Monday, October 30, 2017

Halloween Safety

This Halloween take the necessary steps to ensure that your family and you are safe. We all have heard stories of crimes committed while children are trick or treating. There are some simple steps you can take to keep those you love safe. Some of them are as simple as planning ahead and being alert. Consider the following list while trick or treating this year:



  • Plan a well-lit route. Whether you are accompanying your children or they are old enough to venture on their own; the safest place to be is in a well-lit area.
  • Teach your children to never enter a stranger's home or vehicle. It seems like common knowledge, but unfortunately, these incidents occur every year.
  • Tell your children not to eat any treats until they return home. Upon returning home inspect the packaging of the treats. Any unsealed or homemade treats should be discarded.
  • Instruct your kids to be cautious around unfamiliar animals. It’s likely that your children will encounter strangers pets when entering someone else's property.
  • Walk only on the sidewalks, not in the street. If no sidewalk is available, walk at the edge of the roadway, facing traffic. Look both ways before crossing the street, and cross only at the corner. Don’t cut across yards or use alleys. Don’t cross between parked cars.
  • Use extra caution if driving. The children are excited and may forget to look both ways before crossing.
  • Make sure Trick-or-Treaters can see, and be seen. Give them a flashlight to light their way (Glow sticks are often a fun and safe option).
  • Put electronic devices down and keep heads up and walk, don’t run, across the street.
  • Check local city ordinances on appropriate trick or treating times. Most municipalities have a designated time that they would like the activity to start and end at.  



Before going trick or treating this year, please consider these safety tips. Charlesbrook Protection Services wishes you a fun and safe Halloween!

Monday, August 14, 2017

Vehicles as a weapon

Dealing with a Hostile Vehicle

Numerous people of expressed concerns about a new trend continuing all across the world. That trend is using a vehicle for destruction or as a weapon. There have been multiple incidents here in the U.S. as well as the U.K. The unfortunate part of this method used by ISIS and other criminals is that it is hard to avoid and it can easily go undetected. All they need is a car, but there are a few things that your industry can do to help prevent such an attack.

The following three areas seem to provide the best possibility of preventing such an attack. It is suggested that you speak with building/facility managers as well as local law enforcement to create a plan for such attacks on your industry.

Manage Vehicle Access – evaluate what can be put in place to limit access to vehicles with business reasons for access to your facilities.

Slow the Traffic – There is nothing you can do about the traffic around your property. However, the traffic around your facility can be easily managed by things like temporary speed bumps or cement barricades.

Security Barriers – use substantial protective barriers to protect areas that are susceptible to a hostile-vehicle attack. Active barrier solutions may be an option that should be explored. Discuss with other business leaders at your corporation about vulnerable areas that may need barriers set in place. This could be areas with a large group of people often travel or a structural support of a building.

Overall, it should be something that officials in your industry should take seriously and they should be prepared for. Starting a dialog about this issue is a first step in preventing these attacks from happening further.

Sources:
Security Blog

Saturday, July 29, 2017

Armed Robber Plagues West Michigan



I'm sure many of you that reside in the west Michigan area are aware of the news stories of an armed robber striking multiple gas stations/convenience stores in the area. An unknown subject in west Michigan is responsible for three armed robberies, first in Muskegon county (occurring on 7/10), second in Oceana county (occurring on 7/19), and the last in Newaygo county (also occurring on 7/19).

As many are wondering, what can we do to prevent further attacks like this from happening? The lack of an accurate description appears to be impeding this investigation. As the picture shows below, the suspect covered his face and wore similar clothing in each robbery. All witnesses have stated they believe it is a white male between 5’ to 5’4”. That however, is the only description available. With such insignificant details as these, it's almost impossible to begin an investigation on who is responsible. suspect.jpg


It's important that third shift retail clerks in these types of environments are trained in safely retaining descriptions of robbery suspects. The situation can be very frightening in the moment but it's important that people committing robberies do not get away with them. First, in many stores there is an height measure next to the door. They allow you to quickly look at the approximate height of someone as they enter or exit. This is a great tool to utilize.

Next, look for some insignificant details they can lead investigators on to the right path. For example, maybe a tattoo or scar on their hand, eye color, skin tone, etc. Sometimes you can tell what someone's ethnicity is just by hearing their voice. Lastly, remember that people who commit these crimes often talk to others about committing them. If someone around the area states that they have details on who did it. Be sure to contact the police and get the information where it needs to go.


