Weapons Screening – Technology and Operational Considerations
The International Association of Professional Security Consultants (IAPSC) releases a new Evidence Based Security Practice on Weapons Detection Technology and…
The International Association of Professional Security Consultants (IAPSC) releases a new Evidence Based Security Practice on Weapons Detection Technology and…
Broken Windows is a crime theory which postulates that minor signs of disorder in a neighborhood, left unchecked, can result…
Violence escalation is defined as a single crime in progress that escalates into violence or escalates into further violence. Violent…
Emile Durkheim, a pioneer in criminology, suggested that crime was not indicative of a pathology or illness in society but…
A successful security program or initiative should be rooted in sound crime prevention theory and research and designed for specific…
Unraveled is the result of over 7 years of research to bridge the gap between criminology and private sector security…
Violent crimes represent a small but significant portion of the reported crime in the United States. Categorically, violent crimes occur…
Human trafficking has been identified as a global problem and occurs in most countries, including the United States. Traffickers use…
In the United States, we often base criminal justice policy on ideology, rather than research. This sometimes results in time,…
Crime analysis is a set of evidence-based analytical techniques and processes used to quantitatively analyze crime and security data to…
Available now: Strategic Security Management: A Risk Assessment Guide for Decision Makers, Second Edition Strategic Security Management (2nd Edition) Strategic…
November 16, 2018 WASHINGTON, D.C. – Today, Congressman Joe Courtney, (CT-02), a senior member of the House Education and Workforce…
Enterprise Risk Management The Global Risks Report The Meaning of Security in the 21st Century
This unique and timely study, commissioned by the RILA Asset Protection Leaders Council, is the latest in a series of…
2015 UCR: https://ucr.fbi.gov/crime-in-the-u.s/2015/crime-in-the-u.s.-2015
Features of a landscape can influence and enable behavior. Consider a place where children repeatedly play. When we step back…
When assessing the crime risk of a Place, it is important to distinguish violent crimes which pose a threat to…
I’m amazed that the media pays so much attention to violence in Chicago and ignores cities with more violence. If you…
Are we winning the battle against violence in U.S. hospitals? The IAHSS-Foundation’s 2016 Healthcare Crime Survey, published in May, seems…
Over the last two decades, there has been increased interest in the distribution of crime and other antisocial behavior at…
The problem analysis triangle (sometimes referred to as the crime triangle) provides a way of thinking about recurring problems of…
This guide begins by describing the problem of pharmacy robbery and reviewing factors that increase its risks. It then identifies…
The GMU Research Team discovered that LPR technology is rapidly diffusing into U.S. law enforcement. Over a third of large…
The objective of the IAHSS Foundation’s “Evidence Based Healthcare Security Research” series is to identify and summarize valid studies and…
This Standard provides guidance on developing and sustaining a coherent and effective risk assessment program including principles, managing an overall…
Predictive policing is the use of analytical techniques to identify promising targets for police intervention with the goal of preventing…
The International Association of Healthcare Security and Safety Foundation’s 2015 Healthcare Crime Survey was commissioned under the Research and Grants…
Healthcare and social service workers face significant risks of job-related violence and it is OSHA’s mission to help employers address…
EXECUTIVE SUMMARY On the morning of December 14, 2012, Adam Lanza (―A.L. killed his mother, Nancy Lanza, while she slept…
The Federal Protective Service continues to face challenges ensuring that contract guards have been properly trained and certified before being…
Since it’s inception in 1997, Threat Analysis Group, LLC has been an independent security consulting company. This means we are not…
Great video of people willingly giving away their passwords. Unfortunately, real world social engineering yields similar results. Jimmy Kimmel:…
What causes young inner-city men to kill each other? Where do we start? At the root causes of poverty, discrimination,…
FBI releases 2013 Uniform Crime Report (crime statistics)
Conducted Electrical Weapons – also called Conducted Electrical Devices – are more commonly known as stun guns or TASERs (the…
“In this study, the FBI identified 160 active shooter incidents, noting they occurred in small and large towns, in urban…
A new National Institute of Justice website, CrimeSolutions.gov, uses rigorous research to determine what works in criminal justice, juvenile justice, and…
Article on the new UCR crime Current Animal Cruelty Statistics from State UCR programs
ASIS releases comprehensive study on the development and implementation of security metrics. Security metrics are vital, but in the field…
Opening paragraph of forthcoming article on Crime Analysis: With no better evidence than the pocket-sized computer most of have nearby…
While the daily assessment of terror threats applies primarily to security professionals who are charged with protecting critical infrastructure assets,…
