Monday, August 21, 2017

Recon Marine - Nathaniel Gonzalez

United States Marine Corps Veteran - Nathaniel Gonzalez
























Nathaniel Gonzalez was born on August 28, 1989, in Grand Rapids, MI. After graduating high school in 2008, he enlisted in the Marine Corps and left for boot camp that September. After graduating boot camp, he completed his initial training as an Infantry Rifleman (0311). 


Shortly after he was afforded the opportunity to go to the Recon Indoctrination Program (RIP) where students remain until they either are assigned to a class in a Basic Reconnaissance Course (BRC) or are dropped from the program.


  

Private First-Class Gonzalez was able 
to leave RIP to attend a BRC class, 
and he became a Recon Marine 
(0321) in August of 2009. 
His first duty-station was 2nd Reconnaissance 
Battalion located in Camp Lejeune, NC. 
During his time there, 
he completed Army Airborne and went on
 two combat deployments. 








Private First-Class Gonzalez was able 
to leave RIP to attend a BRC class, 
and he became a Recon Marine 
(0321) in August of 2009. 
His first duty-station was 2nd Reconnaissance 
Battalion located in Camp Lejeune, NC. 
During his time there, 
he completed Army Airborne and went on
 two combat deployments. 





On his second enlistment, Corporal Gonzalez received orders 1st Force Company aboard Camp Pendleton, CA. During his time at 1st Force Company, Sergeant Gonzalez completed several courses to include Marine Corps Water Survival School and the Multi-Mission Parachutist Course. 






Sgt. Gonzalez’s Marine Corps career was cut short due to several service related injuries, and he moved from Camp Pendleton to Los Angeles after being medically retired in June of 2015. In December of 2015, Nathaniel completed the Associate’s Degree he had begun working towards while he was still a Marine through an online program. Accompanied by his son, Nathaniel moved back to Michigan during the summer of 2016. Since moving to Michigan, he has spent his time studying at Grand Rapids Community College and fathering his son.  We are proud to have him as part of the Charlesbrook Protection Services team. 

Monday, August 14, 2017

Vehicles as a weapon

Dealing with a Hostile Vehicle

Numerous people of expressed concerns about a new trend continuing all across the world. That trend is using a vehicle for destruction or as a weapon. There have been multiple incidents here in the U.S. as well as the U.K. The unfortunate part of this method used by ISIS and other criminals is that it is hard to avoid and it can easily go undetected. All they need is a car, but there are a few things that your industry can do to help prevent such an attack.

The following three areas seem to provide the best possibility of preventing such an attack. It is suggested that you speak with building/facility managers as well as local law enforcement to create a plan for such attacks on your industry.

Manage Vehicle Access – evaluate what can be put in place to limit access to vehicles with business reasons for access to your facilities.

Slow the Traffic – There is nothing you can do about the traffic around your property. However, the traffic around your facility can be easily managed by things like temporary speed bumps or cement barricades.

Security Barriers – use substantial protective barriers to protect areas that are susceptible to a hostile-vehicle attack. Active barrier solutions may be an option that should be explored. Discuss with other business leaders at your corporation about vulnerable areas that may need barriers set in place. This could be areas with a large group of people often travel or a structural support of a building.

Overall, it should be something that officials in your industry should take seriously and they should be prepared for. Starting a dialog about this issue is a first step in preventing these attacks from happening further.

Sources:
Security Blog

Saturday, July 29, 2017

Armed Robber Plagues West Michigan



I'm sure many of you that reside in the west Michigan area are aware of the news stories of an armed robber striking multiple gas stations/convenience stores in the area. An unknown subject in west Michigan is responsible for three armed robberies, first in Muskegon county (occurring on 7/10), second in Oceana county (occurring on 7/19), and the last in Newaygo county (also occurring on 7/19).

As many are wondering, what can we do to prevent further attacks like this from happening? The lack of an accurate description appears to be impeding this investigation. As the picture shows below, the suspect covered his face and wore similar clothing in each robbery. All witnesses have stated they believe it is a white male between 5’ to 5’4”. That however, is the only description available. With such insignificant details as these, it's almost impossible to begin an investigation on who is responsible. suspect.jpg


It's important that third shift retail clerks in these types of environments are trained in safely retaining descriptions of robbery suspects. The situation can be very frightening in the moment but it's important that people committing robberies do not get away with them. First, in many stores there is an height measure next to the door. They allow you to quickly look at the approximate height of someone as they enter or exit. This is a great tool to utilize.

Next, look for some insignificant details they can lead investigators on to the right path. For example, maybe a tattoo or scar on their hand, eye color, skin tone, etc. Sometimes you can tell what someone's ethnicity is just by hearing their voice. Lastly, remember that people who commit these crimes often talk to others about committing them. If someone around the area states that they have details on who did it. Be sure to contact the police and get the information where it needs to go.


