Security Management Magazine Cover
​Beginning December 2016, Security Management will also be available as a PDF. View ​Issues available for Download

 August 2019 Review: Homeland Security2019-08-01T04:00:00Z<p>​Edited by Mark M. Lanier and Edmund Sexton. Cognella Academic Publishing; <a href="">​</a>; 2018 pages; $109.95.<br></p><p>​Edited by Mark Lanier and Edmund Sexton, <em><a href="">Introduction to Homeland Security: Preparation, Threats, and Response</a></em> is intended to be a beginner-level textbook on the role and functions of the U.S. Department of Homeland Security (DHS). The chapters build three large sections that follow the book's subtitle: Preparation, Threats, and Response. However, the book struggles to flow smoothly from chapter to chapter—each chapter is actually an article or an excerpt from a previously published piece.</p><p>These articles vary from one another in both interest and relevance to the overall topic.  Earlier chapters on the structure and formation of the U.S. Department of Homeland Security and the history of terrorism are both intriguing and relevant. They frame the historical context and fit well into the narrative of the book. A later chapter that appears to be a research paper on the environmental impact of the Border Patrol seems out of place. A better topic may have been a discussion of the role DHS plays in immigration and border security. The use of articles as chapters also leads to some repetition, where seminal events are discussed as subsections of multiple chapters by different authors.</p><p>Perhaps the largest drawback to this book is that it struggles to stay current. The field of homeland security changes rapidly across multiple areas such as threats, technologies, and alliances. Many chapters were originally published in the early 2000s. This leaves gaps in information on recent events, threats, and techniques. The book provides a multitude of references and citations behind each chapter, and some sections also include discussion questions and conclusions.</p><p>Overall, the book is an anthology of generally interesting articles that, while not necessarily current, offer solid and well researched information about the early formation and operations of DHS, as well as a thorough discussion of terrorist organizations, their sponsors, and historical development. It would work in an academic setting as a companion to more current material on the same topic.</p><p><em>Reviewer: Yan Byalik, CPP, is the security administrator for the City of Newport News, Virginia, and has worked in the security industry since 2001. He manages the division that is responsible for the security of the city’s critical infrastructure. Byalik is the assistant regional vice president for ASIS Region 5A in Southeast Virginia.</em></p> 2019 SM OnlineGP0|#21788f65-8908-49e8-9957-45375db8bd4f;L0|#021788f65-8908-49e8-9957-45375db8bd4f|National Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<h4>​BODY CAMERAS</h4><p><a href="">More than 80 percent of U.S. police agencies​</a> are either using body cams now or have plans to do so in the near future, according to a survey by the Police Executive Research Forum. </p><h4>POLICE USE OF BODY CAMS</h4><p> Washington, D.C., officials<a href=""> released the results of their own randomized controlled trial of body cam​</a> use by the city's police department. The study surprised many by finding that body cam use had no detectable effects on police discretion, as measured by arrests for disorderly conduct.</p><h4>​AGING INFRASTRUCTURE</h4><p>The vast, aging U.S. Coast Guard infrastructure includes piers, docks, and other facilities.<a href=""> The Coast Guard estimates that its backlog of improvement projects ​</a>would take $1.7 billion and nearly 400 years to address. </p><h4>MEXICO</h4><p><a href="">After a few years of declining murder rates, cartels in Mexico are locked​</a> in bloody turf wars, contributing to a dramatic rise in murders in 2017, according to a report from Stratfor.  </p><h4>911 TECHNOLOGY</h4><p><a href="">A new white paper explores how 911 communication centers can navigate ​</a>Next Generation 911 technologies and the FirstNet public safety broadband network.</p><h4>IT SUPPLY CHAIN</h4><p>The U.S. Government Accountability Office<a href=""> assessed supply chains that U.S. federal agencies use to procure IT systems.​</a> </p><h4>​PRIVACY IN EUROPE</h4><p>The European Union <a href="">began enforcing the General Data Protection Regulation (GDPR) in May 2018,</a> forcing organizations to comply with vast privacy and data security regulations. </p><h4>PRIVACY IN CALIFORNIA<br></h4><p>California's Consumer Privacy Act <a href="">has similar privacy requirements as the EU's General Data Protection Regulation</a> and goes into effect on 1 January 2020.</p><h4>CENSUS</h4><p>The U.S. Supreme Court will <a href="">review a challenge a citizenship question in the 2020 census.