This guide to developing a business case, written by the ASIS International Leadership and Management Practices Council, is designed to…
“From a management perspective, making decisions based on data is a clear win. Yet it’s often difficult to adopt a…
Interesting questions and good responses featured in SecurityInfoWatch.com: One of our clients is reluctant to install cameras because they believe…
Consensus Statement of the American Association for Emergency Psychiatry Project BETA De-escalation Workgroup ABSTRACT: Agitation is an acute behavioral emergency…
In November 2013, GAO reported that (1) peer-reviewed, published research we reviewed did not support whether nonverbal behavioral indicators can…
Incident Background: On November 1, 2013, a man carrying an assault rifle opened fire inside Terminal 3 on a busy…
Created to improve the quantity and quality of crime data collected by law enforcement, the FBI UCR Program’s National Incident-Based…
“Several of the Department of Homeland Security’s (DHS) Federal Protective Service’s (FPS) guard requirements are generally comparable to those of…
Emile Durkheim, a French sociologist, suggested that crime was not indicative of a pathology or illness in society, but at certain levels…
EXECUTIVE SUMMARY The purpose of this report is to identify the person or persons criminally responsible for the twenty-seven homicides…
“Shrink, comprised of shoplifting, employee or supplier fraud, organized retail crime and administrative errors, cost the retail industry more than…
“The FBI estimated that in 2012, the number of violent crimes increased 0.7 percent, according to the figures released today.…
“Home invasion robbery has characteristics of both residential burglary and street robbery. Like residential burglars, home robbers must usually gain…
“Police agencies have long provided services to schools. It has only been in the past two decades, however, that assigning…
“The study of crime has focused primarily on why particular people commit crime or why specific communities have higher crime…
“The National Association of School Psychologists cautions against over-emphasizing extreme physical security measures or universally increasing armed security in schools…
“Your perception of any city or neighborhood is largely determined by things you can’t quantify, like the vague feeling that…
“MIT Students Release Program To 3D-Print High Security Keys” Forbes Article Thanks to SRB for sharing this story.
“Shifts in climate are strongly linked to increases in violence around the world, a study suggests. US scientists found that…
Security is rarely a popular subject from the organizational perspective. Because it is typically a cost item, with little immediate…
Typically, security is one of those budget line items that does not contribute directly to a company’s bottom line, and…
Security is often addressed as something that is either present or absent. However, security is not a dichotomy. Security is…
When evaluating security, consultants apply a spectrum of guidance when developing recommendations. The spectrum begins at one end with the…
“A business case can be easily made for a transition to white LED lighting. Here’s an overview of the benefits,…
In recent years, security and non-security industry associations have developed security standards that address various aspects of a security program…
Increasingly, we’re seeing crimes occurring in hospitals by people who “look” like they belong. Scrubs or lab coats are the…
“Aviation security is costly, controversial, and contentious; no other security measures directly affect such a large portion of the country’s…
“DALWORTHINGTON GARDENS — The discovery of a hidden camera may help solve a series of break-ins at upscale homes in…
Allegations of excessive use of force are common in both law enforcement and security. The article and video below illustrate…
Security Technology Executive has a good article on critical metrics for Security Operations Centers. Critical metrics include Transfer rates, Staff…
The new Risk Assessment standard will be developed jointly between ASIS International (ASIS) and RIMS (the Risk and Insurance Management…
Key assumptions for Reducing the Fear of Crime: Fear matters—it negatively affects individuals and communities. Fear is real—while it is…
“The FBI’s UCR Program is a nationwide, cooperative statistical effort of more than 18,000 city, university and college, county, state,…
“Over 10,000 terrorist attacks occurred in 2011, affecting nearly 45,000 victims in 70 countries and resulting in over 12,500 deaths.…
“Gangs are expanding, evolving and posing an increasing threat to US communities nationwide. Many gangs are sophisticated criminal networks with…
“Security video still may be a novelty in civil cases, but it is a familiar and effective tool for criminal…
Known or possible terrorists have displayed suspicious behaviors while staying at hotels overseas—including avoiding questions typically asked of hotel registrants;…
The failure to properly design and/or install Security Systems can have significant repercussions and may result in injuries. A recent…
Copyright 2012 Threat Analysis Group, LLC Excellent explanation and examples of how assets, threats, and vulnerabilities impact Security Risk:…
A new study entitled, Hospital-Based Shootings in the United States: 2000 to 2011, concludes “Although it is likely that not every…
Security metrics come in a wide variety of flavors and few are applicable to all type of enterprises. Security metrics…