These situations are incredibly unfortunate, but we are happy to hear that there were no reported injuries. Remember to stay safe and to be vigilant. You never know what you may witness or encounter.


Friday, July 21, 2017

What is considered Terrorism?

Terrorism Targets

Terrorism is the use of force or violence against persons or property in violation of the criminal laws of the United States for purposes of intimidation, coercion, or ransom. Terrorists often use threats to:
  • Create fear among the public
  • Try to convince citizens that their government is powerless to prevent terrorism
  • Get immediate publicity for their causes Acts of terrorism include threats of terrorism; assassinations; hijackings; bomb scares and bombings; cyber attacks (computer-based); and the use of chemical, biological, nuclear and radiological weapons. High-risk targets for acts of terrorism include military and civilian government facilities, international airports, large cities, and high-profile landmarks. Terrorists might also target large public gatherings, water and food supplies, chemical plants, utilities, and corporate centers. Further, terrorists are capable of spreading fear by sending explosives or chemical and biological agents through the mail.

Homeland Security Begins With Hometown Security

The Justice Department recently launched the Nationwide SAR (Suspicious Activity Reporting) Initiative—NSI—a program that sets up “fusion centers” where reports of suspicious activities made by citizens and local police are collected and analyzed. NSI establishes a uniform process for gathering and sharing information among federal, state, local and tribal agencies with the aim of detecting underlying patterns of “precursor conduct”—activities that may signal a potential terrorist attack. The public plays a large part in the NSI program. Authorities are depending upon ordinary citizens to provide the dots to connect. As Department of Homeland Security Secretary Janet Napolitano put it, “Homeland security begins with hometown security.” But what exactly should the public be looking for?

See Something, Say Something

Certain kinds of activities can indicate terrorist plans are in the works, especially when they occur at or near high-profile sites or places where large numbers of people gather. The FBI urges citizens to keep an eye out for such precursor conduct—like that listed below—and to report it immediately.
Surveillance: Are you aware of anyone recording or monitoring activities, taking notes, using cameras, maps, binoculars or other observation equipment near a key facility? Deploying Assets: Have you observed abandoned vehicles, stockpiling of suspicious materials, or persons being deployed near a key facility?
Suspicious Persons: Are you aware of anyone who does not appear to belong in the workplace, neighborhood, business establishment, or near a key facility?
Suspicious Questioning: Are you aware of anyone attempting to gain information in person, by phone, mail, email or other communication method regarding a key facility or its personnel?
Acquiring Supplies: Are you aware of anyone attempting to improperly acquire explosives, weapons, ammunitions, dangerous chemicals, uniforms, badges, flight manuals, access cards or identification for a key facility, or to legally obtain items under suspicious circumstances that could be used in a terrorist act?
Dry Runs: Have you observed any behavior that appears to be preparation for terrorist activity, such as mapping out routes, playing out scenarios with other people, monitoring key facilities, timing traffic lights or traffic flow, or other suspicious activities?
Tests of Security: Are you aware of any attempts to penetrate or test physical security or procedures at a key facility or event? Recognizing and reporting precursor intelligence-gathering activities can interrupt potential terrorist events, crimes and other threats before they occur. While on the job, security officers should follow post orders for reporting suspicious activity. Otherwise, the FBI encourages citizens to contact local police, the FBI or the nearest Joint Terrorism Task Force (JTTF) to report suspicious activity or behavior. If there is an emergency or immediate threat, call 911.
For more information on the NSI program go to http://nsi.ncirc.gov/.
For additional resources on detecting and reporting indicators of terrorist attacks, and for guidelines on preparedness and response to terrorism threats, visit

Source: Samantha Dutcher

Tuesday, July 11, 2017

Vacation Security Risks

Vacation Security Risks

Most of us have pledged to unplug while on a vacation—a “digital detox”—only to back-pedal on that promise at the onset. Staying connected, however, can expose travelers to more than a less-than-relaxing excursion.
Security risks are high for vacationers. They are especially vulnerable because they are less inclined to be vigilant while on vacation.
Security experts recommend vacationers remain on alert for thieves targeting smartphones, as well as to secure devices that may otherwise give cyber criminals access to personal data.
To lessen the impact should your phone be stolen, back it up before you travel, and set up a password or PIN code for added protection, the security experts suggest.Avoid posting information about your vacation on social media before and during the trip. This is type of information can give thieves and cyber criminals the green light to burglarize your home and/or attack your devices.
While on vacation, avoid using Bluetooth or Wi-Fi. Connecting to an unprotected network could inadvertently give cyber criminals access to your data, including private work-related files you may be viewing while traveling.