​</a> </p><h4>SEXUAL HARASSMENT<br></h4><p><a href="">The U.S. Fourth Circuit Court of Appeals ruled that employers may be liable for not effectively addressing and stopping rumors​</a> of an alleged sexual relationship between a female employee and a male supervisor. </p><h4>TSA</h4><p>Two U.S. Congressmen reintroduced legislation to<a href=""> improve the Transportation Security Administration's (TSA) frontline workforce​</a>, granting TSA officers certain benefits. </p><h4>RACIAL DISCRIMINATION<br></h4><p><a href="">The New York Commission on Human Rights issued new guidelines ​</a>outlining that segregating people based on their hair or hairstyles is a type of racial discrimination. </p><h4>​SEXUAL MISCONDUCT</h4><p>The Nevada Gaming Commission<a href=""> fined casino magnate Steve Wynn's former company a record $20 million​</a> for failing to investigate sexual misconduct claims against Wynn. </p><h4>CORRUPTION<br></h4><p>Pakistan's National Accountability Bureau indicted the country's opposition leader, <a href="">Shahbaz Sharif, of corruption charges related to a housing scheme.​</a></p><h4>TRANSGENDER DISCRIMINATION</h4><p>An Iowa District Court<a href=""> ordered the state to pay a transgender nurse $120,000 in damages​</a> due to gender-related discrimination. </p><h4>FIREARMS</h4><p>New York's Senate Bill S101A would <a href="">restrict schools' ability to authorize the possession of a weapon​</a> on school grounds to certain officers or agents of a law enforcement agency. </p><h4>GOVERNMENT SHUTDOWNS<br></h4><p>The U.S. Government Employee Fair Treatment Act of 2019<a href=""> requires federal government or D.C. public employees​</a> furloughed or required to work during a lapse in appropriations to be compensated for the lapse on the earliest date possible after the lapse ends.</p><h4>SEXUAL ASSAULT<br></h4><p><a href="">New York's Senate Bill S2440 (19R) pauses the statute of limitations for criminal and civil prosecution​</a> for sexual offenses committed against children, so the clock does not begin to run until the victim turns 23. </p><h4>FAMILY LEAVE<br></h4><p>New Jersey's S2528 (18R) expands the state's paid family leave program, <a href="">doubling how much time employees can take off for the care of a new child or sick relative​</a>, and raising pay received during the absence.</p><h4>AGE DISCRIMINATION</h4><p>The U.S. Court of Appeals for the Seventh Circuit <a href="">ruled that the Age Discrimination in Employment Act does not provide age bias protection to job applicants​</a> who allege they were victimized by disparate impact discrimination.</p><h4>TRANSPARENCY</h4><p>The Los Angeles County Superior Court ruled against police unions, finding that secret records of police misconduct and shootings, even ones filed before 2018,<a href=""> must be released under a new state transparency law, SB 1421.</a></p><p><br></p> the Sum of Many Parts with Endpoint ManagementGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p>​AVX Corporation manufactures and supplies sensors, antennas, and other electronic components that make up phones, computers, medical devices, and more. For many years, the firm faced various company acquisitions, managed multiple facilities, and used numerous security systems.</p><p>Each acquisition and location brought with it a new—and separate—antivirus solution for that facility’s network. And when Zack Moody, CISSP, joined AVX as information security manager two years ago, he was tasked with facilitating a singular network security approach that could protect the organization’s 29 facilities in 16 countries. </p><p>“The job was much larger than AVX knew, but this was an opportunity I was willing to accept,” Moody says. “I wanted to create a program from scratch.”</p><p>Through his experience in both the private and public sectors, Moody says he knew there were many ways to approach the challenge at hand—either through a compliance or risk perspective. </p><p>“It was hard—there’s lots of noise from the compliance standpoint, but there was also a lot of risk to take into consideration,” Moody explains. “How do you find that balance? A good security professional is going to understand that as long as you’re implementing security correctly, compliance falls into place. It took a long time to figure out the business side, because AVX is such a massive organization and spread throughout the world.”</p><p>The first thing Moody did in the decision-making process was conduct a global security assessment to identify the biggest risks and gaps. </p><p>“For me, when I looked at what was the biggest risk, endpoints obviously came to mind,” he explains. “One way attackers enter your organization is typically with malware, so how does it get in? It’s either through a USB or email. And if it gets onto the machine, that’s where it’s going to execute from, so we have to strengthen that.”