According to the 24th Annual Retail Theft Survey, both the apprehensions and recovery dollars from shoplifters and dishonest employees rose; up…
This is an excellent, yet sad, article regarding online and cloud vulnerabilities. “In the space of one hour, my…
“At the Black Hat security conference Tuesday evening, a Mozilla software developer and 24-year old security researcher named Cody Brocious…
Criminal Events (Assaults, Rapes, and Homicides), reported to TJC, increased from 28 in 2010 to 49 in 2011 Joint…
“Criminologists and crime prevention practitioners are increasingly aware of the importance of places of crime. A place is a very…
As you know, justifying security FTE’s is a challenge, particularly in tight economic conditions. In an effort to assist the…
“Predictive-analytics software is the latest piece of policing technology working its way into law-enforcement stations around the country….it calculates its…
The International Association of Professional Security Consultants (IAPSC), the most respected and widely recognized consulting association in the security industry,…
SIW: “The International Association for Healthcare Security & Safety announced that it has released a new handbook on “Design and…
Security Management Standard: Physical Asset Protection (2012) This Standard presents a comprehensive management approach for the protection of assets by…
Crime in Schools and Colleges: A Study of Offenders and Arrestees Reported via National Incident-Based Reporting System Data “Schools…
“In 2011, the Internet Crime Complaint Center (IC3) actively pursued its mission to address crimes committed using the Internet, providing…
At the International Association for Healthcare Security and Safety conference in May 2012, we are presenting “A Model for Predicting…
Management System for Quality of Private Security Company Operations – Requirements with Guidance (2012) This Standard builds on the Montreux…
“CHILLICOTHE, Ohio — The government plans to end federal Medicare funding to a central Ohio hospital after inspectors said security…
“Gangs are expanding, evolving, and posing an increasing threat to U.S. communities. That’s the bottom line of the just-released 2011…
Building on their past research on situational crime prevention, Drs. Clarke and Eck explain the concept of risky facilities in…
“Over the past decade, hospitals across the nation have been subject to an alarming increase in violent incidents; in the…
This guide begins by describing the problem of sexual assault of women by strangers and reviewing factors that increase its…
Bruce Schneier’s excellent explanation of the Concept of Security You Tube Video
“Over the past three years, at least 1,800 pharmacy robberies have occurred across the country.” The Drug Enforcement Administration report…
“Hospitals — long considered places of healing — have experienced an increase in violent crimes in the last decade. In…
For as long as memory serves, following the smokers helped identify access control weaknesses and hiding spots around a campus…
Security professionals operating in today’s increasingly competitive environments face the unique challenge of providing security that reduces crime and loss,…
We are working on a project to identify industry benchmarks for security officer staffing levels. It is recognized that hospitals have…
Smart Phones already double as cameras, navigation systems, personal assistants, and soon, they’ll be unlocking our doors using Near Field…
This is a good example of the positive impact on staff security awareness training. Article
Nine hundred deaths and 1.7 million nonfatal assaults occur each year in the United States due to workplace violence. These…
“Biometrics are the next big thing in government and homeland security.” Fast Company article
The International Healthcare Security and Safety Foundation recently published a study on hospital escapes by forensic (prisoner) patients. 2011…
The Cloud Security Alliance’s Security as a Service working group releases white paper to identify consensus definitions of what Security…
“Robbing a bank is so unoriginal. Because of a combination of an economy in horrific shape and the rising monetary…
Threat Analysis Group, LLC has redesigned the Security Risk Assessment Flow Chart. The latest version of the flow chart, seen…
“Between 2007 and 2010, researchers from the Urban Institute’s Justice Policy Center studied public surveillance systems in Baltimore, Chicago, and…
Government Accountability Office: Retailers collaborate with law enforcement agencies to detect and deter retail theft and investigate potential ORC cases,…
In a 4-2 vote, the Jackson City Council on Tuesday approved an ordinance requiring convenience stores to have a security…
“A new crime-busting warehouse is helping officers spot crime trends as they develop in real time. IBM’s Crime Information Warehouse…
Security Journal has an excellent article entitled: Super controllers and crime prevention: A routine activity explanation of crime prevention success…
A new report by the Government Accountability Office (GAO) identifies various security staffing approaches used by government agencies. The purpose of…
A recent article on Feedback Loops in Wired Magazine suggests that is we “provide people with information about their actions in…
A security mix is a combination of security measures that, when properly deployed, can effectively protect assets. A good security…
“Thousands of assaults occur each year at California’s state psychiatric hospitals. Last October, a patient allegedly murdered a staffer at Napa…