These situations are incredibly unfortunate, but we are happy to hear that there were no reported injuries. Remember to stay safe and to be vigilant. You never know what you may witness or encounter.


Friday, July 21, 2017

What is considered Terrorism?

Terrorism Targets

Terrorism is the use of force or violence against persons or property in violation of the criminal laws of the United States for purposes of intimidation, coercion, or ransom. Terrorists often use threats to:
  • Create fear among the public
  • Try to convince citizens that their government is powerless to prevent terrorism
  • Get immediate publicity for their causes Acts of terrorism include threats of terrorism; assassinations; hijackings; bomb scares and bombings; cyber attacks (computer-based); and the use of chemical, biological, nuclear and radiological weapons. High-risk targets for acts of terrorism include military and civilian government facilities, international airports, large cities, and high-profile landmarks. Terrorists might also target large public gatherings, water and food supplies, chemical plants, utilities, and corporate centers. Further, terrorists are capable of spreading fear by sending explosives or chemical and biological agents through the mail.

Homeland Security Begins With Hometown Security

The Justice Department recently launched the Nationwide SAR (Suspicious Activity Reporting) Initiative—NSI—a program that sets up “fusion centers” where reports of suspicious activities made by citizens and local police are collected and analyzed. NSI establishes a uniform process for gathering and sharing information among federal, state, local and tribal agencies with the aim of detecting underlying patterns of “precursor conduct”—activities that may signal a potential terrorist attack. The public plays a large part in the NSI program. Authorities are depending upon ordinary citizens to provide the dots to connect. As Department of Homeland Security Secretary Janet Napolitano put it, “Homeland security begins with hometown security.” But what exactly should the public be looking for?

See Something, Say Something

Certain kinds of activities can indicate terrorist plans are in the works, especially when they occur at or near high-profile sites or places where large numbers of people gather. The FBI urges citizens to keep an eye out for such precursor conduct—like that listed below—and to report it immediately.
Surveillance: Are you aware of anyone recording or monitoring activities, taking notes, using cameras, maps, binoculars or other observation equipment near a key facility? Deploying Assets: Have you observed abandoned vehicles, stockpiling of suspicious materials, or persons being deployed near a key facility?
Suspicious Persons: Are you aware of anyone who does not appear to belong in the workplace, neighborhood, business establishment, or near a key facility?
Suspicious Questioning: Are you aware of anyone attempting to gain information in person, by phone, mail, email or other communication method regarding a key facility or its personnel?
Acquiring Supplies: Are you aware of anyone attempting to improperly acquire explosives, weapons, ammunitions, dangerous chemicals, uniforms, badges, flight manuals, access cards or identification for a key facility, or to legally obtain items under suspicious circumstances that could be used in a terrorist act?
Dry Runs: Have you observed any behavior that appears to be preparation for terrorist activity, such as mapping out routes, playing out scenarios with other people, monitoring key facilities, timing traffic lights or traffic flow, or other suspicious activities?
Tests of Security: Are you aware of any attempts to penetrate or test physical security or procedures at a key facility or event? Recognizing and reporting precursor intelligence-gathering activities can interrupt potential terrorist events, crimes and other threats before they occur. While on the job, security officers should follow post orders for reporting suspicious activity. Otherwise, the FBI encourages citizens to contact local police, the FBI or the nearest Joint Terrorism Task Force (JTTF) to report suspicious activity or behavior. If there is an emergency or immediate threat, call 911.
For more information on the NSI program go to http://nsi.ncirc.gov/.
For additional resources on detecting and reporting indicators of terrorist attacks, and for guidelines on preparedness and response to terrorism threats, visit

Source: Samantha Dutcher

Tuesday, July 11, 2017

Vacation Security Risks

Vacation Security Risks

Most of us have pledged to unplug while on a vacation—a “digital detox”—only to back-pedal on that promise at the onset. Staying connected, however, can expose travelers to more than a less-than-relaxing excursion.
Security risks are high for vacationers. They are especially vulnerable because they are less inclined to be vigilant while on vacation.
Security experts recommend vacationers remain on alert for thieves targeting smartphones, as well as to secure devices that may otherwise give cyber criminals access to personal data.
To lessen the impact should your phone be stolen, back it up before you travel, and set up a password or PIN code for added protection, the security experts suggest.Avoid posting information about your vacation on social media before and during the trip. This is type of information can give thieves and cyber criminals the green light to burglarize your home and/or attack your devices.
While on vacation, avoid using Bluetooth or Wi-Fi. Connecting to an unprotected network could inadvertently give cyber criminals access to your data, including private work-related files you may be viewing while traveling.

