notes

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!