Do not unplug, however, when it comes to your finances, security experts advise. Monitor your accounts for suspicious activity. If you believe you have been victimized by a cyber criminal, take action immediately to recover any losses.

Tuesday, June 6, 2017

Burglar proofing your window AC

While most of us look forward to the summer season, we occasionally need relief from the summer heat. For those people who don't have central air condition, a window air condition unit is a welcome alternative.  However, window units can make our homes more appealing to burglars and easier to break into. Below are some tips on keeping your home secure when using a window ac.

Placement: Usually we think of placing our AC where our needs inside are best suited. Before installing your unit this year, view your house from the outside. Ideally, your ac unit will be placed in a window that faces the road or other populated area. This should also be well lit. A criminal will be less likely to try and breach your home if they don't have they privacy to do so.

Window rod: When installing a window ac, the window is usually shut on the unit it self. This leaves the ability for the window to be open the rest of the way, allowing for the unit to be removed. Some units come with a metal bracket to be installed to prevent this. If your unit came with one, we advise using it. We still recommend reinforcing that concept with something stronger. A metal rod snugged from the top of the window, to the top of the window frame will make opening the window extremely difficult.



Curtains: The ac curtains are the pieces on the side that slide to cover up the gaps to prevent outside air from getting in. These should be secured into the window and not leave any openings. If you have a window where the screens don't completely cover, consider buying new ones or using a solid material to cover the gap that can't be secured.




Top mounting rail: On the top of the ac unit is a mounting rail that once the window is closed, prevents it from falling out.  Depending on your model it may come with predrilled holes to screw it in. If not create your own.


Alarm: A stand alone window alarm can be purchased for relatively cheap and if the window is opened will create an audible alarm.




Crime prevention stickers: If you have an alarm on your house or on your window, place an ample amount of stickers on your windows indicating this.

Please let us know if there are any other ways you secure yours below!




Friday, June 2, 2017

Knowing your employees


Great article by Law Officer. Charlesbrook Protection Services, LLC has great success because of the relationship between command staff and our officers. Investing time and forming genuine relationships with employees is key to maintaining a healthy work environment.
"Several years ago, I attended a very beneficial leadership course.  One of the things that I took away from that class that I still do today is knowing your officers.  The instructor encouraged us to get some index cards and a recipe box (yes this was before smart phones) to capture important information about each one of our staff members.
You can use the old style index cards and recipe box, or enter the data into your smart phone.  Regardless of what you use, it is important to capture this information to gain respect and trust.
Information of your staff that you should capture:
  • Name of spouse
  • Name of children
  • Name of grandchildren
  • Name of parents
  • Birthdates
  • Anniversaries
  • Hobbies and special interests
  • Favorite sports teams
  • Goals (professional and personal)
  • Anything else you feel important to enhance your professional and personal relationship
It is important that when talking to your staff formally or informally, you should talk to them about some of these topics.  More importantly, you need to be genuinely interested when mentioning these topics.  Just talking about something of interest to strike up a conversation without being genuine is not as productive in your relationship building as really being interested.
Instead of asking, “How is your wife and kids?”  Ask, “How is Shannon and Tim doing?”  It is much more personable when using names rather than titles.  When you demonstrate a true interest in your entire staff, they will feel valued and you should see an increase in morale.
Dallas Sergeant Keith Wenzel (ret) made it a practice each year to send each spouse of the those that worked for him, a personal letter.  He addressed the family by name and made sure they knew who he was and had his phone number.  You can never underestimate in showing a personal interest in those that work for you and Wenzel saw the benefits of that.
Listen
One of the key components of gathering your staff’s information is having exceptional listening skills.  We are bombarded with so much information and technology in today’s society and often times, our listening skills are diminished.  Our minds are always processing information when people are talking to us.  Taking a deep breath and concentrating on listening when our staff is talking to us is critical.
Put the phone down, get off of Facebook, and listen!
If it is important to your staff to talk to you, it should be important for you to listen intently to them.
Summary
You do not need to be in a leadership position to capture and use this information.  This works up the chain as well as down the chain.  Gather this information on your Sergeant, Captain, etc.  Strike up a conversation with your lieutenant and ask him how Tim is doing in football or how was Julie’s first day of school.  I’m sure your relationship with your Lieutenant will be a valued relationship.
Working with others that have a great bond no matter what the rank is makes for a much more productive and cohesive work environment.  Your goal should be to maintain a healthy and genuine connection with each person you work with.  Continuously and intentionally go out of your way to strengthen and develop your relationship with your co-workers. You will not be disappointed!  You may be very surprised and gain a new fishing buddy!"