Do not unplug, however, when it comes to your finances, security experts advise. Monitor your accounts for suspicious activity. If you believe you have been victimized by a cyber criminal, take action immediately to recover any losses.

Tuesday, June 6, 2017

Burglar proofing your window AC

While most of us look forward to the summer season, we occasionally need relief from the summer heat. For those people who don't have central air condition, a window air condition unit is a welcome alternative.  However, window units can make our homes more appealing to burglars and easier to break into. Below are some tips on keeping your home secure when using a window ac.

Placement: Usually we think of placing our AC where our needs inside are best suited. Before installing your unit this year, view your house from the outside. Ideally, your ac unit will be placed in a window that faces the road or other populated area. This should also be well lit. A criminal will be less likely to try and breach your home if they don't have they privacy to do so.

Window rod: When installing a window ac, the window is usually shut on the unit it self. This leaves the ability for the window to be open the rest of the way, allowing for the unit to be removed. Some units come with a metal bracket to be installed to prevent this. If your unit came with one, we advise using it. We still recommend reinforcing that concept with something stronger. A metal rod snugged from the top of the window, to the top of the window frame will make opening the window extremely difficult.



Curtains: The ac curtains are the pieces on the side that slide to cover up the gaps to prevent outside air from getting in. These should be secured into the window and not leave any openings. If you have a window where the screens don't completely cover, consider buying new ones or using a solid material to cover the gap that can't be secured.




Top mounting rail: On the top of the ac unit is a mounting rail that once the window is closed, prevents it from falling out.  Depending on your model it may come with predrilled holes to screw it in. If not create your own.


Alarm: A stand alone window alarm can be purchased for relatively cheap and if the window is opened will create an audible alarm.




Crime prevention stickers: If you have an alarm on your house or on your window, place an ample amount of stickers on your windows indicating this.

Please let us know if there are any other ways you secure yours below!




Friday, June 2, 2017

Knowing your employees


Great article by Law Officer. Charlesbrook Protection Services, LLC has great success because of the relationship between command staff and our officers. Investing time and forming genuine relationships with employees is key to maintaining a healthy work environment.
"Several years ago, I attended a very beneficial leadership course.  One of the things that I took away from that class that I still do today is knowing your officers.  The instructor encouraged us to get some index cards and a recipe box (yes this was before smart phones) to capture important information about each one of our staff members.
You can use the old style index cards and recipe box, or enter the data into your smart phone.  Regardless of what you use, it is important to capture this information to gain respect and trust.
Information of your staff that you should capture:
  • Name of spouse
  • Name of children
  • Name of grandchildren
  • Name of parents
  • Birthdates
  • Anniversaries
  • Hobbies and special interests
  • Favorite sports teams
  • Goals (professional and personal)
  • Anything else you feel important to enhance your professional and personal relationship
It is important that when talking to your staff formally or informally, you should talk to them about some of these topics.  More importantly, you need to be genuinely interested when mentioning these topics.  Just talking about something of interest to strike up a conversation without being genuine is not as productive in your relationship building as really being interested.
Instead of asking, “How is your wife and kids?”  Ask, “How is Shannon and Tim doing?”  It is much more personable when using names rather than titles.  When you demonstrate a true interest in your entire staff, they will feel valued and you should see an increase in morale.
Dallas Sergeant Keith Wenzel (ret) made it a practice each year to send each spouse of the those that worked for him, a personal letter.  He addressed the family by name and made sure they knew who he was and had his phone number.  You can never underestimate in showing a personal interest in those that work for you and Wenzel saw the benefits of that.
Listen
One of the key components of gathering your staff’s information is having exceptional listening skills.  We are bombarded with so much information and technology in today’s society and often times, our listening skills are diminished.  Our minds are always processing information when people are talking to us.  Taking a deep breath and concentrating on listening when our staff is talking to us is critical.
Put the phone down, get off of Facebook, and listen!
If it is important to your staff to talk to you, it should be important for you to listen intently to them.
Summary
You do not need to be in a leadership position to capture and use this information.  This works up the chain as well as down the chain.  Gather this information on your Sergeant, Captain, etc.  Strike up a conversation with your lieutenant and ask him how Tim is doing in football or how was Julie’s first day of school.  I’m sure your relationship with your Lieutenant will be a valued relationship.
Working with others that have a great bond no matter what the rank is makes for a much more productive and cohesive work environment.  Your goal should be to maintain a healthy and genuine connection with each person you work with.  Continuously and intentionally go out of your way to strengthen and develop your relationship with your co-workers. You will not be disappointed!  You may be very surprised and gain a new fishing buddy!"

