School safety concerns have risen in the US due to violence, and authorities are scrambling to find a way to put a stop to the instances or at least, be prepared in case tragedy strikes.  Events like this have received more attention, but little information is given on preventing and reducing violence. Also, concerns about the mental impact that active assailant exercises produce because these drills are often realistic and graphic have become more concerning. An effective approach would be to build relationships throughout the school, building, organization, etc. that are advantageous for security as well as the overall organization. Small focused exercises like a first aid training or testing communication resources can be more effective than an all-out exercise that can heighten chaos and anxiety. Embedding security into the culture is a key to making security automatic, so that when a situation does arise the reaction can be more of a muscle memory.

Integrity, Implementation, Impact


A Friday night in London, pretty much how you would picture it with crowded streets and a light drizzle. Suddenly a fight breaks out between two small groups of people. A man in a red jacket starts the ruckus and with the element of surprise quickly gains the upper hand in the fight as he relentlessly strikes a man to the ground and continues to strike him. The others in the group react, some fighting and some trying to break up the fights. Shortly after, the police respond breaking up the fight and separating the groups. Even though the police did not see anything that lead up to the fight they detain the man in the red jacket. The police knew the man in the red jacket was the aggressor because dispatch monitors cameras throughout the streets. Dispatch replayed the coverage and identified the aggressor. Dispatch then relayed to the police what they saw on the coverage. The placement, resolution, storage and playback demonstrated the systems integrity by having the capabilities to capture the event. The ability to coordinate detecting the incident, contacting the police and identifying the suspect show an efficient implementation of the system. The quick response by the police and their intervention preventing any further escalation showed the impact of the system.

Advance, Advance, Advance


My heart beat a mile a minute as I came around the corner with my gun drawn. When I cleared the corner, I saw several disorientated and injured people walking, stumbling and staggering. I shouted commands to put their hands up while I scanned the area for the shooter. Suddenly I felt a sharp pain in my leg and immediately ran for cover. I looked down and saw I had been shot in both legs. I looked and my back up was huddled behind the same cover. We were pinned down. I fired frantic rounds back at the shooter emptying all three magazines. I looked back and my back up looked at me with the same uncertainty of what to do next. Then, out of desperation, I jumped up and ran to the next obstacle and was struck again, in the arm, then dove behind another barrier. Soon after, an instructor called an end to the active shooter scenario. I didn’t want to stand up. I was embarrassed and defeated. I was so arrogant going in I did not even wear any protective gear and as a result was bleeding from where the round hit me in the arm.

Security is a Journey and Not a Destination


“Can’t Hurt Me” is the story of David Goggins’ life. As a boy he lived a life that in the least could be said to be rough. He endured physical and emotional abuse along with his brother and mother by his father. Eventually he and his mother left and lived an impoverished life. He wanted to joined Air Force Special Ops, but quit the rigorous training after being told he had the potential of a health risk. He went on to end his Air Force career and transitioned into a dead end job and found himself weighing 297 lbs. One day he saw a a documentary on Navy SEALs. He knew then that he wanted to become a Navy SEAL and he immediately called recruiters that did all but laugh when he told them his weight. Finally, he found a recruiter that took him seriously and told he had lose 106 lbs in under three months. 

Lights Camera Access


At a slow point in the day one employee vacuumed the floor as another tended to product presentation in the glass counter display. Suddenly 3 masked men burst into the front door and put the employee who was vacuuming on the floor at gun point. The employee behind the counter desperately pushed the panic button around her neck as she backed up while the intruders approached her. The cameras captured all of this as well as the criminals fleeing with $29,000 in cash and product. The thieves have yet to be caught and it is hard to imagine what trauma the employees experienced. Other than a Star Trek teleporter, there is no one size fits all solution for every space. Most will provide a set of unique challenges that have to be addressed.

What the Mars Rover Can Teach About Security


In 1971, the US narrowly beat the Soviet Union in the race to reach Mars’ orbit. In 1997 Sojourner and Pathfinder landed on the Martian surface and were able to take samples of the soil and atmosphere then transmit the data back to earth and those missions lasted just under three months. In 2005 Spirit and Opportunity landed on opposite sides of Mars. They were able to take pictures, search for water and distinguish the best rocks for samples. Opportunity’s 90-day mission lasted 15 years. Then in 2012, the strongest parachute known to man deployed above Mars, followed by rockets and counter rockets firing to level the spacecraft, and finally pullies lowered the Curiosity to the ground. Curiosity is much larger, has more than six times the amount of cameras, a drill, and a laser that can identify materials. In 2020 another rover should be on Mars. This rover will have twice the cameras of Curiousity, a plutonium energy source that uses as much power as a 100-watt lightbulb, but produces 2,000 watts of power, and even radar that detects water sources below the surface. It will work with other vehicles, rockets and spacecraft in processes in order to send tangible Martian samples to earth.

