888-831-0809

Can Yacht Security be Compromised?

A reader of one of my Yacht Security blogs posed the question: What is to stop the intruder of the mega-yacht from sinking it to gain access to the who is in the safe room?

Yacht Security is no different than any other security venue.

The same issues of asset protection are the same in most applications. The risks and exposures and the countermeasures applied to mitigate the risks and exposures may change due to environment, geographic and the budget available.

Any target can be compromised if the attacker has sufficient reason/motive and resources to apply to the mission.

What is to stop a militant group from deploying a nuclear device in one of our cities? What is to stop a mentally ill individual or a member of a subversive group from bombing an office building, school, airport, etc.? We can go on and on with ‘what if’s’.

The bottom line is security countermeasures primarily mitigate most risks and exposures facing a particular venue or site. A site can be built up with security countermeasures to a Fort Knox level and, the measures can potentially compromised.

Security Systems Integration which enhanced security countermeasures need to be augmented with highly trained security personnel, trained to detect, identify, escalate and possibly intervene to prevent loss to life and property.

The Risk Mitigation Process begins with the conduct of a Security Assessment, covering, but not limited to, the following areas:

  1.  Physical Security Operations & existing Policies
  2.  Guards/manpower/scheduling
  3.  Crime Statistics Analysis
  4.  Perimeter Security
  5.  Security Systems Integration
    • Intrusion Detection
    • CCTV
    • Access Control

Additional areas which can be addressed:

  • IT Infrastructure & Protocols
  • Financial Operations
  • Applicant Screening and Background Investigation Procedures
  • Workplace Violence Training and Intervention

Hope this helps answer the question the reader posed.

Questions about this article and or General Security issues can be addressed to the author:
Joseph A. LaSorsa, CPP
Email: info@lasorsa.com
Website: www.lasorsa.com