Wednesday, May 31, 2017

Tips for staying safe at an event

In the aftermath of the bombing at Manchester Arena last week — which killed 22 people and wounded 116 others — venue operators, live event producers, and law enforcement groups around the world are rethinking their approaches to event security.

The below article written by Buzz Feeds, Reggie Ugwu are some great tips on staying safe at major events. 


ISIS claimed responsibility for the bombing, which targeted an Ariana Grande concert in the northern England city of Manchester on May 22. UK Prime Minister Theresa May described it as "among the worst terrorist incidents we have ever experienced." Today, Grande announced that she will return to the city on Sunday, June 4, for a benefit show, which will also feature performances by Justin Bieber, Katy Perry, Coldplay, Pharrell, Miley Cyrus, and others.
Leon Neal / Getty Images
ISIS claimed responsibility for the bombing, which targeted an Ariana Grande concert in the northern England city of Manchester on May 22. UK Prime Minister Theresa May described it as "among the worst terrorist incidents we have ever experienced." Today, Grande announced that she will return to the city on Sunday, June 4, for a benefit show, which will also feature performances by Justin Bieber, Katy Perry, Coldplay, Pharrell, Miley Cyrus, and others.

The big challenge: The Manchester bombing took place in a "gray zone" between the arena and a train station, which had a lot of foot traffic but less security than at either location.


Since 9/11, security procedures at big venues like Manchester Arena have been routinely upgraded. Safety measures including bollards (those stout metal poles that block vehicles), metal detectors, high-resolution security cameras, and numerous security guards and off-duty police officers are now standard. But incidents like the Manchester bombing — and a bombing outside of a soccer stadium during the 2015 Paris attacks — indicate a need to expand the security perimeter around big events, security experts said. "It’s no longer just the venue anymore — it’s the surroundings that are just as important," Louis Marciani, director of the National Center for Spectator Sports Safety and Security, told BuzzFeed News.
Dave Thompson / Getty Images
Since 9/11, security procedures at big venues like Manchester Arena have been routinely upgraded. Safety measures including bollards (those stout metal poles that block vehicles), metal detectors, high-resolution security cameras, and numerous security guards and off-duty police officers are now standard. 
But incidents like the Manchester bombing — and a bombing outside of a soccer stadium during the 2015 Paris attacks — indicate a need to expand the security perimeter around big events, security experts said. "It’s no longer just the venue anymore — it’s the surroundings that are just as important," Louis Marciani, director of the National Center for Spectator Sports Safety and Security, told BuzzFeed News.

In the future, security experts say they expect these kinds of peripheral areas to be more heavily guarded — a change that will require increased cooperation between private businesses and local authorities, and make the experience of attending live events a little more demanding.


In addition to making the access to events more tedious, added security could lead to higher ticket prices to cover costs. "Just like when we stopped allowing liquids on planes, and started requiring you to take your shoes off at the airport, it’s a nuisance, but it’s a necessary nuisance," said Manuel Gomez of MG Security Services. "As these things evolve, we evolve with them."Whatever form new security measures take, experts said they are likely to be implemented quietly. "A promoter or venue will never say, 'Because of Bataclan we're doing X,' or 'Because of Manchester we're doing Y,' because they don't want to worry people," said Steve Adelman, vice president of the Entertainment Safety Alliance. Multiple promoters contacted by BuzzFeed News declined to comment.
Oli Scarff / AFP / Getty Images
In addition to making the access to events more tedious, added security could lead to higher ticket prices to cover costs. 
"Just like when we stopped allowing liquids on planes, and started requiring you to take your shoes off at the airport, it’s a nuisance, but it’s a necessary nuisance," said Manuel Gomez of MG Security Services. "As these things evolve, we evolve with them."
Whatever form new security measures take, experts said they are likely to be implemented quietly. "A promoter or venue will never say, 'Because of Bataclan we're doing X,' or 'Because of Manchester we're doing Y,' because they don't want to worry people," said Steve Adelman, vice president of the Entertainment Safety Alliance. 
Multiple promoters contacted by BuzzFeed News declined to comment.