False Sense of Security


Standing in a long line at the bank is not something most people like, with the exception of a Mega Millions winner. There is little to do in this line to keep the mind occupied and the natural thing to do is to look around and take in the environment. This bank displayed obvious security measures that could be likened to that of a seedy illegal underground gambling establishment. Complete with a bulletproof glass barrier nearly to the ceiling between client and teller, would prevent any attempt of physical contact with anything behind the glass, and several cameras aligned the back wall to capture any movement inside the bank. These solutions would probably make a potential robber move on to an easier target. Then an employee was observed coming from this area. She exited a side door and did not give the door a second thought as it closed. The door took about 5 to 10 seconds to close, with a long line of customers 25-30 feet away. A brisk walk and a bank robber could bypass all the security in place.

Observe, Orient, Decide and Act


“Look Out!” rang out urgently in a woman’s voice as I stepped off the curb to cross the street in downtown Los Angeles. I immediately jumped back onto the sidewalk. A split second later a car zig zagged past where I stood with tires screeching. Before I could process what happened, the tail lights disappeared into the city skyline. How did I know? What got me back on to that sidewalk without even knowing what was happening or heading my way? I had just cycled through a process called the OODA that we all do several times a day, usually not knowingly. OODA Loop stands for Observe, Orient, Decide and Act. Whether we’re crossing the street (in a much safer situation.) or reacting to an active shooter, we all go through the OODA Loop in the same order with the goal to reach the act step before any task or threat we are facing.

How a SOP is Good for Your Insurance


Trim for best glide at 65 KIAS. Pick a suitable landing site. Fly toward the landing site. Fuel selector; both. Fuel shutoff valve; in. Mixture; as required. Fuel pump; on. Magnetos; on/both. To many people, this means absolutely nothing, but to a pilot who is experiencing inflight engine failure this is the emergency procedure checklist. Pilot’s must show this knowledge to get licensed and must possess a license in order to be insured. Having this training significantly reduces the liability in an insurance provider’s eyes and sees the pilot as an acceptable liability. Also, the more hours and training a pilot takes, the less risk they pose to crashing or causing other damage to an aircraft. Most pilots will never have to use this procedure much like most businesses will not experience a violent event. However, the same way a pilot operates mechanisms countlessly to avoid disaster, a standard operating procedure (SOP) can serve as a checklist in the event of a violent or catastrophic was to occur. Reducing risk is the key to reducing your premiums paid to an insurance provided.

Risk Management Plan


Risk is a factor that is impossible to avoid and impossible to always predict. Having a risk management plan is crucial in order to create risk mitigation and risk transfer. By having a risk management process in place, it serves as a foundation to create a risk management process. Risk management does not simply apply to safety and security or simply physical security. Also, risk management process complete by just putting in a set it and forget it business security systems or business security cameras from Best Buy.

How to Know if You Need a Risk Assessment


A risk assessment is a systematic, fact-based method of investigation and examination that blends a collection and analysis of multiple sources of information with published research and experience focusing on patterns, population, surroundings, history and other factors. A risk assessment is not a final product, but the beginning or refinement of a process. It guides a course of action to mitigate a threat potential for safety and security by identifying vulnerabilities and offering solutions to mitigate threats and liability. A risk assessment addresses numerous threats to a business and/or facility. This can range from protecting sensitive unique information to identifying, preventing and responding to an active assailant attack.

Managing Liability

Jerry B. Jennings 12/28/2018

A couple sued the Main Street Station casino in Las Vegas for negligence after an incident at about 3 a.m. when 68-year-old Calvin Kawamura was attacked from behind and robbed by Christopher Corson-Edwards. The federal lawsuit faulted Main Street Station casino for not having better security down a long, dark hallway that lead to the restrooms off its main casino floor. Surveillance coverage was used to identify Edwards, but it is cited that more security should have put in place to deter the attack. The Main Street Station had security in place, but neglected to continually maintain and improve it.