The Essential Guide for the Security Expert Witness

The Essential Guide for the Security Expert Witness

Premises Liability and Negligent Security Expert Witness: What you need to know as an expert witness

Navigating the complexities of expert witness testimony for premises liability and/or negligent security cases requires more than just an understanding of the security aspects of the case. Expert witnesses must be well-versed in a variety of legal principles and procedural requirements to ensure their testimony is both credible and admissible.

TSCM for Security Management: How to Enhance Your Security Strategy

TSCM for Security Management: How to Enhance Your Security Strategy

For those new to Technical Surveillance Countermeasures (TSCM), understanding the fundamentals is essential. TSCM inspections primarily focus on detecting audio eavesdropping and video voyeurism while also identifying vulnerable information security targets. This includes audio, video, and data during creation, transmission, or storage. Successful TSCM inspections ensure confidentiality in business operations, protect personal privacy, enhance security, and strengthen competitive advantages and profitability. Achieving these goals requires a smart strategy, knowledgeable execution, and thorough follow-through. Our guidance facilitates easy and cost-effective planning.

CARVER: Criticality vs Accessibility

CARVER: Criticality vs Accessibility

The relationship between criticality and accessibility has been studied habitually by military, law enforcement and security personnel since the Vietnam war. Criticality and accessibility are only two of the six factors measured using the CARVER model, which has been an accepted methodology in the security industry since its inception. CARVER is an acronym used by industry professionals to assess overall client risk and is comprised of the following elements: Criticality, Accessibility, Recuperability, Vulnerability, Effects and Recognizability.

Can Yacht Security be Compromised?

A reader of one of my Yacht Security blogs posed the question: What is to stop the intruder of the mega-yacht from sinking it to gain access to the who is in the safe room?

Yacht Security is no different than any other security venue.

The same issues of asset protection are the same in most applications. The risks and exposures and the countermeasures applied to mitigate the risks and exposures may change due to environment, geographic and the budget available.

Any target can be compromised if the attacker has sufficient reason/motive and resources to apply to the mission.

What is to stop a militant group from deploying a nuclear device in one of our cities? What is to stop a mentally ill individual or a member of a subversive group from bombing an office building, school, airport, etc.? We can go on and on with ‘what if’s’.

The bottom line is security countermeasures primarily mitigate most risks and exposures facing a particular venue or site. A site can be built up with security countermeasures to a Fort Knox level and, the measures can potentially compromised.

Security Systems Integration which enhanced security countermeasures need to be augmented with highly trained security personnel, trained to detect, identify, escalate and possibly intervene to prevent loss to life and property.

The Risk Mitigation Process begins with the conduct of a Security Assessment, covering, but not limited to, the following areas:

  1.  Physical Security Operations & existing Policies
  2.  Guards/manpower/scheduling
  3.  Crime Statistics Analysis
  4.  Perimeter Security
  5.  Security Systems Integration
    • Intrusion Detection
    • CCTV
    • Access Control

Additional areas which can be addressed:

  • IT Infrastructure & Protocols
  • Financial Operations
  • Applicant Screening and Background Investigation Procedures
  • Workplace Violence Training and Intervention

Hope this helps answer the question the reader posed.

Questions about this article and or General Security issues can be addressed to the author:
Joseph A. LaSorsa, CPP
Email: info@lasorsa.com
Website: www.lasorsa.com

NEWTOWN, CT – SCHOOL VIOLENCE. What is our problem?

By: Joseph A. LaSorsa, CPP
Security Expert and Consultant

school violence

This tragedy is one of the hardest of all of the past incidents to deal with because of who it affected and how it affected them. We should keep in mind, however, this is not one of the traditional school violence incidents. This perpetrator was an individual who was an unknown to the school administration and an outsider. There’s a clear common element in most mass shootings – the perpetrator was mentally ill or completely went off the deep end when committing this heinous act and the perpetrator was focused on Targeted Violence and intent on inflicting mass harm in the effort.

In the Newtown incident, it seems the shooter’s mental condition deteriorated rapidly and/or too quickly to be noticed and to have had any positive intervention.

What can we do?

  • Should school districts conduct Security Audits and Assessments to evaluate their current security policies, protocols and security systems? Of course.
  • Should security policy dictate more stringent access control measures be put in place? Absolutely.
  • Should the school administrators request to have their physical security systems upgraded? Of course.
  • Should school security policy dictate the use of security guards on their premises during and after school hours? Yes.

Individuals and media pose and throw out questions like: should schools have metal detectors? Should they employ armed guards? How much security is enough? These are questions and issues which can be considered by consultants and administrators on a case by case basis, however, the answer is not in militarizing our society and it’s institutions. We need to enhance security countermeasures across the board and understand the main cause of the problem we are facing in our society today, which is the lack of institutionalization and proper treatment of the severely mentally ill.

Let’s step back and consider a fact. Very few of us know of anyone or their relative or friend that is institutionalized. The asylums don’t exist in the numbers they existed years ago. Because of the current mental treatment trends, the mentally ill and criminally insane live among us and in our neighborhoods. We have had mall, movie theatre and school mass shootings. We have to ask ourselves: why are these individuals killing people? What is/was the root cause of their actions?

In addition to the above, the government and society watchdogs should monitor and control the sale of violent video games kids are allowed to watch instead of healthy diversions like sports and homework.

Erosion of traditional family values; doing away with God and Faith; society and the media sponsoring and selling violent video games; lack of institutionalization of the criminally insane – all combine to give us a lethal, explosive combination of nasty, violent ingredients!

Do we need to implement additional and stricter policies and procedures for the acquisition of assault weapons? Yes.
Do we need to be more security aware and vigilant? Yes.

Guns, like alcohol during Prohibition and illegal drugs today – will still be available to the criminals and those who are willing to pay the black market prices. A total ban will just insure that the only people possessing assault rifles will be the military, Law Enforcement and of course, criminals!!!

In order for our society to realize any serious positive outcomes of any gun control legislation or enhanced security measures across the board, we will also at the same time need to address the very serious issue of the limited number of mental institutions available capable of incarceration of the severely mentally ill and the criminally insane and society’s attitudes toward the treatment of the severely mentally ill.

These combined efforts are the countermeasures we can reasonably implement and hopefully, will be adequate enough to prevent or limit the type of disasters and massacres which have been occurring all too frequently.

Note: Questions about this article and or School Security issues can be addressed to the author: Joseph A. LaSorsa, CPP
Email: info@lasorsa.com
Website: www.lasorsa.com

Corporate Security Consulting

Our ability to review your business from a security viewpoint and to conduct high level, all hazards risk assessment and vulnerability studies distinguishes J. A. LASORSA & ASSOCIATES from other less experienced security agencies. Your security program planning should include everything from your hiring process to your compliance with state and federal regulations. Your company makes significant investments in people, confidential information, business relationships, and other assets. These investments should be protected to secure a return on investment, and what you do about security risk management is one of the most important business decisions you will make.

Issues such as advances in technology that have made so many of today’s business opportunities possible, also make life easier for perpetrators of fraud, identity theft, corporate spying, and computer hacking…even terrorism. Criminals can find your vulnerabilities and how to exploit them. Because of this, the corporate security consultant you choose must have the depth of experience and professionally trained staff to understand and recommend solutions that will work for you and your business and its various locations.