Over the past couple of years, Threat Analysis Group, LLC has published several articles on hospital security. The articles address…
Two comprehensive documents address crime analysis as a tool for metrics/data-driven decision making. While one is geared to law enforcement…
“Hospitals have long been considered sacrosanct – places for healing and helping – but they are no longer immune to…
“Preliminary figures indicate that, as a whole, law enforcement agencies throughout the Nation reported a decrease of 5.5 percent in…
The Emergency Nurses Association created a Workplace Violence Toolkit designed specifically for the emergency department managers and is also useful…
“Nurses at St. Joseph’s Hospital in St. Paul are sounding alarms over a change in emergency room security staff. In…
A lack of security policy or a lack of policy enforcement? Toronto Globe Article
The National Criminal Justice Reference Service recently published a literature review and secondary data analysis entitled, “The Private Security Industry:…
The Security Continuum includes four distinct security strategies – – – Deterrence, Prevention, Mitigation, and Investigation. Deterrence is designed to…
A paper in the Journal of Physical Security defined threats and vulnerabilities as follows: Threat: Who might attack against what…
As many security professionals of open campuses know, identifying who is coming on your property is challenging. Keeping the bad…
From Campus Safety Magazine: “In June, the Joint Commission issued a Sentinel Event Alert urging hospitals to pay greater attention…
IAHSS and the Ontario Chapter will host the 43rd Annual General Membership Meeting and Seminar Program May 22-25, 2011 at…
Despite recent studies to the contrary, London’s Metro Police says CCTV cameras help solve ‘six crimes a day’ in London.…
The internal threat, while not unique to the health care environment, is pervasive and can have a significant impact on…
According to the California Hospital Association, “An active shooter is defined as an individual who appears to be actively engaged…
Charles A. Sennewald’s Effective Security Management 5th Edition has been announced with an updated chapter on Statistics as a Management…
“An off-duty cop pretending to be a terrorist stormed into a hospital intensive care unit brandishing a handgun, which he…
1. Opportunities play a role in causing all crime 2. Crime opportunities are highly specific 3. Crime opportunities are concentrated…
On the heals of a significant security breach or crime, organizations often beef up security by adding more security personnel,…
The mission of the Center for Problem-Oriented Policing is to advance the concept and practice of problem-oriented policing in open…
Does your security consultant or internal security staff assess both physical and operational aspects of the security program? We often…
Nurses fear even more ER assaults as programs cut By JULIE CARR SMYTH (AP) COLUMBUS, Ohio — Emergency room nurse…
The law requires, after July 1, 2010, all licensed GACHs, APHs, and SHs to conduct, not less than annually, a…
A mother who was attacked after giving birth at a Milwaukee hospital is calling for increased security at the facility. …
The National Center for Missing and Exploited Children updated their statistics for 2009 and which date back to 1983. Infant…
On the heals of Joint Commission’s alert on hospital violence, the Cleveland Clinic experienced two shootings, one self inflicted, one…
The International Association of Professional Security Consultants is hosting its first regional security conference in Texas. Building on successful regional…
“Once considered safe havens, health care institutions today are confronting steadily increasing rates of crime, including violent crimes such as…
The Center for Biosecurity at UPMC recently released a Preparedness Report that proposes the following key elements of a national…
People that work at the facility have a better understanding of the security problems than I do when I first…
Bruce Schneier is an internationally renowned security technologist and author. Described by The Economist as a “security guru,” he is…
What are the most commonly mixed up security terms? Threat, vulnerability, and risk. While it might be unreasonable to expect…
In most cases, there is a fairly obvious answer to this question. Typically, security personnel are deployed in the protection…
Vulnerabilities are opportunities, opportunities for crime, opportunities for rule breaking violations, opportunities for loss. By definition, a vulnerability is a…
Organizations can obtain a measurable return on investment through cost savings on security personnel deployment, effective implementation of physical security…
What types of threats should you be looking at? From a security perspective, a threat is an act or condition…
You’re a very busy hospital security manager. At 2 pm on one of your normal busy days, you receive a…
Data driven security is a concept utilized by organizations operating in a constantly changing environment to effectively manage the dynamic…
Securing the environment of care is a challenging and continual effort for most healthcare security managers, who face unique challenges…
Like all professional services, security consultants are a diverse group. Many have years of experience while others have just entered…
An independent security consultant maintains his/her integrity at all times. An independent security consultant is not affiliated with any manufacturer…