If you're at an arena or other venue and something alarming happens, experts say there are things you can do to help keep yourself and your friends safe.



Mike Hewitt / Getty Images

Here are some precautions for the safety-conscious ticket holder, according to security professionals:

Before the Event / When You Arrive:

1. Review the seating chart and familiarize yourself with the layout of the venue and the location of your seat. You may want to download the chart to your phone. 
2. Do a search online to see if the event or performers have been a target of violent threats.
3. Check the venue's website to see if there's information posted about its security efforts.
4. Parents: Consider requiring adult supervision for kids and teenagers.
5. With the rest of your party, think ahead about what your game plan will be in the event of an emergency: What will you do? How will you communicate? Where will you go?
6. When you get to the venue, keep an eye out for the emergency exit closest to your seat — just like on an airplane.
7. Take note of where event staff or security/police officers are posted.
8. Keep an eye out for a potential "safe room" near your seat — a closet or other windowless room with a door that locks — where you can hide if necessary.
9. If you see someone acting strangely or in a way that makes you uncomfortable, notify event staff or security/police officers.

If There's an Emergency:

10. Take cover and listen for any announcements. 
11. See if you can identify the location of the threat(s) based on crowd reactions and get out of the way of immediate harm.
12. Put your game plan into action. If you need to escape the venue, calmly and quickly make your way toward the nearest exit — not the entrance you came in.
13. If there's an armed attack and you can't escape quickly, head to a safe room, lock the door, turn out the lights, and stay silent. "If [the attacker] has to make extra effort to get into a room, they might just bypass it," said Jeff Ringel, a security analyst with The Soufan Group and a former leader of the FBI's emergency response team.
14. Keep your group together and help each other out.
15. If you get caught up in a stampede, move away from the center and grab onto a wall or pillar for safety.
16. Stay away from glass that could shatter and cause injuries. 
17. But if other exits are blocked, be prepared to break a window or escape by alternative means.

Wednesday, April 26, 2017

Dangers That Go Easily Unnoticed

American businesses today are susceptible to some of the scariest security breaches and threats imaginable. Mainly because they often do not have the knowledge or resources to secure their property properly. With advancements in technology and industries forming to combat these problems, you do have options for defense, but they can come at a hefty price. Many businesses can make their facilities more secure by fixing some errors (for free) that often go unnoticed. Today lets focus on one commonly overlooked security risk here in America, which is “access control/key management.”

Different industries require different levels of access management, but in any industry, keeping people out of unauthorized locations should be a top priority. Technology advancements such as “D.A.C.S (Door Access Control Systems)” make securing sensitive locations easy, but these are often unaffordable for the average business owner. If your facility is using traditional keys to gain access to secure locations, you can still easily manage access to these restricted areas.

Creating a key log is the best way to do this. Within the log include the employee's name and title. Then assign keys only to areas that this employee will need access to. Label the keys to these designated areas and issue them to the employee. By doing this you avoid the potential of presenting a employee with unecessary opportunities to violate company policies and/or the law. Businesses could potentially avoid problems by not using the “one key is easiest” mentality. I have been in large facilities that have only required 2 keys to gain access to virtually everything within the building. This offers incredible potential for crime to occur.

Next, regularly update this list. This list should be updated every time an employee changes positions, resigns/fired, or quits. This prevents an employee or ex-employee from gaining access into areas that they shouldn’t be in. Along with this point, do not allow employees to take keys home. Request that they sign their keys out at the beginning of their shift and sign them back in at the end of their shift. This prevents the keys from getting lost, stolen, key duplicates being made, and after hour breaches.

The last way to secure your building using proper access control techniques is to ponder what could happen if a “bad guy” enters your facility. Discuss with your leadership team what might happen if someone gets through the front door and by the front desk personnel. Where are they going to go? Could they easily gain access to the rest of the facility? These questions will allow you to create a safer environment for your clients, employees, and yourself.

A flawless access control plan is impossible to create, but noticing problems and making  changes is a great first step. Businesses are often reactive when it comes to securing their facility. Proactive readiness will allow you to be a step ahead of those who attempt to do harm. The gains are priceless when it comes down to the safety of the lives that you serve and employee.

Next week we will discuss employee safety dangers.