</p><p>The security assessment revealed that AVX’s facilities were running five or six different antivirus solutions worldwide. Moody says he knew that finding one effective solution that would stop malware execution at the endpoint was imperative for AVX’s systems. </p><p>“Throughout AVX facilities there were different price ranges, even with the same vendor, because people purchased things separately from the next facility,” Moody explains. “There was no central view into the influence, no central control—and if a fix or change needed to be pushed out, you’re not just pushing one patch, it was one patch to this vendor, one patch to another vendor.”</p><p>In Moody’s search for a standardized solution, he focused on the need for endpoint protection, detection, and response capabilities, which would provide multiple ways to handle malware threats. He also looked for something that would allow him to manage the system from one platform and provide the tools needed to actively detect threats.</p><p>AVX found its solution in SentinelOne’s Endpoint Protection Platform, which met the requirements through an all-in-one approach—there was no need to purchase different licenses or pieces of software, which many other competitors required, Moody notes. </p><p>“SentinelOne provides the capability of rolling back the operating system in case there is a ransomware system on a computer,” Moody notes. “There’s the argument that you shouldn’t have to have that, but for me it’s better to have, because you never know.”</p><p>Moody says he was also impressed by SentinelOne’s reliance on its customer base, which often informs what new features are developed—in fact, AVX played a part in SentinelOne’s development of its firewall and USB controls, he notes.   </p><p>Implementation of the platform was seamless, Moody explains, and AVX ran the program in detect-only mode for the first two weeks so AVX could teach it what programs or actions to whitelist—including the legacy antivirus software that facilities had in place.</p><p>“During that period, we could see what they were identifying as good, bad, and ugly, and had the opportunity to compare it to what rules are currently in place with the existing antivirus systems the site was using,” Moody explains. “We could start whitelisting those known systems, so when we turn on the detect mode, there are fewer false positives.”</p><p>One challenge AVX faced was one many manufacturers are familiar with—the computers, programs, and code used in manufacturing are, as Moody puts it, “some of the oldest known to man” and don’t work well with newer endpoint solutions.</p><p>“Throwing SentinelOne on these systems, it’s going to pick up on older applications that may not be digitally signed or seem to appear malicious, but in reality are old applications that we’ve been using for years,” Moody says. “You can whitelist an application, but the good thing about SentinelOne is it will pick up on any strange activity that an application does, even though it’s whitelisted. It can still get blocked if it starts changing files or does something malicious.” </p><p>AVX implemented SentinelOne’s solution in June 2018, and the process took about six months because of the number of disparate and isolated systems throughout the organization, Moody explains. </p><p>But now that it’s up and running, it has streamlined the malware detection and response process. Previously, if an AVX employee encountered a potential malware issue with his or her computer, he or she would report it to the company’s IT department, which would investigate and run scans—often with the same software that didn’t detect the malware in the first place, Moody notes. Depending on the results of the scan, IT would reimage the computer and inform the security department of the potential breach. With the SentinelOne solution, security is the first to address a potential hack.</p><p>“There was a lot of wasted time with the legacy products,” Moody says. “So why not invest in tools that were going to be more proactive on the security side? They give the security team reach into those endpoints and free up our IT professionals. We need to be in control of what’s on our network and what’s happening. Business continues to go on, people can continue to work—the majority of the time, SentinelOne is taking care of things in the background and blocking what it needs to be blocking. But if something happens, we’ll be notified immediately, and we’ll have all the tools to react.”</p><p>Moody says that he is pleased with SentinelOne’s innovative approach to detecting and responding to malware. </p><p>“We wanted to get away from the traditional signature-based detection systems and go towards something more proactive to these threats,” he says. “It’s very important, especially in manufacturing where there’s so much machine code that is old or might change a lot. You have to make that decision—do I trust a company that built their entire organization off legacy antivirus, or a company that is fresh and inventive in today’s world and threat landscape? When I take a step back, we want someone who is going to be with us for the next 40 to 50 years and has a vision of threats today and beyond. I want someone new in the game, and for us, that was SentinelOne.”  </p><p><em>For more information: Daniel Bernard, vice president, business and corporate development, <a href="" target="_blank">SentinelOne,​</a> <a href="">[email protected]</a>, 816.668.3472.</em></p> 2019 Industry NewsGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<h4>School G​​​uard Booths <br></h4><p>​B.I.G. Enterprises, Inc., recently manufactured new enclosures for St. Mary’s, a K-8th grade private school, providing perimeter security and access control as well as a secure location for school security guards. The booths present a visual deterrent for would-be attackers and are placed at every entry to the campus. These prefab units are built to meet all state codes, include the most recent energy codes, and ship as a complete one-piece unit ready for an easy installation. The booths include modern features such as all galvanized steel construction and a coated roof that offers a solar reflective index of 95 or greater. </p><h4>AWA​​RD</h4><p>The Hazardex Awards program, part of the annual Hazardex Conference and Exhibition, awarded the Personnel Protection Technologies (PPT) Innovation Award to Oncam’s Evolution ExD Explosive Environment Camera Range for the best innovation in PPT equipment to improve safety within the process and high hazard industries.</p><div><h4>CONTR​​ACT</h4><p>General Dynamics Information Technology will support the Defense Threat Reduction Agency through its new infor­mation technology support services contract vehicle over a five-year base period.</p><div><h4>A​nnouncement</h4><p>IXP Corporation authored a new industry white paper, <em><a href="">NG911 & FirstNet: Emergency Communication Centers Provide the Critical Link​</a>. </em>The report explores how 911 communication centers can successfully navigate Next Generation 911 technologies and the FirstNet public safety broadband network and its users.</p><h4>PARTNERSHIPS</h4><p><br><strong>CYBERSECURITY</strong><br>AbedGraham and BridgeHead Software coauthored a white paper, <em><a href="">Legacy Applications: A Healthcare Cybersecurity Nightmare, ​</a></em>which outlines the cyber risks and consequences of running vulnerable legacy systems.<br><br><strong>CLOUD SURVEILLANCE</strong><br>The South Grand Community Improvement District in St. Louis, Missouri, is using Genetec Inc.’s Stratocast cloud surveillance to reduce license plate theft and collaborate with the local police department. <br><br><strong>INTERNET OF THINGS</strong><br>The Kudelski Group’s IoT security platform will integrate into IDEMIA’s DAKOTA IoT and other solutions for combined network connectivity management and IoT security.​<br></p><div><h4>Mergers & Moves​</h4><p><strong>NSI Industries, LLC & Platinum Tools</strong><br>NSI, an electrical and control products provider, merged with the datacom producer to expand its product portfolio and market reach.  </p><div><p><strong>Doyle Security Systems & Commercial Instruments & Alarm Systems (CIA)</strong><br>Doyle, a regional provider, purchased CIA customer accounts, expanding the company’s scope in New York state.</p></div><div><p><strong>NTT Security Corporation & Whitehat Security</strong><br>NTT signed a definitive agreement to acquire the privately owned application security provider.</p><div><p><strong>FLIR Systems & Endeavor Robotic Holdings, Inc.</strong><br>FLIR becomes a leading provider of unmanned aerial and ground solutions to support military, public safety, and critical infrastructure missions.  </p></div></div></div></div></div> Profile: Rose Miller, CPPGP0|#68cd7623-cf23-49f8-9b16-7610e085f76c;L0|#068cd7623-cf23-49f8-9b16-7610e085f76c|ASIS;GTSet|#8accba12-4830-47cd-9299-2b34a4344465;GPP|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997<p>​As a military police officer in the U.S. Army for 27 years, Rose Miller, CPP, led hundreds of law enforcement and security professionals in meeting global security challenges. When seeking a second career, her objective was to share her experience and skills and continue to grow as a security professional. </p><p>“An Army colleague introduced me to ASIS International,” she says, “and I found that the association’s networking and education opportunities would significantly assist my transition to the private sector.”</p><p>When searching for positions in corporate security, she encountered several roles that listed security certification as a required qualification—and she promptly launched her pursuit of the Certified Protection Professional (CPP®) credential.</p><p>She gathered study materials and spent six months preparing for the exam. Using the practice exams, she identified areas where she needed additional study—and she successfully passed the CPP exam in 2011.</p><p>Within 90 days after earning her certification, she was offered a position as a director of security in a large hospital in Washington, D.C. </p><p>“My CPP certification made the difference in the successful translation of my military experience to the security management profession,” she notes. “As a military security professional, the CPP helped define my level of competence to private sector employers.”</p><p>“The healthcare industry under­stands, recognizes, and encourages certifications,” she adds. “Respecting my commitment to certification, C-suite executives comfortably rely on my recommendations and actions in all security functional areas. It is very satisfying for me to be able to relieve senior executives of security concerns and allow them to focus on taking care of patients and running the business.”</p><p>One of her most memorable moments was the day the vice president of the United States paid her hospital a visit—on only two hours’ notice. </p><p>“Our security team, established programs, collaborative relationships, technology, and senior leader support all came together for a flawless execution of the mission,” she reflects.</p><p>After more than three years in the position, Miller made the leap to security consulting—looking to diversify her expertise and expand opportunities to share her knowledge. As a consultant, she continues to reap the rewards of her CPP. Potential clients seeking security consultants not only respect ASIS certifications, but often require them. She routinely leverages both the network and educational resources of ASIS. </p><p>She now gives back to the Society by volunteering with the ASIS International Military Liaison Council. She is active in her local chapter and serves as a Women in Security Council liaison.  </p><p>“A career in security is honorable and rewarding,” she offers. “When I served my nation in the military, I was honored every day that because of our efforts, citizens were able to feel safe and secure while enjoying the freedoms of family, work, and play. Embarking on a career in the security profession allows me to continue to help protect those freedoms.”  </p><p><em>Profile by Steven Barnett, ASIS communications coordinator</em><em></em></p> to Know: Jaime P. Owens, CPPGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p>Jaime P. Owens, CPP,  is security branch supervisor for The Panama Canal. He is a member of the ASIS International Board of Directors and the Globalization Task Force. ​</p><h4><br></h4><h4>​Q. What security issue do you believe is being overlooked?</h4><p><strong>A.</strong> I strongly believe that security is science, art, and philosophy. Perhaps the philosophical part has been overlooked.</p><div><h4>Q. A mentor who inspired yo​​​​u?</h4><p><strong>A.</strong> There are many, but Alex Omar Garrido comes to mind. He was the first CPP in Panama and my mentor as I prepared to become a CPP. </p><div><h4>Q. What book/movie/play title describes your life?</h4><p><strong style="background-color:#ffffff;">A.</strong> I was fortunate to grow up around many books at home. One of the best ones is Og Mandino’s<a href="" target="_blank"><em> The Greatest Salesman in the World.  </em></a></p>​<span style="color:#222222;text-transform:uppercase;font-family:novecentosanswide-bold, sans-serif;font-size:1.1em;">Q. Your favorite ASIS moment?</span><p><strong style="background-color:#ffffff;">A.</strong> There are so many. The foundation of the Panama Chapter, the first certification exam in Panama, and announcing that certification exams would be given in Spanish. </p><h4>Q. What is your proudest moment or accomplishment?<br></h4></div><div><p><strong style="background-color:#ffffff;">A.</strong> When I was elected as the first Latin-American member of the Board of Directors of ASIS International. ​</p></div></div><div><h4>Q. What does ASIS mean to you?</h4><p><strong style="background-color:#ffffff;">A.</strong> ASIS is critical from a security knowledge and networking standpoint. It provides the educational foundation necessary for me to keep building my career.</p></div> Day in the Life of Elizabeth Moslander, CPPGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<h2>​5-8am</h2><p>Elizabeth Moslander, CPP, rises bright and early to check email on her phone to alert her of any pressing matters she might have to face during the day. She tends to the family cat and dog before getting her 12- and 15-year-old daughters ready for school. Prepared to face the day, she then embarks on her hour-long commute to worksites in the Chicago area.<br></p><h2>8-11am</h2><p>As chair of the ASIS International Women in Security Council, Moslander sets aside time to discuss last-minute needs with officers on mornings that the council holds meetings. During meetings, the council discusses updates for its initiative to help women around the world achieve their security career goals.<br></p><h2>11am-5pm<br></h2><p>Business as usual for Moslander involves incident and robbery response, developing enterprise life safety initiatives, resolving any security equipment breakages, reviewing facility security, and designing, implementing, and validating project system design.</p><h2>5-10pm<br></h2><p>Beyond splitting daughter chauffeuring duties with her husband David, Moslander loves baking, crafting with her girls, and watching a good comedy. She’s also trying her hand at Super Team tennis in 2019—a form of socialized tennis where the participants gather to play, eat, and socialize.<br></p><p>___________________________________________________________________________________________________________________________________________________________________________________________________________</p><p><em>“We have a desperate need to bring the importance of this industry to the attention of the younger generation,” she adds. “Young people know about cybersecurity, but we have a lot of work to do to educate them about the many other diverse aspects of our industry.”</em><br></p><p>__________________________________________________________________________________________________________________________________________________________________________________________________________</p><p><em>“It’s critical to maintain health, motivation, and perspective,” she says. “Don’t sacrifice so much to work that, at the end of the day, you find yourself asking if it was worth it. No one ever looks back at the end of their career and wishes they’d spent more time at work.”​</em><br></p><p><br></p> 2019 ASIS News Culture Influences Disaster Recovery’s-Cognitive-Stress.aspx2019-07-01T04:00:00ZUnder Pressure: Managing Team Wellness Prepare for Active Assailants's Note: Human Problems Burnout Security Revolution Review: Security and Loss Prevention Profile: Garrett Packett, CPP Look to Retain Cyber Talent Review: Click Here to Kill Everybody 2019 Industry News,-and-Boiling-Over.aspx2019-06-01T04:00:00ZExtremist Attacks Rise as Polarization increases Biometrics Complement GDPR Regulations First 90 Days as a New Leader Outpaces Ransomware Attacks 2019 ASIS News Threats to High Value Targets Pose Physical Security risks

- Issues

August 2019 July 2019 June 2019 May 2019 April 2019 March 2019 February 2019 January 2019 December 2018 November 2018 October 2018 September 2018 August 2018 July 2018 June 2018 May 2018 April 2018 March 2018 February 2018 January 2018 December 2017 November 2017 October 2017 September 2017 August 2017 July 2017 June 2017 May 2017 April 2017 March 2017 February 2017 January 2017 December 2016 November 2016 October 2016 September 2016 August 2016 July 2016 June 2016 May 2016 April 2016 March 2016 February 2016 January 2016 December 2015 November 2015 October 2015 September 2015 August 2015 July 2015 June 2015 May 2015 April 2015 March 2015 February 2015 January 2015 December 2014 November 2014 October 2014 September 2014 August 2014 July 2014 June 2014 May 2014 April 2014 March 2014 February 2014 January 2014 December 2013 November 2013 October 2013 September 2013 August 2013 July 2013 June 2013 May 2013 April 2013 March 2013 February 2013 January 2013 December 2012 November 2012 October 2012 September 2012 August 2012 July 2012 June 2012 May 2012 April 2012 March 2012 February 2012 January 2012 December 2011 November 2011 October 2011 September 2011 August 2011 July 2011 June 2011 May 2011 April 2011 March 2011 February 2011 January 2011 December 2010 November 2010 October 2010 September 2010 August 2010 July 2010 June 2010 May 2010 April 2010 March 2010 February 2010 January 2010 December 2009 November 2009 October 2009 September 2009 August 2009 July 2009 June 2009 May 2009 April 2009 March 2009 February 2009 January 2009 December 2008 November 2008 October 2008 September 2008 August 2008 July 2008 June 2008 May 2008 April 2008 March 2008 February 2008 January 2008 December 2007 November 2007 October 2007 September 2007 August 2007 July 2007 June 2007 May 2007 April 2007 March 2007 February 2007 January 2007 December 2006 November 2006 October 2006 September 2006 August 2006 July 2006 June 2006 May 2006 April 2006 March 2006 February 2006 January 2006 December 2005 November 2005 October 2005 September 2005 August 2005 July 2005 June 2005 May 2005 April 2005 March 2005 February 2005 January 2005 December 2004 November 2004 October 2004 September 2004 August 2004 July 2004 June 2004 May 2004 April 2004 March 2004 February 2004 January 2004 December 2003 November 2003 October 2003 September 2003 August 2003 July 2003 June 2003 May 2003 April 2003 March 2003 February 2003 January 2003 December 2002 November 2002 October 2002 September 2002 August 2002 July 2002 June 2002 May 2002 April 2002 March 2002 February 2002 January 2002 December 2001 November 2001 October 2001 September 2001 August 2001 July 2001 June 2001 May 2001 April 2001 March 2001 February 2001 January 2001 December 2000 November 2000 October 2000 September 2000 August 2000 July 2000 June 2000 May 2000 April 2000 March 2000 February 2000 January 2000